-
1
-
-
0742290133
-
An introduction to biometric recognition
-
Jan.
-
A. K. Jain, A. Ross, and S. Prabhakar, "An introduction to biometric recognition," IEEE Trans. Circuits Syst. Video Technol., vol.14, no.1, pp. 4-20, Jan. 2004.
-
(2004)
IEEE Trans. Circuits Syst. Video Technol.
, vol.14
, Issue.1
, pp. 4-20
-
-
Jain, A.K.1
Ross, A.2
Prabhakar, S.3
-
2
-
-
0036887662
-
Biometric perils and patches
-
Dec.
-
R. M. Bolle, J. H. Connel, and N. K. Ratha, "Biometric perils and patches," Pattern Recognit., vol.35, no.12, pp. 2727-2738, Dec. 2002.
-
(2002)
Pattern Recognit.
, vol.35
, Issue.12
, pp. 2727-2738
-
-
Bolle, R.M.1
Connel, J.H.2
Ratha, N.K.3
-
3
-
-
50249156015
-
Face based biometric authentication with changeable and privacy preserving templates
-
Baltimore, MD, Sep.
-
Y. Wang and K. Plataniotis, "Face based biometric authentication with changeable and privacy preserving templates," in Proc. BSYM, Baltimore, MD, Sep. 2007.
-
(2007)
Proc. BSYM
-
-
Wang, Y.1
Plataniotis, K.2
-
4
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
Jun.
-
U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, "Biometric cryptosystems: Issues and challenges," Proc. IEEE, vol.92, no.6, pp. 948-960, Jun. 2004.
-
(2004)
Proc. IEEE
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
-
5
-
-
26444554928
-
Vulnerabilities in biometric encryption systems
-
Tarrytown, NY, Jul.
-
A. Adler, "Vulnerabilities in biometric encryption systems," in Proc. Audio Video Based Biometric Person Authentication, Tarrytown, NY, Jul. 2005, pp. 1100-1109.
-
(2005)
Proc. Audio Video Based Biometric Person Authentication
, pp. 1100-1109
-
-
Adler, A.1
-
6
-
-
50249107013
-
Cracking fuzzy vaults and biometric encryption
-
Baltimore, MD, Sep.
-
W. J. Scheirer and T. E. Boult, "Cracking fuzzy vaults and biometric encryption," in Proc. BSYM, Baltimore, MD, Sep. 2007.
-
(2007)
Proc. BSYM
-
-
Scheirer, W.J.1
Boult, T.E.2
-
7
-
-
35148885090
-
Cancellable biometrics realization with multispace random projections
-
Cybern.-Special Issue on Recent Advances in Biometrics Systems Oct.
-
A. B. J. Teoh and C. T. Yuang, "Cancellable biometrics realization with multispace random projections," IEEE Trans. Syst., Man, Cybern. B, Cybern.-Special Issue on Recent Advances in Biometrics Systems, vol.37, no.5, pp. 1096-1106, Oct. 2007.
-
(2007)
IEEE Trans. Syst., Man, Cybern. B
, vol.37
, Issue.5
, pp. 1096-1106
-
-
Teoh, A.B.J.1
Yuang, C.T.2
-
8
-
-
8344236959
-
Biometric encryption
-
New York: McGraw-Hill
-
C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, and B. V. K. Vijaya Kumar, "Biometric encryption," in ICSA Guide to Cryptography. New York: McGraw-Hill, 1999.
-
(1999)
ICSA Guide to Cryptography
-
-
Soutar, C.1
Roberge, D.2
Stoianov, A.3
Gilroy, R.4
Vijaya Kumar, B.V.K.5
-
9
-
-
0031651014
-
On enabling secure applications through off-line biometric identification
-
G. I. Davida, Y. Frankel, and B. J. Matt, "On enabling secure applications through off-line biometric identification," in Proc. IEEE Symp. Security Privacy, 1998, pp. 148-157.
-
(1998)
Proc. IEEE Symp. Security Privacy
, pp. 148-157
-
-
Davida, G.I.1
Frankel, Y.2
Matt, B.J.3
-
11
-
-
33747624401
-
Combining crypto with biometric effectively
-
Sep.
-
F. Hao, R. Anderson, and J. Daugman, "Combining crypto with biometric effectively," IEEE Trans. Comput., vol.55, no.9, pp. 1081-1088, Sep. 2006.
-
(2006)
IEEE Trans. Comput.
, vol.55
, Issue.9
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
13
-
-
52349122571
-
A new method for generating an invariant iris private key based on the fuzzy vault system
-
Oct.
-
Y. J. Lee, K. R. Park, S. J. Lee, K. Bae, and J. Kim, "A new method for generating an invariant iris private key based on the fuzzy vault system," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol.38, no.5, pp. 1302-1313, Oct. 2008.
-
(2008)
IEEE Trans. Syst., Man, Cybern. B, Cybern.
, vol.38
, Issue.5
, pp. 1302-1313
-
-
Lee, Y.J.1
Park, K.R.2
Lee, S.J.3
Bae, K.4
Kim, J.5
-
14
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Proc. Eurocrypt, 2004, pp. 523-540.
-
(2004)
Proc. Eurocrypt
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
15
-
-
34548074162
-
Protecting biometric templates with sketch: Theory and practice
-
Sep.
-
Y. Sutcu, Q. Li, and N. Memon, "Protecting biometric templates with sketch: Theory and practice," IEEE Trans. Inf. Forensics Security, vol.2, no.3, pp. 503-512, Sep. 2007.
-
(2007)
IEEE Trans. Inf. Forensics Security
, vol.2
, Issue.3
, pp. 503-512
-
-
Sutcu, Y.1
Li, Q.2
Memon, N.3
-
16
-
-
14844335721
-
Reusable cryptographic fuzzy extractors
-
X. Boyen, "Reusable cryptographic fuzzy extractors," in Proc. CCS, 2004, pp. 82-91.
-
(2004)
Proc. CCS
, pp. 82-91
-
-
Boyen, X.1
-
17
-
-
33947530278
-
Generating cancelable fingerprint templates
-
Apr.
-
N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, "Generating cancelable fingerprint templates," IEEE Trans. Pattern Anal. Mach. Intell., vol.29, no.4, pp. 561-572, Apr. 2007.
-
(2007)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.K.1
Chikkerur, S.2
Connell, J.H.3
Bolle, R.M.4
-
18
-
-
33750954911
-
Face recognition with renewable and privacy preserving binary templates
-
Oct. 17-18
-
T. A. M. Kevenaar, G. G. Schrijen,M. van der Veen, A. H.M. Akkermans, and F. Zuo, "Face recognition with renewable and privacy preserving binary templates," in Proc. 4th IEEE Workshop Autom. Identification Adv. Technol., Oct. 17-18, 2005, pp. 21-26.
-
(2005)
Proc. 4th IEEE Workshop Autom. Identification Adv. Technol.
, pp. 21-26
-
-
Kevenaar, T.A.M.1
Schrijen, G.G.2
Van Der Veen, M.3
Akkermans, A.H.M.4
Zuo, F.5
-
19
-
-
10044284550
-
Cancelable biometric filters for face recognition
-
M. Savvides, B. V. K. Vijaya Kumar, and P. K. Khosla, "Cancelable biometric filters for face recognition," in Proc. 17th Int. Conf. Pattern Recog., 2004, pp. 922-925.
-
(2004)
Proc. 17th Int. Conf. Pattern Recog.
, pp. 922-925
-
-
Savvides, M.1
Vijaya Kumar, B.V.K.2
Khosla, P.K.3
-
20
-
-
33750799305
-
Robust distance measures for face-recognition supporting revocable biometric tokens
-
Apr.
-
T. E. Boult, "Robust distance measures for face-recognition supporting revocable biometric tokens," in Proc. IEEE Conf. Face Gesture, Apr. 2006, pp. 560-566.
-
(2006)
Proc. IEEE Conf. Face Gesture
, pp. 560-566
-
-
Boult, T.E.1
-
21
-
-
33746368690
-
Biometric hash: Highconfidence face recognition
-
Jun.
-
D. C. L. Ngo, A. B. J. Teoh, and A. Goh, "Biometric hash: highconfidence face recognition," IEEE Trans. Circuits Syst. Video Technol., vol.16, no.6, pp. 771-775, Jun. 2006.
-
(2006)
IEEE Trans. Circuits Syst. Video Technol.
, vol.16
, Issue.6
, pp. 771-775
-
-
Ngo, D.C.L.1
Teoh, A.B.J.2
Goh, A.3
-
22
-
-
33747604157
-
Remarks on BioHash and its mathematical foundation
-
Nov.
-
A. B. J. Teoh, T. Connie, D. Ngo, and C. Ling, "Remarks on BioHash and its mathematical foundation," Inf. Process. Lett., vol.100, no.4, pp. 145-150, Nov. 2006.
-
(2006)
Inf. Process. Lett.
, vol.100
, Issue.4
, pp. 145-150
-
-
Teoh, A.B.J.1
Connie, T.2
Ngo, D.3
Ling, C.4
-
23
-
-
0001654702
-
Extensions of Lipshitz mapping into Hilbert space
-
W. B. Johnson and J. Lindenstrauss, "Extensions of Lipshitz mapping into Hilbert space," Contemp. Math., vol.26, pp. 189-206, 1984.
-
(1984)
Contemp. Math.
, vol.26
, pp. 189-206
-
-
Johnson, W.B.1
Lindenstrauss, J.2
-
24
-
-
38249031101
-
The Johnson-Lindenstrauss lemma and the sphericity of some graphs
-
Jun.
-
P. Frankl and H. Maehara, "The Johnson-Lindenstrauss lemma and the sphericity of some graphs," J. Combin. Theory, Ser. A, vol.44, no.3, pp. 355-362, Jun. 1987.
-
(1987)
J. Combin. Theory, Ser. A
, vol.44
, Issue.3
, pp. 355-362
-
-
Frankl, P.1
Maehara, H.2
-
25
-
-
0031644241
-
Approximate nearest neighbors: Towards removing the curse of dimensionality
-
Dallas, TX
-
P. Indyk and R. Motwani, "Approximate nearest neighbors: Towards removing the curse of dimensionality," in Proc. 30th Annu. ACM Symp. Theory Comput., Dallas, TX, 1998, pp. 604-613.
-
(1998)
Proc. 30th Annu. ACM Symp. Theory Comput.
, pp. 604-613
-
-
Indyk, P.1
Motwani, R.2
-
26
-
-
0003733695
-
An elementary proof of the Johnson-Lindenstrauss lemma
-
Berkeley, CA, Tech. Rep., Mar.
-
S. Dasgupta and A. Gupta, "An elementary proof of the Johnson-Lindenstrauss lemma," UC Berkeley, Berkeley, CA, Tech. Rep. 99-1006, Mar. 1999.
-
(1999)
UC Berkeley
, pp. 99-1006
-
-
Dasgupta, S.1
Gupta, A.2
-
27
-
-
0033354520
-
An algorithmic theory of learning: Robust concepts and random projection
-
Oct. 17-18
-
R. I. Arriaga and S. Vempala, "An algorithmic theory of learning: Robust concepts and random projection," in Proc. 40th Annu. Symp. Foundations Comput. Sci., Oct. 17-18, 1999, pp. 616-623.
-
(1999)
Proc. 40th Annu. Symp. Foundations Comput. Sci.
, pp. 616-623
-
-
Arriaga, R.I.1
Vempala, S.2
-
29
-
-
33749573641
-
Very sparse random projections
-
Philadelphia, PA
-
P. Li, T. J. Hastie, and K. W. Church, "Very sparse random projections," in Proc. 12th ACM Int. Conf. Knowl. Discovery Data Mining SIGKDD, Philadelphia, PA, 2006, pp. 287-296.
-
(2006)
Proc. 12th ACM Int. Conf. Knowl. Discovery Data Mining SIGKDD
, pp. 287-296
-
-
Li, P.1
Hastie, T.J.2
Church, K.W.3
-
30
-
-
14844315829
-
-
Providence, RI: AMS, ser. DIMACS Series in Discrete Mathematics and Theoretical Computer Science
-
S. Vempala, The Random Projection Method, vol.65. Providence, RI: AMS, 2004, ser. DIMACS Series in Discrete Mathematics and Theoretical Computer Science.
-
(2004)
The Random Projection Method
, vol.65
-
-
Vempala, S.1
-
31
-
-
38749118638
-
Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions
-
A. Andoni and P. Indyk, "Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions," in Proc. 47th Annu. IEEE Symp. FOCS, 2006, pp. 459-468.
-
(2006)
Proc. 47th Annu. IEEE Symp. FOCS
, pp. 459-468
-
-
Andoni, A.1
Indyk, P.2
-
32
-
-
26444442431
-
Face recognition experiments with random projection
-
Orlando, FL, Mar.
-
N. Goel and G. Bebis, "Face recognition experiments with random projection," in Proc. SPIE Defense Security Symp., Orlando, FL, Mar. 2005, p. 426.
-
(2005)
Proc. SPIE Defense Security Symp.
, pp. 426
-
-
Goel, N.1
Bebis, G.2
-
33
-
-
0035789317
-
Random projection in dimensionality reduction: Applications to image and text data
-
E. Brigham and H. Maninila, "Random projection in dimensionality reduction: Applications to image and text data," in Proc. Int. Conf. Knowl. Discovery Data Mining, 2001, pp. 245-250.
-
(2001)
Proc. Int. Conf. Knowl. Discovery Data Mining
, pp. 245-250
-
-
Brigham, E.1
Maninila, H.2
-
34
-
-
0031625017
-
Dimensionality reduction by random mapping: Fast similarity computation for clustering
-
Piscataway, NJ
-
S. Kaski, "Dimensionality reduction by random mapping: Fast similarity computation for clustering," in Proc. Int. Joint Conf. Neural Netw., Piscataway, NJ, 1998, vol.1, pp. 413-418.
-
(1998)
Proc. Int. Joint Conf. Neural Netw.
, vol.1
, pp. 413-418
-
-
Kaski, S.1
-
36
-
-
31344447750
-
Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
-
Jan.
-
K. Liu, H. Kargupta, and J. Ryan, "Random projection-based multiplicative data perturbation for privacy preserving distributed data mining," IEEE Trans. Knowl. Data Eng., vol.18, no.1, pp. 92-106, Jan. 2006.
-
(2006)
IEEE Trans. Knowl. Data Eng.
, vol.18
, Issue.1
, pp. 92-106
-
-
Liu, K.1
Kargupta, H.2
Ryan, J.3
-
37
-
-
28844447994
-
Privacy-preserving clustering by object similarity-based representation and dimensionality reduction transformation
-
4th IEEE ICDM
-
S. T. M. Oliveira and O.R. Zaiane, "Privacy-preserving clustering by object similarity-based representation and dimensionality reduction transformation," in Proc. Workshop PSADM, 4th IEEE ICDM, 2004, pp. 21-30.
-
(2004)
Proc. Workshop PSADM
, pp. 21-30
-
-
Oliveira, S.T.M.1
Zaiane, O.R.2
-
41
-
-
70349959198
-
-
Ph.D. dissertation, Univ. Maryland, Baltimore, MD, Jan.
-
K. Liu, "Multiplicative data perturbation for privacy preserving data mining," Ph.D. dissertation, Univ. Maryland, Baltimore, MD, Jan., 2007.
-
(2007)
Multiplicative Data Perturbation for Privacy Preserving Data Mining
-
-
Liu, K.1
-
42
-
-
2942529194
-
Privacy-preserving multivariate statistical analysis: Linear regression and classification
-
Apr.
-
W. Du, Y. S. Han, and S. Chen, "Privacy-preserving multivariate statistical analysis: Linear regression and classification," in Proc. SIAM Int. Conf. Data Mining SDM, Apr. 2004, pp. 222-233.
-
(2004)
Proc. SIAM Int. Conf. Data Mining SDM
, pp. 222-233
-
-
Du, W.1
Han, Y.S.2
Chen, S.3
-
43
-
-
33744984847
-
On solving the face recognition problem with one training sample per subject
-
DOI 10.1016/j.patcog.2006.03.010, PII S0031320306001233
-
J. Wang, K. N. Plataniotis, J. Lu, and A. N. Venetsanopoulos, "On solving the face recognition problem with one training sample per subject," Pattern Recognit., vol.39, no.9, pp. 1746-1762, Sep. 2006. (Pubitemid 43867573)
-
(2006)
Pattern Recognition
, vol.39
, Issue.9
, pp. 1746-1762
-
-
Wang, J.1
Plataniotis, K.N.2
Lu, J.3
Venetsanopoulos, A.N.4
-
44
-
-
0032045780
-
The FERET database and evaluation procedure for face-recognition algorithms
-
Apr.
-
P. J. Phillips, H. Wechsler, J. Huang, and P. Rauss, "The FERET database and evaluation procedure for face-recognition algorithms," Image Vis. Comput., vol.16, no.5, pp. 295-306, Apr. 1998.
-
(1998)
Image Vis. Comput.
, vol.16
, Issue.5
, pp. 295-306
-
-
Phillips, P.J.1
Wechsler, H.2
Huang, J.3
Rauss, P.4
-
45
-
-
0034290919
-
The FERET evaluation methodology for face-recognition algorithms
-
Oct.
-
P. J. Phillips, H. Moon, P. J. Rauss, and S. Rizvi, "The FERET evaluation methodology for face-recognition algorithms," IEEE Trans. Pattern Anal. Mach. Intell., vol.22, no.10, pp. 1090-1104, Oct. 2000.
-
(2000)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.22
, Issue.10
, pp. 1090-1104
-
-
Phillips, P.J.1
Moon, H.2
Rauss, P.J.3
Rizvi, S.4
-
46
-
-
0347380229
-
The CMU Pose, Illumination, and Expression database
-
Dec.
-
T. Sim, S. Baker, and M. Bsat, "The CMU Pose, Illumination, and Expression database," IEEE Trans. Pattern Anal. Mach. Intell., vol.25, no.12, pp. 1615-1618, Dec. 2003.
-
(2003)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.25
, Issue.12
, pp. 1615-1618
-
-
Sim, T.1
Baker, S.2
Bsat, M.3
-
48
-
-
77956673731
-
-
Aging Database [Online]. Available:
-
Aging Database. [Online]. Available: http://www.fgnet.rsunit.com/
-
-
-
-
49
-
-
84898026003
-
-
[Online]. Available:
-
BioID Database. [Online]. Available: http://www.humanscan.de/support/ downloads/facedb.php
-
BioID Database
-
-
-
50
-
-
0035248924
-
PCA versus LDA
-
Feb.
-
A. M. Martinez and A. C. Kak, "PCA versus LDA," IEEE Trans. Pattern Anal. Mach. Intell., vol.23, no.2, pp. 228-233, Feb. 2001.
-
(2001)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.23
, Issue.2
, pp. 228-233
-
-
Martinez, A.M.1
Kak, A.C.2
-
51
-
-
0026065565
-
Eigenfaces for recognition
-
M. Turk and A. Pentland, "Eigenfaces for recognition," J. Cogn. Neurosci., vol.13, no.1, pp. 71-86, 1991.
-
(1991)
J. Cogn. Neurosci.
, vol.13
, Issue.1
, pp. 71-86
-
-
Turk, M.1
Pentland, A.2
|