-
1
-
-
24944579285
-
-
The Center of Biometrics and Security Research
-
The Center of Biometrics and Security Research, CASIA Iris Image Database, http://www.sinobiometrics.com.
-
CASIA Iris Image Database
-
-
-
2
-
-
0742290132
-
How Iris Recognition Works
-
J. Daugman, "How Iris Recognition Works", IEEE Trans. CSVT, 14(1), 2004, pp. 21-30.
-
(2004)
IEEE Trans. CSVT
, vol.14
, Issue.1
, pp. 21-30
-
-
Daugman, J.1
-
3
-
-
0031651014
-
On enabling secure applications through off-line biometric identification
-
G. Davida, Y. Frankel, and B. Matt, "On enabling secure applications through off-line biometric identification", Proc. of IEEE, Symp. on Security and Privacy, 1998, pp. 148-157.
-
(1998)
Proc. of IEEE, Symp. on Security and Privacy
, pp. 148-157
-
-
Davida, G.1
Frankel, Y.2
Matt, B.3
-
4
-
-
0036037919
-
Private key generation from online handwritten signatures
-
H. Feng and C. C. Wah, "Private key generation from online handwritten signatures", Information Management and Computer Security, 10(18), 2002, pp. 159-164.
-
(2002)
Information Management and Computer Security
, vol.10
, Issue.18
, pp. 159-164
-
-
Feng, H.1
Wah, C.C.2
-
5
-
-
35248868841
-
Computation of cryptographic keys from face biometrics
-
(LNCS: 2828)
-
A. Goh and D. C. L. Ngo, "Computation of cryptographic keys from face biometrics", In Communications and Multimedia Security (LNCS: 2828), pp. 1-13, 2003.
-
(2003)
Communications and Multimedia Security
, pp. 1-13
-
-
Goh, A.1
Ngo, D.C.L.2
-
6
-
-
0742290133
-
An introduction to biometric recognition
-
A. K. Jain, A. Ross, and S. Prabhakar, "An introduction to biometric recognition", IEEE Trans. on Circuits and Systems for Video Technology, 14, 2004, pp. 4-20.
-
(2004)
IEEE Trans. on Circuits and Systems for Video Technology
, vol.14
, pp. 4-20
-
-
Jain, A.K.1
Ross, A.2
Prabhakar, S.3
-
7
-
-
30844458593
-
A fuzzy vault scheme
-
A. Juels and M. Sudan, "A fuzzy vault scheme", Designs, Codes and Cryptography, 38, 2006, pp. 237-257.
-
(2006)
Designs, Codes and Cryptography
, vol.38
, pp. 237-257
-
-
Juels, A.1
Sudan, M.2
-
9
-
-
0033281372
-
Password hardening based on keystroke dynamics
-
F. Monrose, M. K. Reiter, and S. Wetzel, "Password hardening based on keystroke dynamics", Proceedings of sixth ACM Conference on Computer and Communications Security, CCCS, 1999, pp. 73-82.
-
(1999)
Proceedings of Sixth ACM Conference on Computer and Communications Security, CCCS
, pp. 73-82
-
-
Monrose, F.1
Reiter, M.K.2
Wetzel, S.3
-
10
-
-
0031070158
-
Automatic on-line signature verification
-
PII S0018921997014631
-
V. Nalwa, "Automatic on-line signature verification", Proceedings of the IEEE, 85, 1997, pp. 215-239. (Pubitemid 127745558)
-
(1997)
Proceedings of the IEEE
, vol.85
, Issue.2
, pp. 215-239
-
-
Nalwa, V.S.1
-
11
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
N. K. Ratha, J. H. Connell, and R. M. Bolle, "Enhancing security and privacy in biometrics-based authentication systems", IBM Systems Journal, 40, 2001, pp. 614-634.
-
(2001)
IBM Systems Journal
, vol.40
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
12
-
-
0032224440
-
Biometric Encryption using image processing
-
C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, and B. V. Kumar,"Biometric Encryption using image processing", Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques II, 3314, 1998, pp. 178-188.
-
(1998)
Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques II
, vol.3314
, pp. 178-188
-
-
Soutar, C.1
Roberge, D.2
Stoianov, A.3
Gilroy, R.4
Kumar, B.V.5
-
13
-
-
33748076787
-
A secure biometric authentication scheme based on robust hashing
-
Y. Sutcu, H. T. Sencar, and N. Memon, "A secure biometric authentication scheme based on robust hashing", MMSec '05: Proceedings of the 7th Workshop on Multimedia and Security, 2005, pp. 111-116.
-
(2005)
MMSec '05: Proceedings of the 7th Workshop on Multimedia and Security
, pp. 111-116
-
-
Sutcu, Y.1
Sencar, H.T.2
Memon, N.3
-
15
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, "Biometric cryptosystems: issues and challenges", Proceedings of the IEEE, 92(6), 2004, pp. 948-960.
-
(2004)
Proceedings of the IEEE
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
-
16
-
-
33751585800
-
Biometric hash based on statistical features of online signatures
-
Washington, DC, USA, IEEE Computer Society
-
C. Vielhauer, R. Steinmetz, and A. Mayerhöfer, "Biometric hash based on statistical features of online signatures", In ICPR '02: Proceedings of the 16 th International Conference on Pattern Recognition (ICPR'02) Volume 1, pp. 10123, Washington, DC, USA, 2002. IEEE Computer Society.
-
(2002)
ICPR '02: Proceedings of the 16 Th International Conference on Pattern Recognition (ICPR'02)
, vol.1
, pp. 10123
-
-
Vielhauer, C.1
Steinmetz, R.2
Mayerhöfer, A.3
-
17
-
-
35048845278
-
SVC2004: First International Signature Verification Competition
-
Proceedings of the International Conference on Biometric Authentication (ICBA)
-
D.-Y. Yeung, H. Chang, Y. Xiong, S. George, R. Kashi, T. Matsumoto, and G. Rigoll, "SVC2004: First International Signature Verification Competition. Proceedings of the International Conference on Biometric Authentication (ICBA)", LNCS, 3072, 2004, pp. 16-22.
-
(2004)
LNCS
, vol.3072
, pp. 16-22
-
-
Yeung, D.-Y.1
Chang, H.2
Xiong, Y.3
George, S.4
Kashi, R.5
Matsumoto, T.6
Rigoll, G.7
-
18
-
-
0038697580
-
Biometric personal identification based on iris patterns
-
Y. Zhu, T. Tan, and Y. Wang, "Biometric personal identification based on iris patterns", 15th International Conference on Pattern Recognition (ICPR'00) - Volume2, 2000, pp. 801-804.
-
(2000)
15th International Conference on Pattern Recognition (ICPR'00)
, vol.2
, pp. 801-804
-
-
Zhu, Y.1
Tan, T.2
Wang, Y.3
|