-
1
-
-
34748924251
-
Fuzzy extractors for continuous distributions
-
Deng, R., Samarati, P. (eds.) ACM, New York
-
Buhan, I.R., Doumen, J., Hartel, P.H., Veldhuis, R.N.J.: Fuzzy extractors for continuous distributions. In: Deng, R., Samarati, P. (eds.) Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS), Singapore, pp. 353-355. ACM, New York (2007)
-
(2007)
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS), Singapore
, pp. 353-355
-
-
Buhan, I.R.1
Doumen, J.2
Hartel, P.H.3
Veldhuis, R.N.J.4
-
2
-
-
57049133508
-
Embedding renewable cryptographic keys into continuous noisy data
-
Chen, L., Ryan, M.D., Wang, G. (eds.) ICICS 2008. Springer, Heidelberg
-
Buhan, I.R., Doumen, J., Hartel, P.H., Veldhuis, R.N.J.: Embedding renewable cryptographic keys into continuous noisy data. In: Chen, L., Ryan, M.D., Wang, G. (eds.) ICICS 2008. LNCS, vol. 5308, pp. 294-310. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5308
, pp. 294-310
-
-
Buhan, I.R.1
Doumen, J.2
Hartel, P.H.3
Veldhuis, R.N.J.4
-
3
-
-
0035251780
-
Quantization index modulation methods for digital watermarking and information embedding of multimedia
-
DOI 10.1023/A:1008107127819
-
Chen, B., Wornell, G.W.: Quantization index modulation methods for digital watermarking and information embedding of multimedia. The Journal of VLSI Signal Processing 27(1-2), 7-33 (2001) (Pubitemid 32190754)
-
(2001)
Journal of VLSI Signal Processing Systems for Signal, Image, and Video Technology
, vol.27
, Issue.1-2
, pp. 7-33
-
-
Chen, B.1
Wornell, G.W.2
-
4
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523-540. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
5
-
-
0003922190
-
-
2nd edn. Wiley-Interscience, Hoboken
-
Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification, 2nd edn. Wiley-Interscience, Hoboken (2000)
-
(2000)
Pattern Classification
-
-
Duda, R.O.1
Hart, P.E.2
Stork, D.G.3
-
6
-
-
43949116287
-
Biometric template security
-
Jain, A.K., Nandakumar, K., Nagar, A.: Biometric template security. Journal on Advances in Signal Processing (EURASIP) 2008, 17 (2008)
-
(2008)
Journal on Advances in Signal Processing (EURASIP) 2008
, vol.17
-
-
Jain, A.K.1
Nandakumar, K.2
Nagar, A.3
-
7
-
-
77951573041
-
Binary biometrics: An analytic framework to estimate the performance curves under gaussian assumptions
-
to appear
-
Kelkboom, E., Garcia Molina, G., Breebaart, J., Kevenaar, T.A.M., Veldhuis, R.N.J., Jonker, W.: Binary biometrics: An analytic framework to estimate the performance curves under gaussian assumptions. IEEE Transactions on Systems, Man and Cybernetics (to appear, 2009)
-
(2009)
IEEE Transactions on Systems, Man and Cybernetics
-
-
Kelkboom, E.1
Garcia Molina, G.2
Breebaart, J.3
Kevenaar, T.A.M.4
Veldhuis, R.N.J.5
Jonker, W.6
-
8
-
-
77649250983
-
Secure sketch for biometric templates
-
Lai, X., Chen, K. (eds.) ASIACRYPT 2006. Springer, Heidelberg
-
Li, Q., Sutcu, Y., Memon, N.: Secure sketch for biometric templates. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 99-113. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4284
, pp. 99-113
-
-
Li, Q.1
Sutcu, Y.2
Memon, N.3
-
9
-
-
35248839355
-
New shielding functions to enhance privacy and prevent misuse of biometric templates
-
Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. Springer, Heidelberg
-
Linnartz, J.P., Tuyls, P.: New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Kittler, J., Nixon, M.S. (eds.) AVBPA 2003. LNCS, vol. 2688, pp. 393-402. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2688
, pp. 393-402
-
-
Linnartz, J.P.1
Tuyls, P.2
-
10
-
-
10744222590
-
Myct baseline corpus: A bimodal biometric database
-
IEEE Computer Society Press, Los Alamitos
-
Ortega-Garcia, J., Fierrez-Aguillar, J., Simon, D., Gonzalez, J., Faundez-Zanuy, M., Espinosa, V., Satue, A., Hernaez, I., Igarza, J.-J., Vivaracho, C., Escudero, D., Moro, Q.-I.: Myct baseline corpus: a bimodal biometric database. In: IEEE Proceedings on Vision, Image and Signal Processing, Special Issue on Biometrics on the Internet, vol. 150, pp. 395-401. IEEE Computer Society Press, Los Alamitos (2003)
-
(2003)
IEEE Proceedings on Vision, Image and Signal Processing, Special Issue on Biometrics on the Internet
, vol.150
, pp. 395-401
-
-
Ortega-Garcia, J.1
Fierrez-Aguillar, J.2
Simon, D.3
Gonzalez, J.4
Faundez-Zanuy, M.5
Espinosa, V.6
Satue, A.7
Hernaez, I.8
Igarza, J.-J.9
Vivaracho, C.10
Escudero, D.11
Moro, Q.-I.12
-
11
-
-
77951578327
-
-
ISO/IEC JTC1 SC27. CD 24745 - information security - biometric template protection
-
ISO/IEC JTC1 SC27. CD 24745 - information security - biometric template protection
-
-
-
-
12
-
-
70449640064
-
Privacy weakness in biometric sketches
-
Simoens, K., Tuyls, P., Preneel, B.: Privacy weakness in biometric sketches. In: IEEE Symposium on Security and Privacy, Oakland, California, USA (May 2009)
-
IEEE Symposium on Security and Privacy, Oakland, California, USA (May 2009)
-
-
Simoens, K.1
Tuyls, P.2
Preneel, B.3
-
13
-
-
26444507172
-
Practical biometric authentication with template protection
-
Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. Springer, Heidelberg
-
Tuyls, P., Akkermans, A., Kevenaar, T., Schrijen, G., Bazen, A., Veldhuis, R.: Practical biometric authentication with template protection. In: Kanade, T., Jain, A., Ratha, N.K. (eds.) AVBPA 2005. LNCS, vol. 3546, pp. 436-446. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3546
, pp. 436-446
-
-
Tuyls, P.1
Akkermans, A.2
Kevenaar, T.3
Schrijen, G.4
Bazen, A.5
Veldhuis, R.6
|