-
1
-
-
71749106685
-
A reference architecture for biometric template protection based on pseudo identities
-
J. Breebaart, C. Busch, J. Grave, and E. Kindt, "A reference architecture for biometric template protection based on pseudo identities," in BIOSIG 2008: Biometrics and Electronic Signatures, 2008.
-
(2008)
BIOSIG 2008: Biometrics and Electronic Signatures
-
-
Breebaart, J.1
Busch, C.2
Grave, J.3
Kindt, E.4
-
2
-
-
70350228909
-
A security analysis of biometric template protection schemes
-
X. Zhou, S. D. Wolthusen, C. Busch, and A. Kuijper, "A security analysis of biometric template protection schemes," in International Conference on Image Analysis and Recognition ICIAR 2009, L. 5627, Ed., 2009, pp. 29-38.
-
(2009)
International Conference on Image Analysis and Recognition ICIAR 2009, L. 5627, Ed
, pp. 29-38
-
-
Zhou, X.1
Wolthusen, S.D.2
Busch, C.3
Kuijper, A.4
-
4
-
-
35048865463
-
-
Y. Dodis, L. Reyzin, and A. Smith, Fuzzy extractors: How to generate strong secret keys from biometrics and other noisy data, in In Advances in cryptology - Eurocrypt'04, L. 3027, Ed., 2004, pp. 523-540.
-
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong secret keys from biometrics and other noisy data," in In Advances in cryptology - Eurocrypt'04, L. 3027, Ed., 2004, pp. 523-540.
-
-
-
-
6
-
-
35649005185
-
Face biometrics with renewable templates
-
San Jose, California, USA, January
-
M. van der Veen, T. Kevenaar, G.-J. Schrijen, T. H. Akkermans, and F. Zuo, "Face biometrics with renewable templates," in Security, Steganography, and Watermarking of Multimedia Contents VIII, San Jose, California, USA, January 2006.
-
(2006)
Security, Steganography, and Watermarking of Multimedia Contents VIII
-
-
van der Veen, M.1
Kevenaar, T.2
Schrijen, G.-J.3
Akkermans, T.H.4
Zuo, F.5
-
7
-
-
5044251072
-
Reliable biometric authentication with privacy protection
-
E. Verbitskiy, P. Tuyls, D. Denteneer, and J.-P. Linnartz, "Reliable biometric authentication with privacy protection," 24th Benelux Symp. on Info. Theory, 2003.
-
(2003)
24th Benelux Symp. on Info. Theory
-
-
Verbitskiy, E.1
Tuyls, P.2
Denteneer, D.3
Linnartz, J.-P.4
-
8
-
-
73649141053
-
-
X. Zhou, T. Kevenaar, E. Kelkboom, C. Busch, M. van der Veen, and A. Nouak, Privacy enhancing technology for a 3d-face recognition system, in BIOSIG 2007, 2007.
-
X. Zhou, T. Kevenaar, E. Kelkboom, C. Busch, M. van der Veen, and A. Nouak, "Privacy enhancing technology for a 3d-face recognition system," in BIOSIG 2007, 2007.
-
-
-
-
9
-
-
8844277754
-
Privacy protected biometric templates: Ear identification
-
April
-
P. Tuyls, E. Verbitskiy, T. Ignatenko, D. Schobben, and T. H. Akkermans, "Privacy protected biometric templates: ear identification," in Proceeding of SPIE, vol. 5404, April 2004, pp. 176-182.
-
(2004)
Proceeding of SPIE
, vol.5404
, pp. 176-182
-
-
Tuyls, P.1
Verbitskiy, E.2
Ignatenko, T.3
Schobben, D.4
Akkermans, T.H.5
-
10
-
-
0036487317
-
The importance of being random: Statistical principles of iris recognition
-
J. Daugman, "The importance of being random: Statistical principles of iris recognition." in Pattern Rec. 36, 2003, pp. 279-291.
-
(2003)
Pattern Rec
, vol.36
, pp. 279-291
-
-
Daugman, J.1
-
11
-
-
33845435077
-
Capacity and examples of template protecting biometric authentication systems
-
Prague
-
P. Tuyls and J. Goseling, "Capacity and examples of template protecting biometric authentication systems," in Biometric authentication workshop (BioAW 2004), LNCS, Ed., no. 3087, Prague, 2004, pp. 158-170.
-
(2004)
Biometric authentication workshop (BioAW 2004), LNCS, Ed
, vol.3087
, pp. 158-170
-
-
Tuyls, P.1
Goseling, J.2
-
13
-
-
54049103508
-
A 3d face recognition algorithm using histogram-based features
-
Crete, Greece
-
X. Zhou, H. Seibert, C. Busch, and W. Funk, "A 3d face recognition algorithm using histogram-based features," in Eurographics Workshop on 3D Object Retrieval, Crete, Greece, 2008, pp. 65-71.
-
(2008)
Eurographics Workshop on 3D Object Retrieval
, pp. 65-71
-
-
Zhou, X.1
Seibert, H.2
Busch, C.3
Funk, W.4
-
14
-
-
73649092486
-
-
P. J. Phillips, P. J. Flynn, T. Scruggs, K. W. Bowyer, J. Chang, K. Hoffman, J. Marques, J. Min, and W. Worek, Overview of the face recognition grand challenge, in In IEEE CVPR, 2, http://face.nist. gov/frgc/, June 2005, pp. 454-461.
-
P. J. Phillips, P. J. Flynn, T. Scruggs, K. W. Bowyer, J. Chang, K. Hoffman, J. Marques, J. Min, and W. Worek, "Overview of the face recognition grand challenge," in In IEEE CVPR, vol. 2, http://face.nist. gov/frgc/, June 2005, pp. 454-461.
-
-
-
-
15
-
-
33750918446
-
-
Univesity of Cambridge, Computer Laboratory, Tech. Rep. 640, July
-
F. Hao, R. Anderson, and J. Daugman, "Combining cryptography with biometrics effectively," Univesity of Cambridge, Computer Laboratory, Tech. Rep. 640, July 2005.
-
(2005)
Combining cryptography with biometrics effectively
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
|