-
1
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
U. Uludag, S. Pankanti, S. Prabhakar and A. K Jain, "Biometric Cryptosystems: Issues and Challenges", in Proc. IEEE Special Issue Multimedia Sec. for Digital Rights, 92(6):948-960 (2004).
-
(2004)
Proc. IEEE Special Issue Multimedia Sec. for Digital Rights
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
-
2
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
N. K. Ratha, J. H. Connell, and R. M. Bolle, "Enhancing security and privacy in biometrics-based authentication systems", IBM Systems Journal, 40(1):614-634 (2004).
-
(2004)
IBM Systems Journal
, vol.40
, Issue.1
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
5
-
-
77958151410
-
A hybrid approach for face template protection
-
Y. C. Feng, P. C. Yuen and A. K Jain "A Hybrid Approach for Face Template Protection", in Proc. SPIE vol.6944, pp. 694408 (2008).
-
(2008)
Proc. SPIE
, vol.6944
, pp. 694408
-
-
Feng, Y.C.1
Yuen, P.C.2
Jain, A.K.3
-
6
-
-
34548118752
-
Fingerprint image reconstruction from standard templates
-
R. Cappelli, A. Lumini, D. Maio, and D. Maltoni, "Fingerprint Image Reconstruction from Standard Templates", IEEE Trans. on Pattern Anal. and Mach. Intell., 29(9):1489-1503 (2007).
-
(2007)
IEEE Trans. on Pattern Anal. and Mach. Intell.
, vol.29
, Issue.9
, pp. 1489-1503
-
-
Cappelli, R.1
Lumini, A.2
Maio, D.3
Maltoni, D.4
-
8
-
-
69949122147
-
Design and analysis of fuzzy extractors for faces
-
Y. Sutcu, Q. Li and N. Memon, "Design and Analysis of Fuzzy Extractors for Faces", in Proc. SPIE vol.7306, pp. 73061X (2009).
-
(2009)
Proc. SPIE
, vol.7306
-
-
Sutcu, Y.1
Li, Q.2
Memon, N.3
-
9
-
-
26444442431
-
Face recognition experiments with random projection
-
N. Goal, G. Bebis and A. Nefian, "Face recognition experiments with random projection", in Proc. SPIE vol.5779, pp 426-437 (2005).
-
(2005)
Proc. SPIE
, vol.5779
, pp. 426-437
-
-
Goal, N.1
Bebis, G.2
Nefian, A.3
-
10
-
-
50249156015
-
Face based biometric authentication with changeable and privacy preservable templates
-
W. Yongjin and K. N. Plataniotis, "Face Based Biometric Authentication with Changeable and Privacy Preservable Templates", Biometrics Symposium, pp. 1-6 (2007).
-
(2007)
Biometrics Symposium
, pp. 1-6
-
-
Yongjin, W.1
Plataniotis, K.N.2
-
11
-
-
8344273612
-
Personalized cryptographic key generation based on facehashing
-
A. B. J. Teoh, D.C. L. Ngo and A. Goh, "Personalized cryptographic key generation based on FaceHashing", Computers & Security, 23(7):606-614 (2004).
-
(2004)
Computers & Security
, vol.23
, Issue.7
, pp. 606-614
-
-
Teoh, A.B.J.1
Ngo, D.C.L.2
Goh, A.3
-
12
-
-
35248868841
-
Computation of cryptographic keys from face biometrics
-
A. Goh and D. C. L. Ngo, "Computation of Cryptographic Keys from Face Biometrics", LECTURE NOTES IN COMPUTER SCIENCE, pp. 1-13 (2003).
-
(2003)
Lecture Notes in Computer Science
, pp. 1-13
-
-
Goh, A.1
Ngo, D.C.L.2
-
14
-
-
12344259813
-
Biohashing: Two factor authentication featuring fingerprint data and tokenised random number
-
A. T. B. Jin, D. N. C. Ling and A. Goh, "Biohashing: two factor authentication featuring fingerprint data and tokenised random number", Pattern Recognition, 37: 2245-2255 (2004).
-
(2004)
Pattern Recognition
, vol.37
, pp. 2245-2255
-
-
Jin, A.T.B.1
Ling, D.N.C.2
Goh, A.3
-
16
-
-
26444581741
-
Wavelet-based face verification for constrained platforms
-
H. Sellahewa and S. Jassim, "Wavelet-based face verification for constrained platforms," in Proc. SPIE vol.5779, pp. 173-183 (2005).
-
(2005)
Proc. SPIE
, vol.5779
, pp. 173-183
-
-
Sellahewa, H.1
Jassim, S.2
|