메뉴 건너뛰기




Volumn , Issue , 2009, Pages 497-538

On-Line Signature-Based Authentication: Template Security Issues and Countermeasures

Author keywords

On line signature based authentication template security issues and countermeasures; Security scalable signature based authentication system using data hiding; Signature based user adaptive fuzzy commitment

Indexed keywords


EID: 71349086903     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1002/9780470522356.ch20     Document Type: Chapter
Times cited : (12)

References (101)
  • 3
    • 84953586760 scopus 로고
    • Human identification in information systems: Management challenges and public policy issues
    • R. Clarke., Human identification in information systems: Management challenges and public policy issues, Inf. Technol. People 7(4):6-37, 1994.
    • (1994) Inf. Technol. People , vol.7 , Issue.4 , pp. 6-37
    • Clarke, R.1
  • 4
    • 0003987134 scopus 로고    scopus 로고
    • Biometrics: Personal Identification in Networked society
    • editors, Kluwer Academic Publishers, Norwell, MA
    • A. K. Jain, R. Bolle, and S. Pankanti, editors, Biometrics: Personal Identification in Networked society, Kluwer Academic Publishers, Norwell, MA, 1999.
    • (1999)
    • Jain, A.K.1    Bolle, R.2    Pankanti, S.3
  • 5
    • 0742302036 scopus 로고    scopus 로고
    • Biometric recognition: Security and privacy concerns
    • S. Prabhakar, S. Pankanti, and A. K. Jain, Biometric recognition: Security and privacy concerns, IEEE Secur. Privacy 1:33-42, 2003.
    • (2003) IEEE Secur. Privacy , vol.1 , pp. 33-42
    • Prabhakar, S.1    Pankanti, S.2    Jain, A.K.3
  • 7
    • 33645158216 scopus 로고    scopus 로고
    • Biometric security concerns
    • U. K. Biometric Working Group, technical report, CESG, September
    • U. K. Biometric Working Group, Biometric security concerns, technical report, CESG, September 2003.
    • (2003)
  • 8
    • 1342275940 scopus 로고    scopus 로고
    • Handbook of Fingerprint Recognition
    • Springer-Verlag, Berlin
    • D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, Springer-Verlag, Berlin, 2003.
    • (2003)
    • Maltoni, D.1    Maio, D.2    Jain, A.K.3    Prabhakar, S.4
  • 9
    • 8844228915 scopus 로고    scopus 로고
    • Attacks on biometric systems: A case study in fingerprints
    • Security, Seganography and Watermarking of Multimedia Contents VI, San Jose, CA, January 18-22
    • U. Uludag, and A. K. Jain, Attacks on biometric systems: A case study in fingerprints, in Proceedings SPIE-EI 200, Security, Seganography and Watermarking of Multimedia Contents VI, San Jose, CA, January 18-22, 2004, pp. 622-633.
    • (2004) Proceedings SPIE-EI 200 , pp. 622-633
    • Uludag, U.1    Jain, A.K.2
  • 10
    • 84863702244 scopus 로고    scopus 로고
    • Biometric template security: challenges and solutions
    • Proceedings of the 13th European Signal Processing Conference (EUSIPCO 2005), Antalya, Turkey, September
    • A. K. Jain, A. Ross, and U. Uludag, Biometric template security: challenges and solutions, in Proceedings of the 13th European Signal Processing Conference (EUSIPCO 2005), Antalya, Turkey, September 2005.
    • (2005)
    • Jain, A.K.1    Ross, A.2    Uludag, U.3
  • 11
    • 33846817469 scopus 로고    scopus 로고
    • Biometric attack vectors and defences
    • C. Roberts., Biometric attack vectors and defences, Comput. Secur. 26(1):14-25, 2006.
    • (2006) Comput. Secur. , vol.26 , Issue.1 , pp. 14-25
    • Roberts, C.1
  • 13
    • 33744742101 scopus 로고    scopus 로고
    • Can images be regenerated from biometric templates?
    • Proceedings of the Biometrics Consortium Conference
    • A. Adler, Can images be regenerated from biometric templates?, Proceedings of the Biometrics Consortium Conference, 2003.
    • (2003)
    • Adler, A.1
  • 14
    • 37849008271 scopus 로고    scopus 로고
    • Bayesian hill-climbing attack and its application to signature verification
    • J. Galbally, J. Fierrez, and J. Ortega Garcia, Bayesian hill-climbing attack and its application to signature verification, Lecture Notes Comput. Sci. 4642:386-395, 2007.
    • (2007) Lecture Notes Comput. Sci. , vol.4642 , pp. 386-395
    • Galbally, J.1    Fierrez, J.2    Ortega Garcia, J.3
  • 15
    • 26444470872 scopus 로고    scopus 로고
    • Towards reconstructing fingerprints from minutiae points
    • Proceedings of SPIE, Orlando, FL, March
    • A. Ross, J. Shah, and A. K. Jain, Towards reconstructing fingerprints from minutiae points, in Proceedings of SPIE, Biometric Technology for Human Identification II, Vol. 5779, Orlando, FL, March 2005, pp. 68-80.
    • (2005) Biometric Technology for Human Identification II , vol.5779 , pp. 68-80
    • Ross, A.1    Shah, J.2    Jain, A.K.3
  • 16
    • 84944878354 scopus 로고    scopus 로고
    • Handbook of Applied Cryptography
    • CRC Press, Boca Raton, FL
    • A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, FL, 1996.
    • (1996)
    • Menezes, A.1    Van Oorschot, P.2    Vanstone, S.3
  • 17
    • 84889611391 scopus 로고    scopus 로고
    • EU project Signal Processing in the Encrypted Domain, funded in the framework of the IST Programme FET
    • http://www.speedproject.eu/, EU project Signal Processing in the Encrypted Domain, funded in the framework of the IST Programme FET.
  • 20
  • 21
    • 12344259813 scopus 로고    scopus 로고
    • Biohashing: Two factor authentication featuring fingerprint data and tokenised random number
    • A. B. J. Teoh, D. C. L. Ngo, and A. Goh., Biohashing: Two factor authentication featuring fingerprint data and tokenised random number, Pattern Recognit. 37(11):2245-2255, 2004.
    • (2004) Pattern Recognit. , vol.37 , Issue.11 , pp. 2245-2255
    • Teoh, A.B.J.1    Ngo, D.C.L.2    Goh, A.3
  • 22
    • 33645837429 scopus 로고    scopus 로고
    • High security iris verification system based on random secret integration Comput
    • C. S. Chin, A. B. J. Teoh, and D. C. L. Ngo, High security iris verification system based on random secret integration Comput. Vis. Image Understanding 102(2):169-177, 2006.
    • (2006) Vis. Image Understanding , vol.102 , Issue.2 , pp. 169-177
    • Chin, C.S.1    Teoh, A.B.J.2    Ngo, D.C.L.3
  • 23
    • 33947177191 scopus 로고    scopus 로고
    • Random multispace quantization as an analytic mechanism for BioHashing of biometric and random identity inputs
    • A. B. J. Teoh, D. C. L. Ngo, and A. Goh., Random multispace quantization as an analytic mechanism for BioHashing of biometric and random identity inputs, IEEE Trans. Pattern Anal. Mach. Intell. 28(12):1892-1901, 2006.
    • (2006) IEEE Trans. Pattern Anal. Mach. Intell. , vol.28 , Issue.12 , pp. 1892-1901
    • Teoh, A.B.J.1    Ngo, D.C.L.2    Goh, A.3
  • 24
    • 37849030222 scopus 로고    scopus 로고
    • Probabilistic random projections and speaker verification
    • C. L. Ying, and A. B. J. Teoh, Probabilistic random projections and speaker verification, Lecture Notes Comput. Sci. 4662:445-454, 2007.
    • (2007) Lecture Notes Comput. Sci. , vol.4662 , pp. 445-454
    • Ying, C.L.1    Teoh, A.B.J.2
  • 25
    • 84889623220 scopus 로고    scopus 로고
    • Face based biometric authentication with changeable and privacy preservable templates
    • in IEEE Biometric Symposium, September Baltimore
    • Y. Wang, and K. N. Plataniotis, Face based biometric authentication with changeable and privacy preservable templates, in IEEE Biometric Symposium, September Baltimore, 2007.
    • (2007)
    • Wang, Y.1    Plataniotis, K.N.2
  • 28
    • 37849021056 scopus 로고    scopus 로고
    • Changeable face representations suitable for human recognition
    • H. Lee, C. Lee, J. Y. Choi, J. Kim, and J. Kim, Changeable face representations suitable for human recognition, Lecture Notes Comput. Sci. 4662:557-565, 2007.
    • (2007) Lecture Notes Comput. Sci. , vol.4662 , pp. 557-565
    • Lee, H.1    Lee, C.2    Choi, J.Y.3    Kim, J.4    Kim, J.5
  • 29
    • 51849116466 scopus 로고    scopus 로고
    • Template protection for HMM-based on-line signature authentication
    • Workshop on Biometrics, Anchorage, Alaska, 23-28 June
    • E. Maiorana, M. Martinez-Diaz, P. Campisi, J. Ortega-Garcia, and A. Neri, Template protection for HMM-based on-line signature authentication, CVPR Conference, Workshop on Biometrics, Anchorage, Alaska, 23-28 June 2008.
    • (2008) CVPR Conference
    • Maiorana, E.1    Martinez-Diaz, M.2    Campisi, P.3    Ortega-Garcia, J.4    Neri, A.5
  • 31
    • 10044222391 scopus 로고    scopus 로고
    • Biometric cryptosystems: issues and challenges
    • U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain., Biometric cryptosystems: issues and challenges, Proc. IEEE 92(6):948-960, 2004.
    • (2004) Proc. IEEE , vol.92 , Issue.6 , pp. 948-960
    • Uludag, U.1    Pankanti, S.2    Prabhakar, S.3    Jain, A.K.4
  • 32
    • 36348986198 scopus 로고    scopus 로고
    • Fingerprint-based fuzzy vault: Implementation and performance
    • K. Nandakumar, A. K. Jain, and S. Pankati., Fingerprint-based fuzzy vault: Implementation and performance, IEEE Trans. Inf. Forens. Secur. 2(4):744-757, 2007.
    • (2007) IEEE Trans. Inf. Forens. Secur. , vol.2 , Issue.4 , pp. 744-757
    • Nandakumar, K.1    Jain, A.K.2    Pankati, S.3
  • 33
    • 0033281339 scopus 로고    scopus 로고
    • A fuzzy commitment scheme
    • 6th ACM Conference on Computer and Communication Security
    • A. Juels, and M. Wattenberg, A fuzzy commitment scheme, 6th ACM Conference on Computer and Communication Security, 1999, pp. 28-36.
    • (1999) , pp. 28-36
    • Juels, A.1    Wattenberg, M.2
  • 34
    • 30844458593 scopus 로고    scopus 로고
    • A fuzzy vault scheme
    • A. Juels, and M. Sudan., A fuzzy vault scheme, Des. Codes Cryptogr. 38(2):237-257, 2006.
    • (2006) Des. Codes Cryptogr. , vol.38 , Issue.2 , pp. 237-257
    • Juels, A.1    Sudan, M.2
  • 35
    • 8844234621 scopus 로고    scopus 로고
    • On the relation of error correction and cryptography to an offline biometric based identification scheme
    • in Proceedings of WCC99,Workshop on Coding and Cryptography
    • G. Davida, Y. Frankel, B. J. Matt, and R. Peralta, On the relation of error correction and cryptography to an offline biometric based identification scheme, in Proceedings of WCC99,Workshop on Coding and Cryptography, 1999.
    • (1999)
    • Davida, G.1    Frankel, Y.2    Matt, B.J.3    Peralta, R.4
  • 37
    • 84889613925 scopus 로고    scopus 로고
    • Practical biometric template protection system based on reliable components
    • in AVBPA Proceedings
    • P. Tuyls, A. Akkermans, T. Kevenaar, G. J. Schrijen, A. Bazen, and R. Veldhuis, Practical biometric template protection system based on reliable components, in AVBPA Proceedings, 2005.
    • (2005)
    • Tuyls, P.1    Akkermans, A.2    Kevenaar, T.3    Schrijen, G.J.4    Bazen, A.5    Veldhuis, R.6
  • 43
    • 27644521507 scopus 로고    scopus 로고
    • Automatic secure fingerprint verification system based on fuzzy vault scheme
    • S. Yang, and I. Verbauwhede, Automatic secure fingerprint verification system based on fuzzy vault scheme, in Proceedings of the ICASSP, 2005, pp. 609-612.
    • (2005) Proceedings of the ICASSP , pp. 609-612
    • Yang, S.1    Verbauwhede, I.2
  • 44
    • 26444525625 scopus 로고    scopus 로고
    • Fuzzy Vault for Fingerprints
    • Audio and Video Based Biometric Person Authentication
    • U. Uludag, S. Pankati, and A. K. Jain, Fuzzy Vault for Fingerprints, in Proceedings, Audio and Video Based Biometric Person Authentication, 2005, pp. 310-319.
    • (2005) Proceedings , pp. 310-319
    • Uludag, U.1    Pankati, S.2    Jain, A.K.3
  • 47
    • 33845514726 scopus 로고    scopus 로고
    • Protecting face biometric data on smartcard with reed-solomon code
    • in Proceedings on Computer Vision and Pattern Recognition Workshop
    • Y. Cheng Feng and P. C Yuen, Protecting face biometric data on smartcard with reed-solomon code, in Proceedings on Computer Vision and Pattern Recognition Workshop, 2006.
    • (2006)
    • Cheng Feng, Y.1    Yuen, C.P.2
  • 48
    • 38149105155 scopus 로고    scopus 로고
    • Fuzzy face vault: How to implement fuzzy vault with weighted features
    • D. H. Nyang, and K. H. Lee, Fuzzy face vault: How to implement fuzzy vault with weighted features, Lecture Notes Comput. Sci. 4554:491-496, 2007.
    • (2007) Lecture Notes Comput. Sci. , vol.4554 , pp. 491-496
    • Nyang, D.H.1    Lee, K.H.2
  • 50
    • 0034829626 scopus 로고    scopus 로고
    • Cryptographic Key generation from voice
    • in Proceedings of the 2001 IEEE Symposium on Security and Privacy
    • F. Monrose, M. K. Reiter, Q. Li, and S. Wetzel, Cryptographic Key generation from voice, in Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001.
    • (2001)
    • Monrose, F.1    Reiter, M.K.2    Li, Q.3    Wetzel, S.4
  • 54
    • 0036037919 scopus 로고    scopus 로고
    • Private key generation from on-line handwritten signatures
    • H. Feng, and C. W. Chan, Private key generation from on-line handwritten signatures, Inf. Manage. Comput. Secur. 159-164, 2002.
    • (2002) Inf. Manage. Comput. Secur , pp. 159-164
    • Feng, H.1    Chan, C.W.2
  • 56
    • 37849025832 scopus 로고    scopus 로고
    • Biometric hashing based on genetic selection and its application to on-line signatures
    • M. R. Freire, J. Fierrez, J. Galbally, and J. Ortega-Garcia, Biometric hashing based on genetic selection and its application to on-line signatures, Lecture Notes Comput. Sci. 4642:1134-1143, 2007.
    • (2007) Lecture Notes Comput. Sci. , vol.4642 , pp. 1134-1143
    • Freire, M.R.1    Fierrez, J.2    Galbally, J.3    Ortega-Garcia, J.4
  • 57
    • 80051893505 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • in Advances in Cryptology-Eurocrypt Proceedings
    • Y. Dodis, L. Reyzina, and A. Smith, Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, in Advances in Cryptology-Eurocrypt Proceedings, 2004.
    • (2004)
    • Dodis, Y.1    Reyzina, L.2    Smith, A.3
  • 58
    • 34548074162 scopus 로고    scopus 로고
    • Protecting biometric templates with sketch: Theory and practice
    • Y. Sutcu, Q. Lia, and N. Memon., Protecting biometric templates with sketch: Theory and practice, IEEE Trans. Inf. Forens. Secur. 2(3):503-512, 2007.
    • (2007) IEEE Trans. Inf. Forens. Secur. , vol.2 , Issue.3 , pp. 503-512
    • Sutcu, Y.1    Lia, Q.2    Memon, N.3
  • 59
    • 53349159971 scopus 로고    scopus 로고
    • Digital Watermarking and Steganography
    • 2nd edition, Morgan Kaufmann, San Francisco
    • I. Cox, M. Miller, J. Bloom, M. Miller, and J. Fridrich, Digital Watermarking and Steganography, 2nd edition, Morgan Kaufmann, San Francisco, 2007.
    • (2007)
    • Cox, I.1    Miller, M.2    Bloom, J.3    Miller, M.4    Fridrich, J.5
  • 60
    • 13244263593 scopus 로고    scopus 로고
    • Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications
    • Marcel Dekker, New York
    • M. Barni, and F. Bartolini, Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications, Marcel Dekker, New York, 2004.
    • (2004)
    • Barni, M.1    Bartolini, F.2
  • 63
    • 0033601655 scopus 로고    scopus 로고
    • Verification watermarks on fingerprint recognition and retrieval
    • S. Pankanti, and M. M. Yeung, Verification watermarks on fingerprint recognition and retrieval, Proc. SPIE 3657:66-78, 1999.
    • (1999) Proc. SPIE , vol.3657 , pp. 66-78
    • Pankanti, S.1    Yeung, M.M.2
  • 64
    • 33751571930 scopus 로고    scopus 로고
    • Hiding a face in a fingerprint image
    • in International Conference on Pattern Recognition
    • A. K. Jain, U. Uludag, and R. L. Hsu, Hiding a face in a fingerprint image, in International Conference on Pattern Recognition, 2002.
    • (2002)
    • Jain, A.K.1    Uludag, U.2    Hsu, R.L.3
  • 65
    • 15744406086 scopus 로고    scopus 로고
    • Digital watermarking based secure multimodal biometric system
    • Man and Cybernetics
    • M. Vatsa, R. Singh, P. Mitra, and A. Noore, Digital watermarking based secure multimodal biometric system, in IEEE Intemational Conference on Systems, Man and Cybernetics, 2004, pp. 2983-2987.
    • (2004) IEEE Intemational Conference on Systems , pp. 2983-2987
    • Vatsa, M.1    Singh, R.2    Mitra, P.3    Noore, A.4
  • 66
    • 36049017629 scopus 로고    scopus 로고
    • Data hiding for multimodal biometric recognition
    • in International Symposium on Circuits and Systems (ISCAS)
    • A. Giannoula, and D. Hatzinakos, Data hiding for multimodal biometric recognition, in International Symposium on Circuits and Systems (ISCAS), 2004.
    • (2004)
    • Giannoula, A.1    Hatzinakos, D.2
  • 69
    • 50249183581 scopus 로고    scopus 로고
    • Biometric signature authentication using radon transform-based watermarking techniques
    • Baltimore, September
    • E. Maiorana, P. Campisi, and A. Neri, Biometric signature authentication using radon transform-based watermarking techniques, in IEEE Biometric Symposium, Baltimore, September 2007.
    • (2007) IEEE Biometric Symposium
    • Maiorana, E.1    Campisi, P.2    Neri, A.3
  • 70
    • 35048820669 scopus 로고    scopus 로고
    • On the integration of watermarks and cryptography
    • S. Katzenbeisser, On the integration of watermarks and cryptography, Lecture Notes Comput. Sci. 2939:50-60, 2004.
    • (2004) Lecture Notes Comput. Sci. , vol.2939 , pp. 50-60
    • Katzenbeisser, S.1
  • 72
    • 0024861588 scopus 로고
    • Automatic signature verification and writer identification: The state of the art
    • R. Plamondon, and G. Lorette., Automatic signature verification and writer identification: The state of the art, Pattern Recognit. 22(2):107-131, 1989.
    • (1989) Pattern Recognit. , vol.22 , Issue.2 , pp. 107-131
    • Plamondon, R.1    Lorette, G.2
  • 73
    • 0002377851 scopus 로고
    • Automatic signature verification: The state of the art 1989-1993
    • F. Leclerc, and R. Plamondon., Automatic signature verification: The state of the art 1989-1993, IJPRAI 8(3):643-660, 1994.
    • (1994) IJPRAI , vol.8 , Issue.3 , pp. 643-660
    • Leclerc, F.1    Plamondon, R.2
  • 74
    • 0033640745 scopus 로고    scopus 로고
    • On-line and off-line handwriting recognition: A comprehensive survey
    • R. Plamondon, and S. N. Srihari., On-line and off-line handwriting recognition: A comprehensive survey, IEEE Trans. Pattern Anal. Mach. Intelli. 22(1):63-84, 2000.
    • (2000) IEEE Trans. Pattern Anal. Mach. Intelli. , vol.22 , Issue.1 , pp. 63-84
    • Plamondon, R.1    Srihari, S.N.2
  • 77
    • 25844443892 scopus 로고    scopus 로고
    • A comparative study on the consistency of features in on-line signature verification
    • H. Lei, and V. Govindaraju, A comparative study on the consistency of features in on-line signature verification, Pattern Recognit. Lett. 15:2483-2489, 2005.
    • (2005) Pattern Recognit. Lett. , vol.15 , pp. 2483-2489
    • Lei, H.1    Govindaraju, V.2
  • 79
    • 13244253849 scopus 로고    scopus 로고
    • On-line signature verification using temporal shift estimated by the phase of Gabor filter
    • Y. Jonghyon, L. Chulhan, and K. Jaihie, On-line signature verification using temporal shift estimated by the phase of Gabor filter, IEEE Trans. Signal Processing 53(2, Part 2):776-783, 2005.
    • (2005) IEEE Trans. Signal Processing , vol.53 , Issue.2 PART 2 , pp. 776-783
    • Jonghyon, Y.1    Chulhan, L.2    Jaihie, K.3
  • 80
    • 33750578741 scopus 로고    scopus 로고
    • On-line signature recognition based onVQ-DTW
    • M. Faundez-Zanuy, On-line signature recognition based onVQ-DTW, Pattern Recognit. 40:981-992, 2007.
    • (2007) Pattern Recognit. , vol.40 , pp. 981-992
    • Faundez-Zanuy, M.1
  • 81
    • 34548083749 scopus 로고    scopus 로고
    • Warping-based off-line signature recognition
    • G. Agam, and S. Suresh, Warping-based off-line signature recognition, IEEE Trans. Info. Forens. Secur. 2(3, Part 1):430-437, 2007.
    • (2007) IEEE Trans. Info. Forens. Secur , vol.2 , Issue.3 PART 1 , pp. 430-437
    • Agam, G.1    Suresh, S.2
  • 82
    • 25844484205 scopus 로고    scopus 로고
    • Identity authentication using improved on-line signature verification method
    • A. Kholmatov and B.Yanikoglu., Identity authentication using improved on-line signature verification method, Pattern Recognit. Lett. 26(15):2400-2408, 2005.
    • (2005) Pattern Recognit. Lett. , vol.26 , Issue.15 , pp. 2400-2408
    • Kholmatov, A.1    Yanikoglu, B.2
  • 83
    • 0029246903 scopus 로고
    • Application of hidden markov models for signature verification
    • L. Yang, B. W. Widjaja, and R. Prasad., Application of hidden markov models for signature verification, Pattern Recognit. 28(2):161-170, 1995.
    • (1995) Pattern Recognit. , vol.28 , Issue.2 , pp. 161-170
    • Yang, L.1    Widjaja, B.W.2    Prasad, R.3
  • 84
    • 35148827336 scopus 로고    scopus 로고
    • HMM-based on-line signature verification: Feature extraction and signature modeling
    • J. Fierrez, J. Ortega-Garcia, D. Ramos, and J. Gonzalez-Rodriguez., HMM-based on-line signature verification: Feature extraction and signature modeling, Pattern Recognit. Lett. 28(16):2325-2334, 2007.
    • (2007) Pattern Recognit. Lett. , vol.28 , Issue.16 , pp. 2325-2334
    • Fierrez, J.1    Ortega-Garcia, J.2    Ramos, D.3    Gonzalez-Rodriguez, J.4
  • 86
    • 0036885177 scopus 로고    scopus 로고
    • Antiforgery: A novel pseudo-outer product based fuzzy neural network driver signature verification system
    • C. Quek, and R. W. Zhou, Antiforgery: A novel pseudo-outer product based fuzzy neural network driver signature verification system, Pattern Recognit. 23:1795-1816, 2002.
    • (2002) Pattern Recognit. , vol.23 , pp. 1795-1816
    • Quek, C.1    Zhou, R.W.2
  • 87
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy of biometric-based authentication systems
    • N. K. Ratha, J. H. Connell, and R. Bolle., Enhancing security and privacy of biometric-based authentication systems, IBM Systems J. 40(3):614-634, 2001.
    • (2001) IBM Systems J. , vol.40 , Issue.3 , pp. 614-634
    • Ratha, N.K.1    Connell, J.H.2    Bolle, R.3
  • 89
    • 0008722464 scopus 로고
    • Introduction to Error-Correcting Codes
    • Artech House, Boston
    • M. Purser, Introduction to Error-Correcting Codes, Artech House, Boston, 1995.
    • (1995)
    • Purser, M.1
  • 90
    • 84875595066 scopus 로고
    • Federal Information Processing (FIP)
    • Standards Publication 180-1, Security Hash Standard
    • Federal Information Processing (FIP) Standards Publication 180-1, Security Hash Standard, http://www.itl.nist.gov/fipspubs/fip180-1.htm, 1995.
    • (1995)
  • 92
    • 33745165448 scopus 로고    scopus 로고
    • Finding Collisions in the Full SHA-1
    • CRYPTO
    • X. Wang, Y. L. Yin, and H. Yu, Finding Collisions in the Full SHA-1, CRYPTO, 2005.
    • (2005)
    • Wang, X.1    Yin, Y.L.2    Yu, H.3
  • 93
    • 38049183978 scopus 로고    scopus 로고
    • Finding SHA-1 characteristics: General results and applications
    • Springer, Berlin
    • C. De Cannière, and C. Rechberger, Finding SHA-1 characteristics: General results and applications, in Advances in Cryptology, ASIACRYPT, Vol. 4284, Springer, Berlin, 2006.
    • (2006) Advances in Cryptology, ASIACRYPT , vol.4284
    • De Cannière, C.1    Rechberger, C.2
  • 94
    • 33744729468 scopus 로고    scopus 로고
    • Handbook of Multibiometrics
    • Springer, USA
    • A. A. Ross, K. Nandakumar, and A. K. Jain, Handbook of Multibiometrics, Springer 2006, USA.
    • (2006)
    • Ross, A.A.1    Nandakumar, K.2    Jain, A.K.3
  • 97
    • 0035333687 scopus 로고    scopus 로고
    • Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
    • B. Chen, and G. Wornell., Quantization index modulation: A class of provably good methods for digital watermarking and information embedding, IEEE Trans. Info. Theory 47(4):1423-1443, 2001.
    • (2001) IEEE Trans. Info. Theory , vol.47 , Issue.4 , pp. 1423-1443
    • Chen, B.1    Wornell, G.2
  • 98
    • 0003633044 scopus 로고
    • The Radon Transform and Some of Its Applications
    • John Wiley & Sons, New York
    • S. R. Deans, The Radon Transform and Some of Its Applications, John Wiley & Sons, New York, 1983.
    • (1983)
    • Deans, S.R.1
  • 99
    • 0037239595 scopus 로고    scopus 로고
    • The finite ridgelet transform for image representation
    • M. N. Do, and M. Vetterli., The finite ridgelet transform for image representation, IEEE Trans. Image Processing 12(1):16-28, 2003.
    • (2003) IEEE Trans. Image Processing , vol.12 , Issue.1 , pp. 16-28
    • Do, M.N.1    Vetterli, M.2
  • 101
    • 6344294771 scopus 로고    scopus 로고
    • Perceptual digital watermark of images using ridgelet transform
    • in Third International Conference on Machine Learning and Cybernetics, Shanghai
    • L. Mao, H.-Z. Wu, Z.-H. Wei, and Y. Bao, Perceptual digital watermark of images using ridgelet transform, in Third International Conference on Machine Learning and Cybernetics, Shanghai, 2004.
    • (2004)
    • Mao, L.1    Wu, H.-Z.2    Wei, Z.-H.3    Bao, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.