-
1
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
Uludag, U., Pankanti, S., Prabhakar, S., Jain, A.K.: Biometric cryptosystems: issues and challenges. Proceedings of the IEEE 92(6), 948-960 (2004)
-
(2004)
Proceedings of the IEEE
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
-
2
-
-
41949091158
-
Image understanding for iris biometrics: A survey
-
Bowyer, K., Hollingsworth, K., Flynn, P.: Image understanding for iris biometrics: a survey. Computer Vision and Image Understanding 110, 281-307 (2008)
-
(2008)
Computer Vision and Image Understanding
, vol.110
, pp. 281-307
-
-
Bowyer, K.1
Hollingsworth, K.2
Flynn, P.3
-
3
-
-
33747624401
-
Combining Cryptography with Biometrics Effectively
-
Hao, F., Anderson, R., Daugman, J.: Combining Cryptography with Biometrics Effectively. IEEE Transactions on Computers 55(9), 1081-1088 (2006)
-
(2006)
IEEE Transactions on Computers
, vol.55
, Issue.9
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
4
-
-
57649126466
-
A Novel Cryptosystem based on Iris Key Generation
-
Wu, X., Qi, N.,Wang, K., Zhang, D.: A Novel Cryptosystem based on Iris Key Generation. In: Fourth International Conference on Natural Computation (ICNC'08), pp. 53-56 (2008)
-
(2008)
Fourth International Conference on Natural Computation (ICNC'08)
, pp. 53-56
-
-
Wu, X.1
Qi, N.2
Wang, K.3
Zhang, D.4
-
5
-
-
56749174787
-
Theoretical and practical boundaries of binary secure sketches
-
Bringer, J., Chabanne, H., Cohen, G., Kindarji, B., Zémor, G.: Theoretical and practical boundaries of binary secure sketches. IEEE Transactions on Information Forensics and Security 3, 673-683 (2008)
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, pp. 673-683
-
-
Bringer, J.1
Chabanne, H.2
Cohen, G.3
Kindarji, B.4
Zémor, G.5
-
6
-
-
0031651014
-
On enabling secure applications through off-line biometric identification
-
Davida, G., Frankel, Y., Matt, B.: On enabling secure applications through off-line biometric identification. In: Proc. of IEEE, Symp. on Security and Privacy, pp. 148-157 (1998)
-
(1998)
Proc. of IEEE, Symp. on Security and Privacy
, pp. 148-157
-
-
Davida, G.1
Frankel, Y.2
Matt, B.3
-
8
-
-
34748913281
-
-
Technical report, University of Twente
-
Buhan, I.R., Doumen, J.M., Hartel, P.H., Veldhuis, R.N.J.: Fuzzy extractors for continuous distributions. Technical report, University of Twente (2006)
-
(2006)
Fuzzy Extractors for Continuous Distributions
-
-
Buhan, I.R.1
Doumen, J.M.2
Hartel, P.H.3
Veldhuis, R.N.J.4
-
9
-
-
69949170155
-
Systematic construction of iris-based fuzzy commitment schemes
-
Tistarelli, M., Nixon, M.S. (eds.) ICB 2009. Springer, Heidelberg
-
Rathgeb, C., Uhl, A.: Systematic construction of iris-based fuzzy commitment schemes. In: Tistarelli, M., Nixon, M.S. (eds.) ICB 2009. LNCS, vol. 5558, pp. 947-956. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5558
, pp. 947-956
-
-
Rathgeb, C.1
Uhl, A.2
-
10
-
-
77954649726
-
Context-based texture analysis for secure revocable irisbiometric key generation
-
Rathgeb, C., Uhl, A.: Context-based texture analysis for secure revocable irisbiometric key generation. In: Proceedings of the 3rd International Conference on Imaging for Crime Detection and Prevention, ICDP '09, London, UK (2009)
-
Proceedings of the 3rd International Conference on Imaging for Crime Detection and Prevention, ICDP '09, London, UK (2009)
-
-
Rathgeb, C.1
Uhl, A.2
-
11
-
-
48649102434
-
Optimal iris fuzzy sketches
-
Bringer, J., Chabanne, H., Cohen, G., Kindarji, B., Zémor, G.: Optimal iris fuzzy sketches. In: Proc. 1st IEEE International Conference on Biometrics: Theory, Applications, and Systems, pp. 1-6 (2007)
-
(2007)
Proc. 1st IEEE International Conference on Biometrics: Theory, Applications, and Systems
, pp. 1-6
-
-
Bringer, J.1
Chabanne, H.2
Cohen, G.3
Kindarji, B.4
Zémor, G.5
-
12
-
-
33751585800
-
Biometric hash based on statistical features of online signatures
-
Vielhauer, C., Steinmetz, R., Mayerhöfer, A.: Biometric hash based on statistical features of online signatures. In: ICPR '02: Proceedings of the 16 th International Conference on Pattern Recognition (ICPR'02), vol. 1, pp. 100-123 (2002)
-
(2002)
ICPR '02: Proceedings of the 16 th International Conference on Pattern Recognition (ICPR'02)
, vol.1
, pp. 100-123
-
-
Vielhauer, C.1
Steinmetz, R.2
Mayerhöfer, A.3
-
13
-
-
33748076787
-
A secure biometric authentication scheme based on robust hashing
-
Sutcu, Y., Sencar, H.T., Memon, N.: A secure biometric authentication scheme based on robust hashing. In: MMSec '05: Proceedings of the 7th Workshop on Multimedia and Security, pp. 111-116 (2005)
-
(2005)
MMSec '05: Proceedings of the 7th Workshop on Multimedia and Security
, pp. 111-116
-
-
Sutcu, Y.1
Sencar, H.T.2
Memon, N.3
-
14
-
-
70450255182
-
An iris-based interval-mapping scheme for biometric key generation
-
Rathgeb, C., Uhl, A.: An iris-based interval-mapping scheme for biometric key generation. In: Proceedings of the 6th International Symposium on Image and Signal Processing and Analysis, ISPA '09, Salzburg, Austria (September 2009)
-
Proceedings of the 6th International Symposium on Image and Signal Processing and Analysis, ISPA '09, Salzburg, Austria (September 2009)
-
-
Rathgeb, C.1
Uhl, A.2
-
15
-
-
0742290132
-
How Iris Recognition Works
-
Daugman, J.: How Iris Recognition Works. IEEE Trans. CSVT 14(1), 21-30 (2004)
-
(2004)
IEEE Trans. CSVT
, vol.14
, Issue.1
, pp. 21-30
-
-
Daugman, J.1
-
16
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal 40, 614-634 (2001)
-
(2001)
IBM Systems Journal
, vol.40
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
|