-
2
-
-
17444392509
-
The CSU face identification evaluation system
-
J. R. Beveridge, D. Bolme, B. A. raper, and M. Teixeira. The CSU Face Identification Evaluation System. Machine Vision and Applications, 16(2):128-138, 2005.
-
(2005)
Machine Vision and Applications
, vol.16
, Issue.2
, pp. 128-138
-
-
Beveridge, J.R.1
Bolme, D.2
Raper, B.A.3
Teixeira, M.4
-
4
-
-
48649102434
-
Optimal iris fuzzy sketches
-
J. Bringer, H. Chabanne, G. Cohen, B. Kindarji, and G. Zémor. Optimal Iris Fuzzy Sketches. In IEEE Conference on Biometrics: Theory, Applications and Systems, 2007.
-
(2007)
IEEE Conference on Biometrics: Theory, Applications and Systems
-
-
Bringer, J.1
Chabanne, H.2
Cohen, G.3
Kindarji, B.4
Zémor, G.5
-
8
-
-
0036487317
-
The importance of being random: Statistical principles of iris recognition
-
February
-
J. Daugman. The importance of being random: Statistical principles of iris recognition. Pattern Recognition, 36(2):279-291, February 2003.
-
(2003)
Pattern Recognition
, vol.36
, Issue.2
, pp. 279-291
-
-
Daugman, J.1
-
9
-
-
33747624401
-
Combining crypto with biometrics effectively
-
F. Hao, R. Anderson, and J. Daugman. Combining crypto with biometrics effectively. IEEE Transactions on Computers, 55(9):1081-1088, 2006.
-
(2006)
IEEE Transactions on Computers
, vol.55
, Issue.9
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
10
-
-
12344259813
-
Biohashing: Two factor authentication featuring fingerprint data and tokenized random number
-
November
-
A. T. B. Jin, D. Ngo, C. Ling, and A. Goh. Biohashing: two factor authentication featuring fingerprint data and tokenized random number. Pattern Recognition, 37(11):2245-2255, November 2004.
-
(2004)
Pattern Recognition
, vol.37
, Issue.11
, pp. 2245-2255
-
-
Jin, A.T.B.1
Ngo, D.2
Ling, C.3
Goh, A.4
-
11
-
-
0036350106
-
A fuzzy vault scheme
-
A. Lapidoth and E. Teletar, editors. IEEE Press
-
A. Juels and M. Sudan. A fuzzy vault scheme. In A. Lapidoth and E. Teletar, editors, Proc. IEEE Int. Symp. Information Theory, page 408. IEEE Press, 2002.
-
(2002)
Proc. IEEE Int. Symp. Information Theory
, pp. 408
-
-
Juels, A.1
Sudan, M.2
-
13
-
-
56749164763
-
Three factor scheme for biometric-based cryptographic key regeneration using iris
-
September
-
S. Kanade, D. Camara, E. Krichen, D. Petrovska-Delacrétaz, and B. Dorizzi. Three factor scheme for biometric-based cryptographic key regeneration using iris. In The 6th Biometrics Symposium 2008 (BSYM2008), September 2008.
-
(2008)
The 6th Biometrics Symposium 2008 (BSYM2008)
-
-
Kanade, S.1
Camara, D.2
Krichen, E.3
Petrovska-Delacrétaz, D.4
Dorizzi, B.5
-
15
-
-
71749100831
-
Multi-biometrics based cryptographic key regeneration scheme
-
September
-
S. Kanade, D. Petrovska-Delacrétaz, and B. Dorizzi. Multi-Biometrics Based Cryptographic Key Regeneration Scheme. In IEEE International Conference on Biometrics: Theory, Applications, and Systems (BTAS), September 2009.
-
(2009)
IEEE International Conference on Biometrics: Theory, Applications, and Systems (BTAS)
-
-
Kanade, S.1
Petrovska-Delacrétaz, D.2
Dorizzi, B.3
-
17
-
-
70450209665
-
Iris recognition
-
D. Petrovska-Delacrétaz, G. Chollet, and B. Dorizzi, editors. Springer-Verlag
-
E. Krichen, B. Dorizzi, Z. Sun, S. Garcia-Salicetti, and T. Tan. Iris Recognition. In D. Petrovska-Delacrétaz, G. Chollet, and B. Dorizzi, editors, Guide to Biometric Reference Systems and Performance Evaluation, pages 25-50. Springer-Verlag, 2009.
-
(2009)
Guide to Biometric Reference Systems and Performance Evaluation
, pp. 25-50
-
-
Krichen, E.1
Dorizzi, B.2
Sun, Z.3
Garcia-Salicetti, S.4
Tan, T.5
-
18
-
-
0027558293
-
Distortion invariant object recognition in the dynamic link architecture
-
March
-
M. Lades, J. C. Vorbrüuggen, J. Buhmann, J. Lange, C. v.d. Malsburg, R. P. Wüurtz, and W. Konen. Distortion Invariant Object Recognition in the Dynamic Link Architecture. IEEE Transactions on Computers, 42(3):300-311, March 1993.
-
(1993)
IEEE Transactions on Computers
, vol.42
, Issue.3
, pp. 300-311
-
-
Lades, M.1
Vorbrüuggen, J.C.2
Buhmann, J.3
Lange, J.4
Malsburg, C.V.D.5
Wüurtz, R.P.6
Konen, W.7
-
19
-
-
33750533142
-
An improved biohashing for human authentication
-
March
-
A. Lumini and L. Nanni. An improved biohashing for human authentication. Pattern Recognition, 40(3):1057-1065, March 2007.
-
(2007)
Pattern Recognition
, vol.40
, Issue.3
, pp. 1057-1065
-
-
Lumini, A.1
Nanni, L.2
-
20
-
-
0034829626
-
Cryptographic key generation from voice
-
May
-
F. Monrose, M. Reiter, Q. Li, and S. Wetzel. Cryptographic key generation from voice. In Proceedings of the IEEE Symposium on Security and Privacy, pages 202-213, May 2001.
-
(2001)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 202-213
-
-
Monrose, F.1
Reiter, M.2
Li, Q.3
Wetzel, S.4
-
23
-
-
77956512012
-
-
National Institute of Science and Technology (NIST)
-
National Institute of Science and Technology (NIST). Face Recognition Grand Challenge, 2005. http://www.frvt.org/FRGC/.
-
(2005)
Face Recognition Grand Challenge
-
-
-
24
-
-
48649087855
-
-
National Institute of Science and Technology (NIST)
-
National Institute of Science and Technology (NIST). Iris Challenge Evaluation, 2005. http://iris.nist.gov/ice.
-
(2005)
Iris Challenge Evaluation
-
-
-
25
-
-
33947530278
-
Generating cancelable fingerprint templates
-
April
-
N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle. Generating cancelable fingerprint templates. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(4):561-572, April 2007.
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.K.1
Chikkerur, S.2
Connell, J.H.3
Bolle, R.M.4
-
26
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
N. K. Ratha, J. H. Connell, and R. M. Bolle. Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal, 40(3):614-634, 2001.
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
28
-
-
10044284550
-
Cancelable biometric filters for face recognition
-
August
-
M. Savvides, B. V. Kumar, and P. Khosla. Cancelable biometric filters for face recognition. In Proceedings of the 17th International Conference on Pattern Recognition (ICPR04), volume 3, pages 922-925, August 2004.
-
(2004)
Proceedings of the 17th International Conference on Pattern Recognition (ICPR04)
, vol.3
, pp. 922-925
-
-
Savvides, M.1
Kumar, B.V.2
Khosla, P.3
-
29
-
-
8344236959
-
Biometric encryption
-
McGraw-Hill
-
C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, and B. V. Kumar. Biometric encryption. In ICSA guide to Cryptography. McGraw-Hill, 1999.
-
(1999)
ICSA Guide to Cryptography
-
-
Soutar, C.1
Roberge, D.2
Stoianov, A.3
Gilroy, R.4
Kumar, B.V.5
-
30
-
-
51849159844
-
-
P. Tuyls, B. Škorić, and T. Kevenaar, editors. Springer
-
P. Tuyls, B. Š korić, and T. Kevenaar, editors. Security with Noisy Data. Springer, 2007.
-
(2007)
Security with Noisy Data
-
-
-
32
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
June
-
U. Uludag, S. Pankanti, S. Prabhakar, and A. Jain. Biometric cryptosystems: issues and challenges. Proceedings of the IEEE, 92(6):948-960, June 2004.
-
(2004)
Proceedings of the IEEE
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.4
|