메뉴 건너뛰기




Volumn , Issue , 2009, Pages 562-567

Improving performance and security of biometrics using efficient and stable random projection techniques

Author keywords

[No Author keywords available]

Indexed keywords

BEFORE AND AFTER; BIOMETRIC TEMPLATE; CREDIT CARDS; CRYPTOSYSTEMS; FACE IMAGES; FEATURE VECTORS; GRAM-SCHMIDT; IMPROVING PERFORMANCE; ORTHONORMAL; PROTECTION SCHEMES; RANDOM PROJECTIONS; RECOGNITION ACCURACY; RESEARCH ACTIVITIES; SECURITY ANALYSIS; SECURITY AND PRIVACY; TEMPLATE PROTECTION;

EID: 70450257716     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (30)

References (17)
  • 2
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometrics-based authentication systems
    • N. K. Ratha, J. H. Connell, and R. M. Bolle, "Enhancing security and privacy in biometrics-based authentication systems", IBM Systems Journal, 40(1):614-634 (2004).
    • (2004) IBM Systems Journal , vol.40 , Issue.1 , pp. 614-634
    • Ratha, N.K.1    Connell, J.H.2    Bolle, R.M.3
  • 5
    • 77958151410 scopus 로고    scopus 로고
    • A hybrid approach for face template protection
    • Y. C. Feng, P. C. Yuen and A. K Jain "A Hybrid Approach for Face Template Protection", in Proc. SPIE vol.6944, pp. 694408 (2008).
    • (2008) Proc. SPIE , vol.6944 , pp. 694408
    • Feng, Y.C.1    Yuen, P.C.2    Jain, A.K.3
  • 8
    • 69949122147 scopus 로고    scopus 로고
    • Design and analysis of fuzzy extractors for faces
    • Y. Sutcu, Q. Li and N. Memon, "Design and Analysis of Fuzzy Extractors for Faces", in Proc. SPIE vol.7306, pp. 73061X (2009).
    • (2009) Proc. SPIE , vol.7306
    • Sutcu, Y.1    Li, Q.2    Memon, N.3
  • 9
    • 26444442431 scopus 로고    scopus 로고
    • Face recognition experiments with random projection
    • N. Goal, G. Bebis and A. Nefian, "Face recognition experiments with random projection", in Proc. SPIE vol.5779, pp 426-437 (2005).
    • (2005) Proc. SPIE , vol.5779 , pp. 426-437
    • Goal, N.1    Bebis, G.2    Nefian, A.3
  • 10
    • 50249156015 scopus 로고    scopus 로고
    • Face based biometric authentication with changeable and privacy preservable templates
    • W. Yongjin and K. N. Plataniotis, "Face Based Biometric Authentication with Changeable and Privacy Preservable Templates", Biometrics Symposium, pp. 1-6 (2007).
    • (2007) Biometrics Symposium , pp. 1-6
    • Yongjin, W.1    Plataniotis, K.N.2
  • 11
    • 8344273612 scopus 로고    scopus 로고
    • Personalized cryptographic key generation based on facehashing
    • A. B. J. Teoh, D.C. L. Ngo and A. Goh, "Personalized cryptographic key generation based on FaceHashing", Computers & Security, 23(7):606-614 (2004).
    • (2004) Computers & Security , vol.23 , Issue.7 , pp. 606-614
    • Teoh, A.B.J.1    Ngo, D.C.L.2    Goh, A.3
  • 12
    • 35248868841 scopus 로고    scopus 로고
    • Computation of cryptographic keys from face biometrics
    • A. Goh and D. C. L. Ngo, "Computation of Cryptographic Keys from Face Biometrics", LECTURE NOTES IN COMPUTER SCIENCE, pp. 1-13 (2003).
    • (2003) Lecture Notes in Computer Science , pp. 1-13
    • Goh, A.1    Ngo, D.C.L.2
  • 14
    • 12344259813 scopus 로고    scopus 로고
    • Biohashing: Two factor authentication featuring fingerprint data and tokenised random number
    • A. T. B. Jin, D. N. C. Ling and A. Goh, "Biohashing: two factor authentication featuring fingerprint data and tokenised random number", Pattern Recognition, 37: 2245-2255 (2004).
    • (2004) Pattern Recognition , vol.37 , pp. 2245-2255
    • Jin, A.T.B.1    Ling, D.N.C.2    Goh, A.3
  • 16
    • 26444581741 scopus 로고    scopus 로고
    • Wavelet-based face verification for constrained platforms
    • H. Sellahewa and S. Jassim, "Wavelet-based face verification for constrained platforms," in Proc. SPIE vol.5779, pp. 173-183 (2005).
    • (2005) Proc. SPIE , vol.5779 , pp. 173-183
    • Sellahewa, H.1    Jassim, S.2
  • 17


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.