-
2
-
-
10044297649
-
Guide to Biometrics
-
Springer, New York
-
R. M. Bolle, J. H. Connell, S. Pankati, N. K. Ratha, and A.W. Senior, Guide to Biometrics, Springer, New York, 2004.
-
(2004)
-
-
Bolle, R.M.1
Connell, J.H.2
Pankati, S.3
Ratha, N.K.4
Senior, A.W.5
-
3
-
-
84953586760
-
Human identification in information systems: Management challenges and public policy issues
-
R. Clarke., Human identification in information systems: Management challenges and public policy issues, Inf. Technol. People 7(4):6-37, 1994.
-
(1994)
Inf. Technol. People
, vol.7
, Issue.4
, pp. 6-37
-
-
Clarke, R.1
-
4
-
-
0003987134
-
Biometrics: Personal Identification in Networked society
-
editors, Kluwer Academic Publishers, Norwell, MA
-
A. K. Jain, R. Bolle, and S. Pankanti, editors, Biometrics: Personal Identification in Networked society, Kluwer Academic Publishers, Norwell, MA, 1999.
-
(1999)
-
-
Jain, A.K.1
Bolle, R.2
Pankanti, S.3
-
5
-
-
0742302036
-
Biometric recognition: Security and privacy concerns
-
S. Prabhakar, S. Pankanti, and A. K. Jain, Biometric recognition: Security and privacy concerns, IEEE Secur. Privacy 1:33-42, 2003.
-
(2003)
IEEE Secur. Privacy
, vol.1
, pp. 33-42
-
-
Prabhakar, S.1
Pankanti, S.2
Jain, A.K.3
-
7
-
-
33645158216
-
Biometric security concerns
-
U. K. Biometric Working Group, technical report, CESG, September
-
U. K. Biometric Working Group, Biometric security concerns, technical report, CESG, September 2003.
-
(2003)
-
-
-
8
-
-
1342275940
-
Handbook of Fingerprint Recognition
-
Springer-Verlag, Berlin
-
D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, Springer-Verlag, Berlin, 2003.
-
(2003)
-
-
Maltoni, D.1
Maio, D.2
Jain, A.K.3
Prabhakar, S.4
-
9
-
-
8844228915
-
Attacks on biometric systems: A case study in fingerprints
-
Security, Seganography and Watermarking of Multimedia Contents VI, San Jose, CA, January 18-22
-
U. Uludag, and A. K. Jain, Attacks on biometric systems: A case study in fingerprints, in Proceedings SPIE-EI 200, Security, Seganography and Watermarking of Multimedia Contents VI, San Jose, CA, January 18-22, 2004, pp. 622-633.
-
(2004)
Proceedings SPIE-EI 200
, pp. 622-633
-
-
Uludag, U.1
Jain, A.K.2
-
10
-
-
84863702244
-
Biometric template security: challenges and solutions
-
Proceedings of the 13th European Signal Processing Conference (EUSIPCO 2005), Antalya, Turkey, September
-
A. K. Jain, A. Ross, and U. Uludag, Biometric template security: challenges and solutions, in Proceedings of the 13th European Signal Processing Conference (EUSIPCO 2005), Antalya, Turkey, September 2005.
-
(2005)
-
-
Jain, A.K.1
Ross, A.2
Uludag, U.3
-
11
-
-
33846817469
-
Biometric attack vectors and defences
-
C. Roberts., Biometric attack vectors and defences, Comput. Secur. 26(1):14-25, 2006.
-
(2006)
Comput. Secur.
, vol.26
, Issue.1
, pp. 14-25
-
-
Roberts, C.1
-
12
-
-
82055208335
-
An analysis of minutiae matching strength
-
N. Ratha, J. H. Connell, and R. M. Bolle, An analysis of minutiae matching strength, in Proceedings of the International Conference on Audio and Video-Based Biometric Person Authentication, 2001, pp. 223-228.
-
(2001)
Proceedings of the International Conference on Audio and Video-Based Biometric Person Authentication
, pp. 223-228
-
-
Ratha, N.1
Connell, J.H.2
Bolle, R.M.3
-
13
-
-
33744742101
-
Can images be regenerated from biometric templates?
-
Proceedings of the Biometrics Consortium Conference
-
A. Adler, Can images be regenerated from biometric templates?, Proceedings of the Biometrics Consortium Conference, 2003.
-
(2003)
-
-
Adler, A.1
-
14
-
-
37849008271
-
Bayesian hill-climbing attack and its application to signature verification
-
J. Galbally, J. Fierrez, and J. Ortega Garcia, Bayesian hill-climbing attack and its application to signature verification, Lecture Notes Comput. Sci. 4642:386-395, 2007.
-
(2007)
Lecture Notes Comput. Sci.
, vol.4642
, pp. 386-395
-
-
Galbally, J.1
Fierrez, J.2
Ortega Garcia, J.3
-
15
-
-
26444470872
-
Towards reconstructing fingerprints from minutiae points
-
Proceedings of SPIE, Orlando, FL, March
-
A. Ross, J. Shah, and A. K. Jain, Towards reconstructing fingerprints from minutiae points, in Proceedings of SPIE, Biometric Technology for Human Identification II, Vol. 5779, Orlando, FL, March 2005, pp. 68-80.
-
(2005)
Biometric Technology for Human Identification II
, vol.5779
, pp. 68-80
-
-
Ross, A.1
Shah, J.2
Jain, A.K.3
-
16
-
-
84944878354
-
Handbook of Applied Cryptography
-
CRC Press, Boca Raton, FL
-
A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, FL, 1996.
-
(1996)
-
-
Menezes, A.1
Van Oorschot, P.2
Vanstone, S.3
-
17
-
-
84889611391
-
-
EU project Signal Processing in the Encrypted Domain, funded in the framework of the IST Programme FET
-
http://www.speedproject.eu/, EU project Signal Processing in the Encrypted Domain, funded in the framework of the IST Programme FET.
-
-
-
-
18
-
-
43949118055
-
Signal processing in the encrypted domain
-
editors, Special Issue, October
-
A. Piva, and S. Katzenbeisser, editors, Signal processing in the encrypted domain, EURASIP Journal on Information Security, Special Issue, October 2007.
-
(2007)
EURASIP Journal on Information Security
-
-
Piva, A.1
Katzenbeisser, S.2
-
19
-
-
10044284550
-
Cancelable biometric filters for face recognition
-
M. Savvides, B. V. K. Vijaya Kumar, and P. K. Khosla, Cancelable biometric filters for face recognition, in Proceedings of the International Conference on Pattern Recognition, 2004, pp. 922-925.
-
(2004)
Proceedings of the International Conference on Pattern Recognition
, pp. 922-925
-
-
Savvides, M.1
Vijaya Kumar, B.V.K.2
Khosla, P.K.3
-
20
-
-
9944223229
-
PalmHashing: A novel approach for cancelable biometrics
-
T. Connie, A. B. J. Teoh, M. K. O. Goh, and D. C. L. Ngo., PalmHashing: A novel approach for cancelable biometrics, Inf. Processing Lett. 93(1):1-5, 2005.
-
(2005)
Inf. Processing Lett.
, vol.93
, Issue.1
, pp. 1-5
-
-
Connie, T.1
Teoh, A.B.J.2
Goh, M.K.O.3
Ngo, D.C.L.4
-
21
-
-
12344259813
-
Biohashing: Two factor authentication featuring fingerprint data and tokenised random number
-
A. B. J. Teoh, D. C. L. Ngo, and A. Goh., Biohashing: Two factor authentication featuring fingerprint data and tokenised random number, Pattern Recognit. 37(11):2245-2255, 2004.
-
(2004)
Pattern Recognit.
, vol.37
, Issue.11
, pp. 2245-2255
-
-
Teoh, A.B.J.1
Ngo, D.C.L.2
Goh, A.3
-
22
-
-
33645837429
-
High security iris verification system based on random secret integration Comput
-
C. S. Chin, A. B. J. Teoh, and D. C. L. Ngo, High security iris verification system based on random secret integration Comput. Vis. Image Understanding 102(2):169-177, 2006.
-
(2006)
Vis. Image Understanding
, vol.102
, Issue.2
, pp. 169-177
-
-
Chin, C.S.1
Teoh, A.B.J.2
Ngo, D.C.L.3
-
23
-
-
33947177191
-
Random multispace quantization as an analytic mechanism for BioHashing of biometric and random identity inputs
-
A. B. J. Teoh, D. C. L. Ngo, and A. Goh., Random multispace quantization as an analytic mechanism for BioHashing of biometric and random identity inputs, IEEE Trans. Pattern Anal. Mach. Intell. 28(12):1892-1901, 2006.
-
(2006)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.28
, Issue.12
, pp. 1892-1901
-
-
Teoh, A.B.J.1
Ngo, D.C.L.2
Goh, A.3
-
24
-
-
37849030222
-
Probabilistic random projections and speaker verification
-
C. L. Ying, and A. B. J. Teoh, Probabilistic random projections and speaker verification, Lecture Notes Comput. Sci. 4662:445-454, 2007.
-
(2007)
Lecture Notes Comput. Sci.
, vol.4662
, pp. 445-454
-
-
Ying, C.L.1
Teoh, A.B.J.2
-
25
-
-
84889623220
-
Face based biometric authentication with changeable and privacy preservable templates
-
in IEEE Biometric Symposium, September Baltimore
-
Y. Wang, and K. N. Plataniotis, Face based biometric authentication with changeable and privacy preservable templates, in IEEE Biometric Symposium, September Baltimore, 2007.
-
(2007)
-
-
Wang, Y.1
Plataniotis, K.N.2
-
26
-
-
0036887662
-
Biometric perils and patches
-
R. M. Bolle, J. H. Connell, and N. K. Ratha, Biometric perils and patches, Pattern Recognit. 35:2727-2738, 2002.
-
(2002)
Pattern Recognit.
, vol.35
, pp. 2727-2738
-
-
Bolle, R.M.1
Connell, J.H.2
Ratha, N.K.3
-
27
-
-
33947530278
-
Generating cancelable fingerprint templates
-
N. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle., Generating cancelable fingerprint templates, IEEE Trans. Pattern Anal. Mach. Intelli. 29(4):561-572, 2007.
-
(2007)
IEEE Trans. Pattern Anal. Mach. Intelli.
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.1
Chikkerur, S.2
Connell, J.H.3
Bolle, R.M.4
-
28
-
-
37849021056
-
Changeable face representations suitable for human recognition
-
H. Lee, C. Lee, J. Y. Choi, J. Kim, and J. Kim, Changeable face representations suitable for human recognition, Lecture Notes Comput. Sci. 4662:557-565, 2007.
-
(2007)
Lecture Notes Comput. Sci.
, vol.4662
, pp. 557-565
-
-
Lee, H.1
Lee, C.2
Choi, J.Y.3
Kim, J.4
Kim, J.5
-
29
-
-
51849116466
-
Template protection for HMM-based on-line signature authentication
-
Workshop on Biometrics, Anchorage, Alaska, 23-28 June
-
E. Maiorana, M. Martinez-Diaz, P. Campisi, J. Ortega-Garcia, and A. Neri, Template protection for HMM-based on-line signature authentication, CVPR Conference, Workshop on Biometrics, Anchorage, Alaska, 23-28 June 2008.
-
(2008)
CVPR Conference
-
-
Maiorana, E.1
Martinez-Diaz, M.2
Campisi, P.3
Ortega-Garcia, J.4
Neri, A.5
-
30
-
-
67549140582
-
Cancelable biometrics for HMM-based signature recognition
-
Washington DC, 29 September-1 October
-
E. Maiorana, P. Campisi, J. Ortega-Garcia, and A. Neri, Cancelable biometrics for HMM-based signature recognition, in IEEE Second International Conference on Biometrics: Theory, Applications and Systems (BTAS), Washington DC, 29 September-1 October 2008.
-
(2008)
IEEE Second International Conference on Biometrics: Theory, Applications and Systems (BTAS)
-
-
Maiorana, E.1
Campisi, P.2
Ortega-Garcia, J.3
Neri, A.4
-
31
-
-
10044222391
-
Biometric cryptosystems: issues and challenges
-
U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain., Biometric cryptosystems: issues and challenges, Proc. IEEE 92(6):948-960, 2004.
-
(2004)
Proc. IEEE
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
-
32
-
-
36348986198
-
Fingerprint-based fuzzy vault: Implementation and performance
-
K. Nandakumar, A. K. Jain, and S. Pankati., Fingerprint-based fuzzy vault: Implementation and performance, IEEE Trans. Inf. Forens. Secur. 2(4):744-757, 2007.
-
(2007)
IEEE Trans. Inf. Forens. Secur.
, vol.2
, Issue.4
, pp. 744-757
-
-
Nandakumar, K.1
Jain, A.K.2
Pankati, S.3
-
33
-
-
0033281339
-
A fuzzy commitment scheme
-
6th ACM Conference on Computer and Communication Security
-
A. Juels, and M. Wattenberg, A fuzzy commitment scheme, 6th ACM Conference on Computer and Communication Security, 1999, pp. 28-36.
-
(1999)
, pp. 28-36
-
-
Juels, A.1
Wattenberg, M.2
-
34
-
-
30844458593
-
A fuzzy vault scheme
-
A. Juels, and M. Sudan., A fuzzy vault scheme, Des. Codes Cryptogr. 38(2):237-257, 2006.
-
(2006)
Des. Codes Cryptogr.
, vol.38
, Issue.2
, pp. 237-257
-
-
Juels, A.1
Sudan, M.2
-
35
-
-
8844234621
-
On the relation of error correction and cryptography to an offline biometric based identification scheme
-
in Proceedings of WCC99,Workshop on Coding and Cryptography
-
G. Davida, Y. Frankel, B. J. Matt, and R. Peralta, On the relation of error correction and cryptography to an offline biometric based identification scheme, in Proceedings of WCC99,Workshop on Coding and Cryptography, 1999.
-
(1999)
-
-
Davida, G.1
Frankel, Y.2
Matt, B.J.3
Peralta, R.4
-
36
-
-
8844277754
-
Privacy protected biometric templates: Acoustic ear identification
-
P. Tuyls, E. Verbitsky, T. Ignatenko, D. Schobben, and T. H. Akkermans, Privacy protected biometric templates: Acoustic ear identification, SPIE Proc. 5404:176-182, 2004.
-
(2004)
SPIE Proc.
, vol.5404
, pp. 176-182
-
-
Tuyls, P.1
Verbitsky, E.2
Ignatenko, T.3
Schobben, D.4
Akkermans, T.H.5
-
37
-
-
84889613925
-
Practical biometric template protection system based on reliable components
-
in AVBPA Proceedings
-
P. Tuyls, A. Akkermans, T. Kevenaar, G. J. Schrijen, A. Bazen, and R. Veldhuis, Practical biometric template protection system based on reliable components, in AVBPA Proceedings, 2005.
-
(2005)
-
-
Tuyls, P.1
Akkermans, A.2
Kevenaar, T.3
Schrijen, G.J.4
Bazen, A.5
Veldhuis, R.6
-
38
-
-
33645656961
-
Face biometrics with renewable templates
-
M. Van der Veen, T. Kevenaar, G.-J. Schrijen, T. H. Akkermans, and F. Zuo, Face biometrics with renewable templates, in SPIE Proceedings on Security, Steganography, and Watermarking of Multimedia Contents, Vol. 6072, 2006.
-
(2006)
SPIE Proceedings on Security, Steganography, and Watermarking of Multimedia Contents
, vol.6072
-
-
Van Der Veen, M.1
Kevenaar, T.2
Schrijen, G.-J.3
Akkermans, T.H.4
Zuo, F.5
-
39
-
-
37849002150
-
3D face: Biometrics template protection for 3D face recognition
-
E. J. C. Kelkboom, B. Gökberk, T. A. M. Kevenaar, A. H. M. Akkermans, and M. van der Veen, 3D face: Biometrics template protection for 3D face recognition, Lecture Notes Comput. Sci. 4642:566-573, 2007.
-
(2007)
Lecture Notes Comput. Sci.
, vol.4642
, pp. 566-573
-
-
Kelkboom, E.J.C.1
Gökberk, B.2
Kevenaar, T.A.M.3
Akkermans, A.H.M.4
Van Der Veen, M.5
-
40
-
-
34548214636
-
Adaptive and distributed cryptography for signature biometrics protection
-
28 January-1 February 2007, San Jose, CA
-
P. Campisi, E. Maiorana; M. Gonzalez, and A. Neri, Adaptive and distributed cryptography for signature biometrics protection, in SPIE Proceedings on Security, Steganography, and Watermarking of Multimedia Contents IX, Vol. 6505, 28 January-1 February 2007, San Jose, CA, 2007.
-
(2007)
SPIE Proceedings on Security, Steganography, and Watermarking of Multimedia Contents IX
, vol.6505
-
-
Campisi, P.1
Maiorana2
, E.3
Gonzalez, M.4
Neri, A.5
-
41
-
-
67549130623
-
User adaptive fuzzy commitment for signature templates protection and renewability
-
January-March
-
E. Maiorana, P. Campisi, and A. Neri, User adaptive fuzzy commitment for signature templates protection and renewability, SPIE Journal of Electronic Imaging, Special Section on Biometrics: Advances in Security, Usability and Interoperability, Vol. 17. No. 1, January-March 2008.
-
(2008)
SPIE Journal of Electronic Imaging, Special Section on Biometrics: Advances in Security, Usability and Interoperability
, vol.17
, Issue.1
-
-
Maiorana, E.1
Campisi, P.2
Neri, A.3
-
42
-
-
84937704662
-
Secure smartcard-based fingerprint authentication
-
T. C. Clancy, N. Kiyavash, and D. J. Lin, Secure smartcard-based fingerprint authentication, ACM SIGMM Workshop on Biometrics Methods and Applications, 2003, pp. 45-52.
-
(2003)
ACM SIGMM Workshop on Biometrics Methods and Applications
, pp. 45-52
-
-
Clancy, T.C.1
Kiyavash, N.2
Lin, D.J.3
-
43
-
-
27644521507
-
Automatic secure fingerprint verification system based on fuzzy vault scheme
-
S. Yang, and I. Verbauwhede, Automatic secure fingerprint verification system based on fuzzy vault scheme, in Proceedings of the ICASSP, 2005, pp. 609-612.
-
(2005)
Proceedings of the ICASSP
, pp. 609-612
-
-
Yang, S.1
Verbauwhede, I.2
-
44
-
-
26444525625
-
Fuzzy Vault for Fingerprints
-
Audio and Video Based Biometric Person Authentication
-
U. Uludag, S. Pankati, and A. K. Jain, Fuzzy Vault for Fingerprints, in Proceedings, Audio and Video Based Biometric Person Authentication, 2005, pp. 310-319.
-
(2005)
Proceedings
, pp. 310-319
-
-
Uludag, U.1
Pankati, S.2
Jain, A.K.3
-
45
-
-
33747674301
-
Cryptographic key generation using handwritten signature
-
SPIE Defense and Security Symposium
-
M. Freire-Santos, J. Fierrez-Aguilara, and J. Ortega-Garcia, Cryptographic key generation using handwritten signature, in SPIE Defense and Security Symposium, Biometric Technologies for Human Identification, Vol. 6202, 2006, pp. 225-231.
-
(2006)
Biometric Technologies for Human Identification
, vol.6202
, pp. 225-231
-
-
Freire-Santos, M.1
Fierrez-Aguilara, J.2
Ortega-Garcia, J.3
-
46
-
-
51149114188
-
On the applicability of off-line signatures to the fuzzy vault construction
-
ICDAR, September
-
M. R. Freire, J. Fierrez, M. Martinez-Diaz, and J. Ortega-Garcia, On the applicability of off-line signatures to the fuzzy vault construction, in Proceedings of the International Conference on Document Analysis and Recognition, ICDAR, September 2007.
-
(2007)
Proceedings of the International Conference on Document Analysis and Recognition
-
-
Freire, M.R.1
Fierrez, J.2
Martinez-Diaz, M.3
Ortega-Garcia, J.4
-
47
-
-
33845514726
-
Protecting face biometric data on smartcard with reed-solomon code
-
in Proceedings on Computer Vision and Pattern Recognition Workshop
-
Y. Cheng Feng and P. C Yuen, Protecting face biometric data on smartcard with reed-solomon code, in Proceedings on Computer Vision and Pattern Recognition Workshop, 2006.
-
(2006)
-
-
Cheng Feng, Y.1
Yuen, C.P.2
-
48
-
-
38149105155
-
Fuzzy face vault: How to implement fuzzy vault with weighted features
-
D. H. Nyang, and K. H. Lee, Fuzzy face vault: How to implement fuzzy vault with weighted features, Lecture Notes Comput. Sci. 4554:491-496, 2007.
-
(2007)
Lecture Notes Comput. Sci.
, vol.4554
, pp. 491-496
-
-
Nyang, D.H.1
Lee, K.H.2
-
49
-
-
37849013877
-
Biometric key binding: Fuzzy vault based on iris images
-
Y. J. Lee, K. Bae, S. J. Lee, K. R. Park, and J. Kim, Biometric key binding: Fuzzy vault based on iris images, Lecture Notes on Comput. Sci. 4642:800-808, 2007.
-
(2007)
Lecture Notes on Comput. Sci.
, vol.4642
, pp. 800-808
-
-
Lee, Y.J.1
Bae, K.2
Lee, S.J.3
Park, K.R.4
Kim, J.5
-
50
-
-
0034829626
-
Cryptographic Key generation from voice
-
in Proceedings of the 2001 IEEE Symposium on Security and Privacy
-
F. Monrose, M. K. Reiter, Q. Li, and S. Wetzel, Cryptographic Key generation from voice, in Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001.
-
(2001)
-
-
Monrose, F.1
Reiter, M.K.2
Li, Q.3
Wetzel, S.4
-
52
-
-
33751585800
-
Biometric hash based on statistical features of on-line signatures
-
C.Vielhauer,R. Steinmetza, and A. Mayerhöfer, Biometric hash based on statistical features of on-line signatures, in International Conference on Pattern Recognition (ICPR), Vol. 1, 2002, pp. 123-126.
-
(2002)
International Conference on Pattern Recognition (ICPR)
, vol.1
, pp. 123-126
-
-
Vielhauer, C.1
Steinmetza, R.2
Mayerhöfer, A.3
-
54
-
-
0036037919
-
Private key generation from on-line handwritten signatures
-
H. Feng, and C. W. Chan, Private key generation from on-line handwritten signatures, Inf. Manage. Comput. Secur. 159-164, 2002.
-
(2002)
Inf. Manage. Comput. Secur
, pp. 159-164
-
-
Feng, H.1
Chan, C.W.2
-
55
-
-
33750947671
-
Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability
-
Y.W. Kuan, A. Goh, D. Ngoa, and A. Teoh, Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability, in Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies, 2005, pp. 27-32.
-
(2005)
Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies
, pp. 27-32
-
-
Kuan, Y.W.1
Goh, A.2
Ngoa, D.3
Teoh, A.4
-
56
-
-
37849025832
-
Biometric hashing based on genetic selection and its application to on-line signatures
-
M. R. Freire, J. Fierrez, J. Galbally, and J. Ortega-Garcia, Biometric hashing based on genetic selection and its application to on-line signatures, Lecture Notes Comput. Sci. 4642:1134-1143, 2007.
-
(2007)
Lecture Notes Comput. Sci.
, vol.4642
, pp. 1134-1143
-
-
Freire, M.R.1
Fierrez, J.2
Galbally, J.3
Ortega-Garcia, J.4
-
57
-
-
80051893505
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
in Advances in Cryptology-Eurocrypt Proceedings
-
Y. Dodis, L. Reyzina, and A. Smith, Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, in Advances in Cryptology-Eurocrypt Proceedings, 2004.
-
(2004)
-
-
Dodis, Y.1
Reyzina, L.2
Smith, A.3
-
58
-
-
34548074162
-
Protecting biometric templates with sketch: Theory and practice
-
Y. Sutcu, Q. Lia, and N. Memon., Protecting biometric templates with sketch: Theory and practice, IEEE Trans. Inf. Forens. Secur. 2(3):503-512, 2007.
-
(2007)
IEEE Trans. Inf. Forens. Secur.
, vol.2
, Issue.3
, pp. 503-512
-
-
Sutcu, Y.1
Lia, Q.2
Memon, N.3
-
59
-
-
53349159971
-
Digital Watermarking and Steganography
-
2nd edition, Morgan Kaufmann, San Francisco
-
I. Cox, M. Miller, J. Bloom, M. Miller, and J. Fridrich, Digital Watermarking and Steganography, 2nd edition, Morgan Kaufmann, San Francisco, 2007.
-
(2007)
-
-
Cox, I.1
Miller, M.2
Bloom, J.3
Miller, M.4
Fridrich, J.5
-
60
-
-
13244263593
-
Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications
-
Marcel Dekker, New York
-
M. Barni, and F. Bartolini, Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications, Marcel Dekker, New York, 2004.
-
(2004)
-
-
Barni, M.1
Bartolini, F.2
-
62
-
-
85019343450
-
Secure data hiding in wavelet compressed fingerprint images
-
N. K. Ratha, J. H. Connell, and R. Bolle, Secure data hiding in wavelet compressed fingerprint images, ACM Multimedia 2000 Workshops Proceedings, 2000, pp. 127-130.
-
(2000)
ACM Multimedia 2000 Workshops Proceedings
, pp. 127-130
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.3
-
63
-
-
0033601655
-
Verification watermarks on fingerprint recognition and retrieval
-
S. Pankanti, and M. M. Yeung, Verification watermarks on fingerprint recognition and retrieval, Proc. SPIE 3657:66-78, 1999.
-
(1999)
Proc. SPIE
, vol.3657
, pp. 66-78
-
-
Pankanti, S.1
Yeung, M.M.2
-
64
-
-
33751571930
-
Hiding a face in a fingerprint image
-
in International Conference on Pattern Recognition
-
A. K. Jain, U. Uludag, and R. L. Hsu, Hiding a face in a fingerprint image, in International Conference on Pattern Recognition, 2002.
-
(2002)
-
-
Jain, A.K.1
Uludag, U.2
Hsu, R.L.3
-
65
-
-
15744406086
-
Digital watermarking based secure multimodal biometric system
-
Man and Cybernetics
-
M. Vatsa, R. Singh, P. Mitra, and A. Noore, Digital watermarking based secure multimodal biometric system, in IEEE Intemational Conference on Systems, Man and Cybernetics, 2004, pp. 2983-2987.
-
(2004)
IEEE Intemational Conference on Systems
, pp. 2983-2987
-
-
Vatsa, M.1
Singh, R.2
Mitra, P.3
Noore, A.4
-
66
-
-
36049017629
-
Data hiding for multimodal biometric recognition
-
in International Symposium on Circuits and Systems (ISCAS)
-
A. Giannoula, and D. Hatzinakos, Data hiding for multimodal biometric recognition, in International Symposium on Circuits and Systems (ISCAS), 2004.
-
(2004)
-
-
Giannoula, A.1
Hatzinakos, D.2
-
67
-
-
21844450628
-
Hiding phase-quantized biometrics: A case of steganography for reduced-complexity correlation filter classifiers
-
P. Hennings, M. Savvides, and B. V. K. Vijaya Kumar, Hiding phase-quantized biometrics: A case of steganography for reduced-complexity correlation filter classifiers, in SPIE Proceeedings on Security, Steganography, and Watermarking of Multimedia Contents VII, Vol. 5681, 2005, pp. 465-473.
-
(2005)
SPIE Proceeedings on Security, Steganography, and Watermarking of Multimedia Contents VII
, vol.5681
, pp. 465-473
-
-
Hennings, P.1
Savvides, M.2
Vijaya Kumar, B.V.K.3
-
68
-
-
36049036567
-
Multi-level signature based biometric authentication using watermarking
-
Orlando, FL, 9-13 April 2007
-
E. Maiorana, P. Campisi, and A. Neri, Multi-level signature based biometric authentication using watermarking, in SPIE Defense and Security, Mobile Multimedia/Image Processing for Military and Security Applications 2007, Vol. 6579, Orlando, FL, 9-13 April 2007.
-
(2007)
SPIE Defense and Security, Mobile Multimedia/Image Processing for Military and Security Applications
, vol.6579
-
-
Maiorana, E.1
Campisi, P.2
Neri, A.3
-
69
-
-
50249183581
-
Biometric signature authentication using radon transform-based watermarking techniques
-
Baltimore, September
-
E. Maiorana, P. Campisi, and A. Neri, Biometric signature authentication using radon transform-based watermarking techniques, in IEEE Biometric Symposium, Baltimore, September 2007.
-
(2007)
IEEE Biometric Symposium
-
-
Maiorana, E.1
Campisi, P.2
Neri, A.3
-
70
-
-
35048820669
-
On the integration of watermarks and cryptography
-
S. Katzenbeisser, On the integration of watermarks and cryptography, Lecture Notes Comput. Sci. 2939:50-60, 2004.
-
(2004)
Lecture Notes Comput. Sci.
, vol.2939
, pp. 50-60
-
-
Katzenbeisser, S.1
-
71
-
-
33845420452
-
Watermarking is not cryptography
-
I. J. Cox, G. Doerr, and T. Furon, Watermarking is not cryptography, Lecture Notes Comput. Sci. 4283:1-15, 2006.
-
(2006)
Lecture Notes Comput. Sci.
, vol.4283
, pp. 1-15
-
-
Cox, I.J.1
Doerr, G.2
Furon, T.3
-
72
-
-
0024861588
-
Automatic signature verification and writer identification: The state of the art
-
R. Plamondon, and G. Lorette., Automatic signature verification and writer identification: The state of the art, Pattern Recognit. 22(2):107-131, 1989.
-
(1989)
Pattern Recognit.
, vol.22
, Issue.2
, pp. 107-131
-
-
Plamondon, R.1
Lorette, G.2
-
73
-
-
0002377851
-
Automatic signature verification: The state of the art 1989-1993
-
F. Leclerc, and R. Plamondon., Automatic signature verification: The state of the art 1989-1993, IJPRAI 8(3):643-660, 1994.
-
(1994)
IJPRAI
, vol.8
, Issue.3
, pp. 643-660
-
-
Leclerc, F.1
Plamondon, R.2
-
74
-
-
0033640745
-
On-line and off-line handwriting recognition: A comprehensive survey
-
R. Plamondon, and S. N. Srihari., On-line and off-line handwriting recognition: A comprehensive survey, IEEE Trans. Pattern Anal. Mach. Intelli. 22(1):63-84, 2000.
-
(2000)
IEEE Trans. Pattern Anal. Mach. Intelli.
, vol.22
, Issue.1
, pp. 63-84
-
-
Plamondon, R.1
Srihari, S.N.2
-
75
-
-
18044370447
-
Recent advancements in automatic signature verification
-
26-29 October
-
G. Dimauro, S. Impedovo, M. G. Lucchese, R. Modugno, and G. Pirlo, Recent advancements in automatic signature verification, in Ninth International Workshop on Frontiers in Handwriting Recognitio, 26-29 October 2004, pp. 179-184.
-
(2004)
Ninth International Workshop on Frontiers in Handwriting Recognitio
, pp. 179-184
-
-
Dimauro, G.1
Impedovo, S.2
Lucchese, M.G.3
Modugno, R.4
Pirlo, G.5
-
77
-
-
25844443892
-
A comparative study on the consistency of features in on-line signature verification
-
H. Lei, and V. Govindaraju, A comparative study on the consistency of features in on-line signature verification, Pattern Recognit. Lett. 15:2483-2489, 2005.
-
(2005)
Pattern Recognit. Lett.
, vol.15
, pp. 2483-2489
-
-
Lei, H.1
Govindaraju, V.2
-
78
-
-
0033640646
-
Statistical pattern recognition: A review
-
A. K. Jain, R. P. W. Duin, and J. Mao., Statistical pattern recognition: A review, IEEE Trans. Pattern Anal. Mach. Intell. 22(1):4-37, 2000.
-
(2000)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.22
, Issue.1
, pp. 4-37
-
-
Jain, A.K.1
Duin, R.P.W.2
Mao, J.3
-
79
-
-
13244253849
-
On-line signature verification using temporal shift estimated by the phase of Gabor filter
-
Y. Jonghyon, L. Chulhan, and K. Jaihie, On-line signature verification using temporal shift estimated by the phase of Gabor filter, IEEE Trans. Signal Processing 53(2, Part 2):776-783, 2005.
-
(2005)
IEEE Trans. Signal Processing
, vol.53
, Issue.2 PART 2
, pp. 776-783
-
-
Jonghyon, Y.1
Chulhan, L.2
Jaihie, K.3
-
80
-
-
33750578741
-
On-line signature recognition based onVQ-DTW
-
M. Faundez-Zanuy, On-line signature recognition based onVQ-DTW, Pattern Recognit. 40:981-992, 2007.
-
(2007)
Pattern Recognit.
, vol.40
, pp. 981-992
-
-
Faundez-Zanuy, M.1
-
81
-
-
34548083749
-
Warping-based off-line signature recognition
-
G. Agam, and S. Suresh, Warping-based off-line signature recognition, IEEE Trans. Info. Forens. Secur. 2(3, Part 1):430-437, 2007.
-
(2007)
IEEE Trans. Info. Forens. Secur
, vol.2
, Issue.3 PART 1
, pp. 430-437
-
-
Agam, G.1
Suresh, S.2
-
82
-
-
25844484205
-
Identity authentication using improved on-line signature verification method
-
A. Kholmatov and B.Yanikoglu., Identity authentication using improved on-line signature verification method, Pattern Recognit. Lett. 26(15):2400-2408, 2005.
-
(2005)
Pattern Recognit. Lett.
, vol.26
, Issue.15
, pp. 2400-2408
-
-
Kholmatov, A.1
Yanikoglu, B.2
-
83
-
-
0029246903
-
Application of hidden markov models for signature verification
-
L. Yang, B. W. Widjaja, and R. Prasad., Application of hidden markov models for signature verification, Pattern Recognit. 28(2):161-170, 1995.
-
(1995)
Pattern Recognit.
, vol.28
, Issue.2
, pp. 161-170
-
-
Yang, L.1
Widjaja, B.W.2
Prasad, R.3
-
84
-
-
35148827336
-
HMM-based on-line signature verification: Feature extraction and signature modeling
-
J. Fierrez, J. Ortega-Garcia, D. Ramos, and J. Gonzalez-Rodriguez., HMM-based on-line signature verification: Feature extraction and signature modeling, Pattern Recognit. Lett. 28(16):2325-2334, 2007.
-
(2007)
Pattern Recognit. Lett.
, vol.28
, Issue.16
, pp. 2325-2334
-
-
Fierrez, J.1
Ortega-Garcia, J.2
Ramos, D.3
Gonzalez-Rodriguez, J.4
-
85
-
-
70349877354
-
On-line signature verification: Fusion of a hidden Markov model and a neural network via a support vector machine
-
6-8 August
-
M. Fuentes, S. Garcia-Salicetti, and B. Dorizzi, On-line signature verification: Fusion of a hidden Markov model and a neural network via a support vector machine, in Eighth International Workshop on Frontiers in Handwriting Recognitio, 6-8 August 2002, pp. 253-258.
-
(2002)
Eighth International Workshop on Frontiers in Handwriting Recognitio
, pp. 253-258
-
-
Fuentes, M.1
Garcia-Salicetti, S.2
Dorizzi, B.3
-
86
-
-
0036885177
-
Antiforgery: A novel pseudo-outer product based fuzzy neural network driver signature verification system
-
C. Quek, and R. W. Zhou, Antiforgery: A novel pseudo-outer product based fuzzy neural network driver signature verification system, Pattern Recognit. 23:1795-1816, 2002.
-
(2002)
Pattern Recognit.
, vol.23
, pp. 1795-1816
-
-
Quek, C.1
Zhou, R.W.2
-
87
-
-
0034809453
-
Enhancing security and privacy of biometric-based authentication systems
-
N. K. Ratha, J. H. Connell, and R. Bolle., Enhancing security and privacy of biometric-based authentication systems, IBM Systems J. 40(3):614-634, 2001.
-
(2001)
IBM Systems J.
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.3
-
88
-
-
8344234316
-
A goodness-of-fit statistical toolkit
-
G. A. P. Cirrone, S. Donadio, S. Guatelli, A. Mantero, B. Mascialino, S. Parlati, M. G. Pia, A. Pfeiffer, A. Ribon, and P. Viarengo., A goodness-of-fit statistical toolkit, IEEE Trans. Nuclear Sci. 51(5):2056-2063, 2004.
-
(2004)
IEEE Trans. Nuclear Sci.
, vol.51
, Issue.5
, pp. 2056-2063
-
-
Cirrone, G.A.P.1
Donadio, S.2
Guatelli, S.3
Mantero, A.4
Mascialino, B.5
Parlati, S.6
Pia, M.G.7
Pfeiffer, A.8
Ribon, A.9
Viarengo, P.10
-
89
-
-
0008722464
-
Introduction to Error-Correcting Codes
-
Artech House, Boston
-
M. Purser, Introduction to Error-Correcting Codes, Artech House, Boston, 1995.
-
(1995)
-
-
Purser, M.1
-
90
-
-
84875595066
-
Federal Information Processing (FIP)
-
Standards Publication 180-1, Security Hash Standard
-
Federal Information Processing (FIP) Standards Publication 180-1, Security Hash Standard, http://www.itl.nist.gov/fipspubs/fip180-1.htm, 1995.
-
(1995)
-
-
-
92
-
-
33745165448
-
Finding Collisions in the Full SHA-1
-
CRYPTO
-
X. Wang, Y. L. Yin, and H. Yu, Finding Collisions in the Full SHA-1, CRYPTO, 2005.
-
(2005)
-
-
Wang, X.1
Yin, Y.L.2
Yu, H.3
-
93
-
-
38049183978
-
Finding SHA-1 characteristics: General results and applications
-
Springer, Berlin
-
C. De Cannière, and C. Rechberger, Finding SHA-1 characteristics: General results and applications, in Advances in Cryptology, ASIACRYPT, Vol. 4284, Springer, Berlin, 2006.
-
(2006)
Advances in Cryptology, ASIACRYPT
, vol.4284
-
-
De Cannière, C.1
Rechberger, C.2
-
94
-
-
33744729468
-
Handbook of Multibiometrics
-
Springer, USA
-
A. A. Ross, K. Nandakumar, and A. K. Jain, Handbook of Multibiometrics, Springer 2006, USA.
-
(2006)
-
-
Ross, A.A.1
Nandakumar, K.2
Jain, A.K.3
-
96
-
-
26444498516
-
An on-line signature verification system based on fusion of local and global information
-
AVBPA
-
J. Fierrez-Aguilar, L. Nanni, J. Lopez-Peñalba, J. Ortega-Garcia, and D. Maltoni, An on-line signature verification system based on fusion of local and global information, in International Conference on Audio and Video-Based Biometric Person Authentication, AVBPA, 2005, pp. 523-532.
-
(2005)
International Conference on Audio and Video-Based Biometric Person Authentication
, pp. 523-532
-
-
Fierrez-Aguilar, J.1
Nanni, L.2
Lopez-Peñalba, J.3
Ortega-Garcia, J.4
Maltoni, D.5
-
97
-
-
0035333687
-
Quantization index modulation: A class of provably good methods for digital watermarking and information embedding
-
B. Chen, and G. Wornell., Quantization index modulation: A class of provably good methods for digital watermarking and information embedding, IEEE Trans. Info. Theory 47(4):1423-1443, 2001.
-
(2001)
IEEE Trans. Info. Theory
, vol.47
, Issue.4
, pp. 1423-1443
-
-
Chen, B.1
Wornell, G.2
-
98
-
-
0003633044
-
The Radon Transform and Some of Its Applications
-
John Wiley & Sons, New York
-
S. R. Deans, The Radon Transform and Some of Its Applications, John Wiley & Sons, New York, 1983.
-
(1983)
-
-
Deans, S.R.1
-
99
-
-
0037239595
-
The finite ridgelet transform for image representation
-
M. N. Do, and M. Vetterli., The finite ridgelet transform for image representation, IEEE Trans. Image Processing 12(1):16-28, 2003.
-
(2003)
IEEE Trans. Image Processing
, vol.12
, Issue.1
, pp. 16-28
-
-
Do, M.N.1
Vetterli, M.2
-
100
-
-
4744339482
-
Robust digital watermarking in the ridgelet domain
-
P. Campisi, D. Kundur, and A. Neri, Robust digital watermarking in the ridgelet domain, IEEE Signal Processing Lett. 11(10), 2004.
-
(2004)
IEEE Signal Processing Lett
, vol.11
, Issue.10
-
-
Campisi, P.1
Kundur, D.2
Neri, A.3
-
101
-
-
6344294771
-
Perceptual digital watermark of images using ridgelet transform
-
in Third International Conference on Machine Learning and Cybernetics, Shanghai
-
L. Mao, H.-Z. Wu, Z.-H. Wei, and Y. Bao, Perceptual digital watermark of images using ridgelet transform, in Third International Conference on Machine Learning and Cybernetics, Shanghai, 2004.
-
(2004)
-
-
Mao, L.1
Wu, H.-Z.2
Wei, Z.-H.3
Bao, Y.4
|