-
2
-
-
37849002150
-
'3D face': Biometric template protection for 3d face recognition
-
Seoul, Korea, Aug.
-
E. J. C. Kelkboom, B. Gökberk, T. A. M. Kevenaar, A. H. M. Akkermans, and M. van der Veen, "'3D face': Biometric template protection for 3d face recognition," in Proc. Int. Conf. Biometrics, Seoul, Korea, Aug. 2007, pp. 566-573.
-
(2007)
Proc. Int. Conf. Biometrics
, pp. 566-573
-
-
Kelkboom, E.J.C.1
Gökberk, B.2
Kevenaar, T.A.M.3
Akkermans, A.H.M.4
Veen Der M.Van5
-
3
-
-
33750954911
-
Face recognition with renewable and privacy preserving binary templates
-
Buffalo, NY, Oct.
-
T. A. M. Kevenaar, G.-J. Schrijen, A. H. M. Akkermans, M. van der Veen, and F. Zuo, "Face recognition with renewable and privacy preserving binary templates," in Proc. 4th IEEE Workshop AutoID, Buffalo, NY, Oct. 2005, pp. 21-26.
-
(2005)
Proc. 4th IEEE Workshop AutoID
, pp. 21-26
-
-
Kevenaar, T.A.M.1
Schrijen, G.-J.2
Akkermans, A.H.M.3
Veen Der M.Van4
Zuo, F.5
-
4
-
-
35248839355
-
New shielding functions to enhance privacy and prevent misuse of biometric templates
-
J.-P. Linnartz and P. Tuyls, "New shielding functions to enhance privacy and prevent misuse of biometric templates," in Proc. 4th Int. Conf. AVBPA, 2003, pp. 393-402.
-
(2003)
Proc. 4th Int. Conf. AVBPA
, pp. 393-402
-
-
Linnartz, J.-P.1
Tuyls, P.2
-
5
-
-
37849020496
-
Robust extraction of secret bits from minutiae
-
Seoul, Korea, Aug.
-
E.-C. Chang and S. Roy, "Robust extraction of secret bits from minutiae," in Proc. Int. Conf. Biometrics, Seoul, Korea, Aug. 2007, pp. 750-759.
-
(2007)
Proc. Int. Conf. Biometrics
, pp. 750-759
-
-
Chang, E.-C.1
Roy, S.2
-
6
-
-
35048865463
-
Fuzzy extractors: How to generate strong secret keys from biometrics and other noisy data
-
Lecture Notes in Computer Science
-
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong secret keys from biometrics and other noisy data," in Proc. Adv. Cryptology-Eurocrypt, 2004, Lecture Notes in Computer Science, vol.3027, pp. 532-540.
-
(2004)
Proc. Adv. Cryptology-Eurocrypt
, vol.3027
, pp. 532-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
7
-
-
30844458593
-
A fuzzy vault scheme
-
Feb.
-
A. Juels and M. Sudan, "A fuzzy vault scheme," Designs, Codes Cryptography, vol.38, no.2, pp. 237-257, Feb. 2006.
-
(2006)
Designs, Codes Cryptography
, vol.38
, Issue.2
, pp. 237-257
-
-
Juels, A.1
Sudan, M.2
-
8
-
-
36348986198
-
Fingerprint-based fuzzy vault: Implementation and performance
-
Dec.
-
K. Nandakumar, A. K. Jain, and S. Pankanti, "Fingerprint-based fuzzy vault: Implementation and performance," IEEE Trans. Inf. Forensics Security, vol.2, no.4, pp. 744-757, Dec. 2007.
-
(2007)
IEEE Trans. Inf. Forensics Security
, vol.2
, Issue.4
, pp. 744-757
-
-
Nandakumar, K.1
Jain, A.K.2
Pankanti, S.3
-
9
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
Mar.
-
N. K. Ratha, J. H. Connell, and R. M. Bolle, "Enhancing security and privacy in biometrics-based authentication systems," IBM Syst. J., vol.40, no.3, pp. 614-634, Mar. 2001.
-
(2001)
IBM Syst. J.
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
10
-
-
67549112684
-
Binary biometrics: An analytic framework to estimate the bit error probability under Gaussian assumption
-
E. J. C. Kelkboom, G. G. Molina, T. A. M. Kevenaar, R. N. J. Veldhuis, and W. Jonker, "Binary biometrics: An analytic framework to estimate the bit error probability under Gaussian assumption," in Proc. 2nd IEEE BTAS, 2008, pp. 1-6.
-
(2008)
Proc. 2nd IEEE BTAS
, pp. 1-6
-
-
Kelkboom, E.J.C.1
Molina, G.G.2
Kevenaar, T.A.M.3
Veldhuis, R.N.J.4
Jonker, W.5
-
11
-
-
0033640646
-
Statistical pattern recognition: A review
-
Jan.
-
A. K. Jain, R. P. W. Duin, and J. Mao, "Statistical pattern recognition: A review," IEEE Trans. Pattern Anal. Mach. Intell., vol.22, no.1, pp. 4-37, Jan. 2000.
-
(2000)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.22
, Issue.1
, pp. 4-37
-
-
Jain, A.K.1
Duin, R.P.W.2
Mao, J.3
-
12
-
-
33745164328
-
Overview of the face recognition grand challenge
-
Jun.
-
P. J. Phillips, P. J. Flynn, T. Scruggs, K.W. Bowyer, J. Chang, K. Hoffman, J. Marques, J. Min, and W. Worek, "Overview of the face recognition grand challenge," in Proc. IEEE CVPR, Jun. 2005, vol.2, pp. 454-461.
-
(2005)
Proc. IEEE CVPR
, vol.2
, pp. 454-461
-
-
Phillips, P.J.1
Flynn, P.J.2
Scruggs, T.3
Bowyer, K.W.4
Chang, J.5
Hoffman, K.6
Marques, J.7
Min, J.8
Worek, W.9
-
13
-
-
0036522407
-
Fvc2000: Fingerprint verification competition
-
Mar.
-
D. Maio, D. Maltoni, R. Cappelli, J. L. Wayman, and A. K. Jain, "Fvc2000: Fingerprint verification competition," IEEE Trans. Pattern Anal. Mach. Intell., vol.24, no.3, pp. 402-412, Mar. 2002.
-
(2002)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.24
, Issue.3
, pp. 402-412
-
-
Maio, D.1
Maltoni, D.2
Cappelli, R.3
Wayman, J.L.4
Jain, A.K.5
-
14
-
-
11244340682
-
Biometrics-based cryptographic key generation
-
Jun.
-
Y.-J. Chang,W. Zhang, and T. Chen, "Biometrics-based cryptographic key generation," in Proc. IEEE Int. Conf. Multimedia Expo, Jun. 2004, vol.3, pp. 2203-2206.
-
(2004)
Proc. IEEE Int. Conf. Multimedia Expo
, vol.3
, pp. 2203-2206
-
-
Changw. Zhang, Y.-J.1
Chen, T.2
-
15
-
-
48649088535
-
Multi-bits biometric string generation based on the likelihood ratio
-
Washington, DC, Sep.
-
C. Chen, R. Veldhuis, T. Kevenaar, and A. Akkermans, "Multi-bits biometric string generation based on the likelihood ratio," in Proc. IEEE Conf. Biometrics: Theory, Appl. Syst.,Washington, DC, Sep. 2007, p. 1-6.
-
(2007)
Proc. IEEE Conf. Biometrics: Theory, Appl. Syst.
, pp. 1-6
-
-
Chen, C.1
Veldhuis, R.2
Kevenaar, T.3
Akkermans, A.4
-
16
-
-
84873903909
-
A reference architecture for biometric template protection based on pseudo identities
-
Darmstadt, Germany, Sep.
-
J. Breebaart, C. Busch, J. Grave, and E. Kindt, "A reference architecture for biometric template protection based on pseudo identities," in Proc. BIOSIG, Darmstadt, Germany, Sep. 2008, pp. 25-38.
-
(2008)
Proc. BIOSIG
, pp. 25-38
-
-
Breebaart, J.1
Busch, C.2
Grave, J.3
Kindt, E.4
-
17
-
-
54049089250
-
Pseudo identities based on fingerprint characteristics
-
N. Delvaux, P. Lindeberg, J. Midgren, J. Breebaart, T. Akkermans, M. van der Veen, R. Veldhuis, E. Kindt, K. Simoens, C. Busch, P. Bours, D. Gafurov, B. Yang, J. Stern, C. Rust, B. Cucinelli, and D. Skepastianos, "Pseudo identities based on fingerprint characteristics," in Proc. IEEE 4th IIH-MSP, 2008, pp. 1063-1068.
-
(2008)
Proc. IEEE 4th IIH-MSP
, pp. 1063-1068
-
-
Delvaux, N.1
Lindeberg, P.2
Midgren, J.3
Breebaart, J.4
Akkermans, T.5
Veen Der M.Van6
Veldhuis, R.7
Kindt, E.8
Simoens, K.9
Busch, C.10
Bours, P.11
Gafurov, D.12
Yang, B.13
Stern, J.14
Rust, C.15
Cucinelli, B.16
Skepastianos, D.17
-
18
-
-
0036487317
-
The importance of being random: Statistical principles of iris recognition
-
Feb.
-
J. Daugman, "The importance of being random: Statistical principles of iris recognition," Pattern Recognit., vol.36, no.2, pp. 279-291, Feb. 2003.
-
(2003)
Pattern Recognit.
, vol.36
, Issue.2
, pp. 279-291
-
-
Daugman, J.1
-
20
-
-
33746916511
-
3D shape-based face representation and feature extraction for face recognition
-
Aug.
-
B. Gökberk,M. O. Irfanoglu, and L. Akarun, "3D shape-based face representation and feature extraction for face recognition," Image Vis. Comput., vol.24, no.8, pp. 857-869, Aug. 2006.
-
(2006)
Image Vis. Comput.
, vol.24
, Issue.8
, pp. 857-869
-
-
Gökberkm, O.1
Irfanoglu, B.2
Akarun, L.3
-
21
-
-
0742272658
-
Likelihood-ratio-based biometric verification
-
Jan.
-
A. M. Bazen and R. N. J. Veldhuis, "Likelihood-ratio-based biometric verification," IEEE Trans. Circuits Syst. Video Technol., vol.14, no.1, pp. 86-94, Jan. 2004.
-
(2004)
IEEE Trans. Circuits Syst. Video Technol.
, vol.14
, Issue.1
, pp. 86-94
-
-
Bazen, A.M.1
Veldhuis, R.N.J.2
-
22
-
-
26444507172
-
Practical biometric authentication with template protection
-
AVBPA, Rye Brook, NY, Jul.
-
P. Tuyls, A. H. M. Akkermans, T. A. M. Kevenaar, G.-J. Schrijnen, A. M. Bazen, and R. N. J. Veldhuis, "Practical biometric authentication with template protection," in Proc. 5th Int. Conf., AVBPA, Rye Brook, NY, Jul. 2005, pp. 436-446.
-
(2005)
Proc. 5th Int. Conf.
, pp. 436-446
-
-
Tuyls, P.1
Akkermans, A.H.M.2
Kevenaar, T.A.M.3
Schrijnen, G.-J.4
Bazen, A.M.5
Veldhuis, R.N.J.6
-
25
-
-
2942623033
-
A statistical analysis of speaker performance in the NIST 1998 speaker recognition evaluation
-
G. Doddington, W. Liggett, A. Martin, M. Przybocki, and D. Reynolds, "A statistical analysis of speaker performance in the NIST 1998 speaker recognition evaluation," in Proc. ICSLP, 1998, pp. 1351-1354.
-
(1998)
Proc. ICSLP
, pp. 1351-1354
-
-
Doddington, G.1
Liggett, W.2
Martin, A.3
Przybocki, M.4
Reynolds, D.5
-
26
-
-
70350155262
-
Intersubject differences in false nonmatch rates for a fingerprint-based authentication system
-
Article ID 896383, DOI:10.1155/2009/896383
-
J. Breebaart, T. Akkermans, and E. Kelkboom, "Intersubject differences in false nonmatch rates for a fingerprint-based authentication system," EURASIP J. Adv. Signal Process., vol.2009, Article ID 896383, 9 p., 2009. DOI:10.1155/2009/896383.
-
(2009)
EURASIP J. Adv. Signal Process.
, vol.2009
, pp. 9
-
-
Breebaart, J.1
Akkermans, T.2
Kelkboom, E.3
-
27
-
-
34748908452
-
Worms, chameleons, phantoms and doves: New additions to the biometric menagerie
-
N. Yager and T. Dunstone, "Worms, chameleons, phantoms and doves: New additions to the biometric menagerie," in Proc. AutoID, 2007, pp. 1-6.
-
(2007)
Proc. AutoID
, pp. 1-6
-
-
Yager, N.1
Dunstone, T.2
|