-
1
-
-
0742302036
-
Biometric recognition: Security and privacy concerns
-
March-April
-
S. Prabhakar, S. Pankanti, and A. K. Jain, "Biometric Recognition: Security and Privacy Concerns," IEEE Security and Privacy Magazine, Vol. 1, No. 2, pp. 33-42, March-April 2003.
-
(2003)
IEEE Security and Privacy Magazine
, vol.1
, Issue.2
, pp. 33-42
-
-
Prabhakar, S.1
Pankanti, S.2
Jain, A.K.3
-
3
-
-
26444554928
-
Vulnerabilities in biometric encryption systems
-
Audio - and Video-Based Biometric Person Authentication: 5th International Conference, AVBPA 2005. Proceedings
-
A. Adler, "Vulnerabilities in Biometric Encryption Systems," Audio- and Video-Based Biometric Person Authentication, vol. 3546, pp. 1100-1109, 2005. (Pubitemid 41423129)
-
(2005)
Lecture Notes in Computer Science
, vol.3546
, pp. 1100-1109
-
-
Adler, A.1
-
4
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
N. Ratha, J. Connell and R. Bolle, "Enhancing security and privacy in biometric-based authentication systems," IBM Systems Journal, Vol. 40. No. 3, pp. 614 - 634, 2001. (Pubitemid 32933421)
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
6
-
-
0031651014
-
On enabling secure applications through off-line biometric identification
-
G. Davida, Y. Frankel, and B. Matt, "On enabling secure applications through off-line biometric identification," IEEE Symposium on Privacy and Security, pp. 148-157, 1998.
-
(1998)
IEEE Symposium on Privacy and Security
, pp. 148-157
-
-
Davida, G.1
Frankel, Y.2
Matt, B.3
-
9
-
-
84937704662
-
Secure smartcard-based fingerprint authentication
-
T. C. Clancy, N. Kiyavash, and D. J. Lin, "Secure smartcard-based fingerprint authentication", Proc. ACMSIGMM 2003 Multimedia, Biometrics Methods and Applications Workshop, pp. 45-52, 2003.
-
(2003)
Proc. ACMSIGMM 2003 Multimedia, Biometrics Methods and Applications Workshop
, pp. 45-52
-
-
Clancy, T.C.1
Kiyavash, N.2
Lin, D.J.3
-
11
-
-
0032224440
-
Biometric encryption using image processing
-
C. Soutar, D. Roberge, A. Stoinav, G. Gilroy and V. Kumar, "Biometric Encryption Using Image Processing," Proc. SPIE, vol. 3314, pp. 174-188, 1998.
-
(1998)
Proc. SPIE
, vol.3314
, pp. 174-188
-
-
Soutar, C.1
Roberge, D.2
Stoinav, A.3
Gilroy, G.4
Kumar, V.5
-
13
-
-
0034829626
-
Cryptographic key generation from voice
-
F. Monrose, M. Reiter, Q. Li and S. Wetzel, "Cryptographic Key Generation from Voice," Proc. IEEE Symp. Security and Privacy, pp.202-213, May 2001. (Pubitemid 32882637)
-
(2001)
Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 202-213
-
-
Monrose, F.1
Reiter, M.K.2
Li, Q.3
Wetzel, S.4
-
14
-
-
33845435077
-
Capacity and examples of template-protecting biometric authentication systems
-
P. Tuyls and J. Goseling, "Capacity and Examples of Template-Protecting Biometric Authentication Systems," ECCV Workshop BioAW 2004, pp. 158-170, 2004.
-
(2004)
ECCV Workshop BioAW 2004
, pp. 158-170
-
-
Tuyls, P.1
Goseling, J.2
-
15
-
-
33750918446
-
Combining cryptography with biometric effectively
-
UCAM-CL-TR-640, ISSN 1476-2986
-
F. Hao, R. Anderson and J. Daugman, "Combining cryptography with biometric effectively", Technical Report, University of Cambridge, UCAM-CL-TR-640, ISSN 1476-2986, 2005.
-
(2005)
Technical Report, University of Cambridge
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
16
-
-
34547512147
-
Using distributed source coding to secure fingerprint biometric
-
S C Draper, A Khisti and E Martinian, A Vetro and J S Yedidia, "Using distributed source coding to secure fingerprint biometric", Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, 2007.
-
(2007)
Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing
-
-
Draper, S.C.1
Khisti, A.2
Martinian, E.3
Vetro, A.4
Yedidia, J.S.5
-
17
-
-
34548074162
-
Protecting biometric template with sketch: Theory and practice
-
Y Sutcu, Q Li and N Memon, "Protecting biometric template with sketch: theory and practice", IEEE Transactions on Information Forensics and Security, Vol. 2, No. 3 Part 2, pp. 503-512, 2007.
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.3 PART 2
, pp. 503-512
-
-
Sutcu, Y.1
Li, Q.2
Memon, N.3
-
18
-
-
33947529940
-
Cancelable biometrics: A case study in fingerprints
-
N Ratha, J Connell, R Bolle, S Chikkerur, "Cancelable biometrics: A case study in Fingerprints", Proceedings of International Conference on Pattern Recognition, 2006.
-
(2006)
Proceedings of International Conference on Pattern Recognition
-
-
Ratha, N.1
Connell, J.2
Bolle, R.3
Chikkerur, S.4
-
19
-
-
33947530278
-
Generating cancelable fingerprint templates
-
N Ratha, S Chikkerur, J Connell, R Bolle, "Generating Cancelable Fingerprint Templates", IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 29, pp. 561-752, 2007
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, pp. 561-752
-
-
Ratha, N.1
Chikkerur, S.2
Connell, J.3
Bolle, R.4
-
20
-
-
27244453175
-
Symmetric hash functions for fingerprint minutiae
-
Pattern Recognition and Data Mining: Third International Conference on Advances in Pattern Recognition, ICAPR 2005. Proceedings
-
S Tulyakov, V Chavan, and V Govindaraju, "Symmetric Hash Functions for Fingerprint Minutiae," Proc. Int'l Workshop Pattern Recognition for Crime Prevention, Security, and Surveillance, pp. 30-38, 2005. (Pubitemid 41520452)
-
(2005)
Lecture Notes in Computer Science
, vol.3687
, Issue.PART II
, pp. 30-38
-
-
Tulyakov, S.1
Farooq, F.2
Govindaraju, V.3
-
22
-
-
33748076787
-
A secure biometric authentication scheme based on roubst hashing
-
Y. Sutcu, H. Sencar, and N. Nemon, "A Secure Biometric Authentication Scheme Based on Roubst Hashing," Proc. Seventh Workshop Multimedia and Security, pp.111-116, 2005.
-
(2005)
Proc. Seventh Workshop Multimedia and Security
, pp. 111-116
-
-
Sutcu, Y.1
Sencar, H.2
Nemon, N.3
-
23
-
-
33746368690
-
Biometric hash: High-confidence face recognition
-
D Ngo, A Teoh, and A Goh, "Biometric Hash: High-Confidence Face Recognition", IEEE Transactions on Ceircuits and Systems for Video Technology, vol. 16, no. 6, 2006.
-
(2006)
IEEE Transactions on Ceircuits and Systems for Video Technology
, vol.16
, Issue.6
-
-
Ngo, D.1
Teoh, A.2
Goh, A.3
-
24
-
-
33947177191
-
Random multispace quantization as an analytic mechanism for BioHashing of biometric and random identity inputs
-
Dec
-
A. Teoh, A. Goh, and D. Ngo, "Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 28, no. 12, pp. 1892-1901, Dec. 2006.
-
(2006)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.28
, Issue.12
, pp. 1892-1901
-
-
Teoh, A.1
Goh, A.2
Ngo, D.3
-
25
-
-
34547498471
-
Class-distribution preserving transform for face biometric data security
-
Y C Feng and P C Yuen, "Class-Distribution Preserving Transform for Face Biometric Data Security," Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pp. 141-144, 2007.
-
(2007)
Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP)
, pp. 141-144
-
-
Feng, Y.C.1
Yuen, P.C.2
-
27
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
U Uludag, S Pankanti, S Prabhakar, and A K Jain, "Biometric cryptosystems: issues and challenges," Proceedings of the IEEE, vol. 92, no. 6, pp. 948-960, 2004.
-
(2004)
Proceedings of the IEEE
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
-
28
-
-
33746176055
-
A touch of money
-
DOI 10.1109/MSPEC.2006.1653001
-
A. K. Jain and S. Pankanti, "A Touch of Money", IEEE Spectrum, pp. 22-27, July 2006. (Pubitemid 44080992)
-
(2006)
IEEE Spectrum
, vol.43
, Issue.7
, pp. 22-27
-
-
Jain, A.K.1
Pankanti, S.2
-
31
-
-
0031185845
-
Eigenfaces vs. fisherfaces: Recognition using class specific linear projection
-
P N Belhumeur, J P Hespanha, and D J Kriegman, "Eigenfaces vs. fisherfaces: Recognition using class specific linear projection", IEEE Trans. on Pattern Analysis and Machine Intelligence, 19(7), pp. 711-720, 1997. (Pubitemid 127762263)
-
(1997)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.19
, Issue.7
, pp. 711-720
-
-
Belhumeur, P.N.1
Hespanha, J.P.2
Kriegman, D.J.3
-
32
-
-
37849009414
-
Hardening fingerprint fuzzy vault using password
-
LNCS 4642
-
Karthik Nandakumar, Abhishek Nagar and Anil K. Jain, "Hardening Fingerprint Fuzzy Vault Using Password", in Proceedings of International Conference on Biometrics, LNCS 4642, pp. 927-937, 2007.
-
(2007)
Proceedings of International Conference on Biometrics
, pp. 927-937
-
-
Nandakumar, K.1
Nagar, A.2
Jain, A.K.3
-
33
-
-
0003195066
-
The MD5 message-digest algorithm
-
Network Working Group, MIT Laboratory for Computer Science and RSA Data Security, Inc.
-
R. L. Rivest, "The MD5 Message-Digest Algorithm," RFC1321, Network Working Group, MIT Laboratory for Computer Science and RSA Data Security, Inc., 1992.
-
(1992)
RFC 1321
-
-
Rivest, R.L.1
|