-
2
-
-
0003987134
-
-
Anil K.J., Bolle R.M., and Pankanti S. (Eds), Kluwer, Norwell, MA
-
In: Anil K.J., Bolle R.M., and Pankanti S. (Eds). Biometrics: Personal Identification in a Networked Society (1999), Kluwer, Norwell, MA
-
(1999)
Biometrics: Personal Identification in a Networked Society
-
-
-
3
-
-
33846419477
-
Chaotic secure content-based hidden transmission of biometrics temples
-
Khan M.K., Jiashu Z., and Lei T. Chaotic secure content-based hidden transmission of biometrics temples. Chaos Solitons Fractals 32 5 (2007) 1749-1759
-
(2007)
Chaos Solitons Fractals
, vol.32
, Issue.5
, pp. 1749-1759
-
-
Khan, M.K.1
Jiashu, Z.2
Lei, T.3
-
5
-
-
0027700869
-
High confidence visual recognition of persons by a test of statistical independence
-
Daugman J. High confidence visual recognition of persons by a test of statistical independence. IEEE Trans. Pattern Anal. Mach. Intell. 15 (1999) 1148-1161
-
(1999)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.15
, pp. 1148-1161
-
-
Daugman, J.1
-
7
-
-
0036887598
-
Robust watermarking of fingerprint images
-
Gunsel B., Umut U., and Tekalp A.M. Robust watermarking of fingerprint images. Pattern Recogn. 35 (2002) 2739-2747
-
(2002)
Pattern Recogn.
, vol.35
, pp. 2739-2747
-
-
Gunsel, B.1
Umut, U.2
Tekalp, A.M.3
-
8
-
-
27144539209
-
Protecting biometric data for personal identification
-
Sinobiometrics'04, Springer-Verlag
-
Khan M.K., Jiashu Z., and Lei T. Protecting biometric data for personal identification. Sinobiometrics'04. Lecture Notes in Computer Science vol. 3383 (2004), Springer-Verlag 629-638
-
(2004)
Lecture Notes in Computer Science
, vol.3383
, pp. 629-638
-
-
Khan, M.K.1
Jiashu, Z.2
Lei, T.3
-
9
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
Ratha N., Connell J., and Bolle R. Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40 (2001) 614-634
-
(2001)
IBM Syst. J.
, vol.40
, pp. 614-634
-
-
Ratha, N.1
Connell, J.2
Bolle, R.3
-
10
-
-
0036030112
-
Impact of artificial gummy fingers on fingerprint systems, Optical Security and Counterfeit Deterrence Techniques IV
-
T. Matsumoto, H. Matsumoto, K. Yamada, S. Hoshino, Impact of artificial gummy fingers on fingerprint systems, Optical Security and Counterfeit Deterrence Techniques IV, Proc. SPIE, vol. 4677, 2002, pp. 275-289
-
(2002)
Proc. SPIE
, vol.4677
, pp. 275-289
-
-
Matsumoto, T.1
Matsumoto, H.2
Yamada, K.3
Hoshino, S.4
-
11
-
-
27144491398
-
Securing the biometric model
-
Taiwan
-
A.C. Leniski, R.C. Skinner, S.F. McGann, S.J. Elliott, Securing the biometric model, IEEE ICCST 2003, Taiwan
-
(2003)
IEEE ICCST
-
-
Leniski, A.C.1
Skinner, R.C.2
McGann, S.F.3
Elliott, S.J.4
-
12
-
-
0031651014
-
On enabling secure applications through online biometric identification
-
Davida G.I., Frankel Y., and Matt B.J. On enabling secure applications through online biometric identification. IEEE Symp. Secur. Priv. (1998) 148-157
-
(1998)
IEEE Symp. Secur. Priv.
, pp. 148-157
-
-
Davida, G.I.1
Frankel, Y.2
Matt, B.J.3
-
13
-
-
8844234621
-
On the relation of error correction and cryptography to an offline biometric based identification scheme
-
G.I. Davida, Y. Frankel, B.J. Matt, R. Peralta, On the relation of error correction and cryptography to an offline biometric based identification scheme, in: Proc. Workshop Coding and Cryptography, 1999, pp. 129-138
-
(1999)
Proc. Workshop Coding and Cryptography
, pp. 129-138
-
-
Davida, G.I.1
Frankel, Y.2
Matt, B.J.3
Peralta, R.4
-
14
-
-
0032224440
-
Biometric encryption using image processing
-
Optical Security and Counterfeit Deterrence Techniques II, SPIE
-
Soutar C., Roberge D., Stojanov S.A., Gilroy R., and Vijaya Kumar B.V.K. Biometric encryption using image processing. Optical Security and Counterfeit Deterrence Techniques II. Proc. SPIE vol. 3314 (1998), SPIE 178-188
-
(1998)
Proc. SPIE
, vol.3314
, pp. 178-188
-
-
Soutar, C.1
Roberge, D.2
Stojanov, S.A.3
Gilroy, R.4
Vijaya Kumar, B.V.K.5
-
15
-
-
19444368925
-
Biometric encryption, enrollment and verification procedures
-
SPIE
-
C. Soutar, D. Roberge, S.A. Stojanov, R. Gilroy, B.V.K. Vijaya Kumar, Biometric encryption, enrollment and verification procedures, in: Optical Pattern Recognition IX, Proc. SPIE, vol. 3386, 1998, pp. 24-35
-
(1998)
Optical Pattern Recognition IX, Proc
, vol.3386
, pp. 24-35
-
-
Soutar, C.1
Roberge, D.2
Stojanov, S.A.3
Gilroy, R.4
Vijaya Kumar, B.V.K.5
-
16
-
-
26444554928
-
Vulnerabilities in biometric encryption systems
-
AVBPA'05, Springer-Verlag
-
Andy A. Vulnerabilities in biometric encryption systems. AVBPA'05. Lecture Notes in Computer Science vol. 3546 (2005), Springer-Verlag 1100-1109
-
(2005)
Lecture Notes in Computer Science
, vol.3546
, pp. 1100-1109
-
-
Andy, A.1
-
18
-
-
5044251072
-
Reliable biometric authentication with privacy protection
-
E. Verbitskiy, P. Tuyls, D. Denteneer, J.P. Linnartz, Reliable biometric authentication with privacy protection, in: Proc. of the 24th Symposium on Inf. Theory, 2003, pp. 125-132
-
(2003)
Proc. of the 24th Symposium on Inf. Theory
, pp. 125-132
-
-
Verbitskiy, E.1
Tuyls, P.2
Denteneer, D.3
Linnartz, J.P.4
-
19
-
-
33845435077
-
Capacity and examples of template-protecting biometric authentication systems
-
ECCV Intl. Workshop, BioAW
-
P. Tuyls, J. Gosling, Capacity and examples of template-protecting biometric authentication systems, in: ECCV Intl. Workshop, BioAW, Lecture Notes Computer Science, 2004, pp. 158-170
-
(2004)
Lecture Notes Computer Science
, pp. 158-170
-
-
Tuyls, P.1
Gosling, J.2
-
21
-
-
0003437939
-
Verification watermarks on fingerprint recognition and retrieval
-
Yeung M.M., and Pankanti S. Verification watermarks on fingerprint recognition and retrieval. J. Electron. Imaging 9 (2000) 468-476
-
(2000)
J. Electron. Imaging
, vol.9
, pp. 468-476
-
-
Yeung, M.M.1
Pankanti, S.2
-
22
-
-
0442319134
-
Digital watermarking techniques: A case study in fingerprints and faces
-
J. Sonia, Digital watermarking techniques: A case study in fingerprints and faces, in: Proc. Indian Conference on Computer Vision, Graphics, and Image Processing, 2000, pp. 139-144
-
(2000)
Proc. Indian Conference on Computer Vision, Graphics, and Image Processing
, pp. 139-144
-
-
Sonia, J.1
-
23
-
-
20444404178
-
Steganalysis of LSB matching in grayscale images
-
Andrew D.K. Steganalysis of LSB matching in grayscale images. IEEE Signal Process. Lett. 12 (2005) 441-444
-
(2005)
IEEE Signal Process. Lett.
, vol.12
, pp. 441-444
-
-
Andrew, D.K.1
-
24
-
-
56449089063
-
Multimodal face and fingerprint biometrics authentication on space-limited tokens
-
Khan M.K., and Zhang J. Multimodal face and fingerprint biometrics authentication on space-limited tokens. Neurocomputing 71 (2008) 3026-3031
-
(2008)
Neurocomputing
, vol.71
, pp. 3026-3031
-
-
Khan, M.K.1
Zhang, J.2
-
25
-
-
0037411048
-
Markov chaotic sequences for correlation based watermarking schemes
-
Tefas, Nikolaidis A., Nikolaidis N., Solachidis V., Tsekeridou S., and Pitas I. Markov chaotic sequences for correlation based watermarking schemes. Chaos Solitons Fractals 17 (2003) 567-573
-
(2003)
Chaos Solitons Fractals
, vol.17
, pp. 567-573
-
-
Tefas1
Nikolaidis, A.2
Nikolaidis, N.3
Solachidis, V.4
Tsekeridou, S.5
Pitas, I.6
-
26
-
-
0038818491
-
Performance analysis of correlation-based watermarking schemes employing Markov chaotic sequences
-
Anastasios T., Athanasios N., Nikolaidis N., Solachidis V., Tsekeridou S., and Pitas I. Performance analysis of correlation-based watermarking schemes employing Markov chaotic sequences. IEEE Trans. Signal Process. 51 (2003) 1979-1994
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, pp. 1979-1994
-
-
Anastasios, T.1
Athanasios, N.2
Nikolaidis, N.3
Solachidis, V.4
Tsekeridou, S.5
Pitas, I.6
-
27
-
-
1442273672
-
Chaos communications-principles, schemes, and system analysis
-
Abeland A., and Schwarz W. Chaos communications-principles, schemes, and system analysis. Proc. IEEE 90 (2002) 691-710
-
(2002)
Proc. IEEE
, vol.90
, pp. 691-710
-
-
Abeland, A.1
Schwarz, W.2
-
28
-
-
27744517664
-
Ergodic chaotic parameter modulation with application to digital image watermarking
-
Chen S., and Leung H. Ergodic chaotic parameter modulation with application to digital image watermarking. IEEE Trans. Image Process. 14 (2005) 1590-1602
-
(2005)
IEEE Trans. Image Process.
, vol.14
, pp. 1590-1602
-
-
Chen, S.1
Leung, H.2
-
29
-
-
0004082154
-
-
Prentice Hall, Upper Saddle River, NJ
-
Sklar B. Digital Communications (2001), Prentice Hall, Upper Saddle River, NJ
-
(2001)
Digital Communications
-
-
Sklar, B.1
-
30
-
-
0035394901
-
Chaotic characteristics of a one-dimensional iterative map with infinite collapses
-
He D., He C., Ling-ge J., Zhu H.W., and Hu G.R. Chaotic characteristics of a one-dimensional iterative map with infinite collapses. IEEE Trans. Circuits Syst. I, Fundam. Theory Appl. 48 (2001) 900-906
-
(2001)
IEEE Trans. Circuits Syst. I, Fundam. Theory Appl.
, vol.48
, pp. 900-906
-
-
He, D.1
He, C.2
Ling-ge, J.3
Zhu, H.W.4
Hu, G.R.5
-
32
-
-
71649089822
-
A novel robust audio watermarking scheme based on nonuniform discrete Fourier transform
-
Ling X., Jiashu Z., and Hong J.H. A novel robust audio watermarking scheme based on nonuniform discrete Fourier transform. Chinese J. Comput. 9 (2006) 1709-1719
-
(2006)
Chinese J. Comput.
, vol.9
, pp. 1709-1719
-
-
Ling, X.1
Jiashu, Z.2
Hong, J.H.3
-
33
-
-
34548620637
-
Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices
-
Khan J.M., and Zhang K. Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos Solitons Fractals 35 (2008) 519-524
-
(2008)
Chaos Solitons Fractals
, vol.35
, pp. 519-524
-
-
Khan, J.M.1
Zhang, K.2
-
34
-
-
1842528982
-
A chaos-based robust wavelet-domain watermarking algorithm
-
Zhao D., Guanrong C., and Wenbo L. A chaos-based robust wavelet-domain watermarking algorithm. Chaos Solitons Fractals 22 (2004) 47-54
-
(2004)
Chaos Solitons Fractals
, vol.22
, pp. 47-54
-
-
Zhao, D.1
Guanrong, C.2
Wenbo, L.3
|