메뉴 건너뛰기




Volumn 6944, Issue , 2008, Pages

A hybrid approach for face template protection

Author keywords

Biometric data security and privacy; Face recognition; Face template protection

Indexed keywords

BIOHASHING; BIOMETRIC DATA; BIOMETRIC SYSTEMS; BIOMETRIC TEMPLATE; CLASS DISTRIBUTIONS; DISCRIMINABILITY; FACE DATABASE; FINGERPRINT BIOMETRICS; FINGERPRINT TEMPLATES; HYBRID ALGORITHMS; HYBRID APPROACH; RANDOM PROJECTIONS; RECOGNITION PERFORMANCE; SECURITY AND PERFORMANCE; TEMPLATE PROTECTION;

EID: 77958151410     PISSN: 0277786X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1117/12.778652     Document Type: Conference Paper
Times cited : (54)

References (33)
  • 1
    • 0742302036 scopus 로고    scopus 로고
    • Biometric recognition: Security and privacy concerns
    • March-April
    • S. Prabhakar, S. Pankanti, and A. K. Jain, "Biometric Recognition: Security and Privacy Concerns," IEEE Security and Privacy Magazine, Vol. 1, No. 2, pp. 33-42, March-April 2003.
    • (2003) IEEE Security and Privacy Magazine , vol.1 , Issue.2 , pp. 33-42
    • Prabhakar, S.1    Pankanti, S.2    Jain, A.K.3
  • 3
    • 26444554928 scopus 로고    scopus 로고
    • Vulnerabilities in biometric encryption systems
    • Audio - and Video-Based Biometric Person Authentication: 5th International Conference, AVBPA 2005. Proceedings
    • A. Adler, "Vulnerabilities in Biometric Encryption Systems," Audio- and Video-Based Biometric Person Authentication, vol. 3546, pp. 1100-1109, 2005. (Pubitemid 41423129)
    • (2005) Lecture Notes in Computer Science , vol.3546 , pp. 1100-1109
    • Adler, A.1
  • 4
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometrics-based authentication systems
    • N. Ratha, J. Connell and R. Bolle, "Enhancing security and privacy in biometric-based authentication systems," IBM Systems Journal, Vol. 40. No. 3, pp. 614 - 634, 2001. (Pubitemid 32933421)
    • (2001) IBM Systems Journal , vol.40 , Issue.3 , pp. 614-634
    • Ratha, N.K.1    Connell, J.H.2    Bolle, R.M.3
  • 6
    • 0031651014 scopus 로고    scopus 로고
    • On enabling secure applications through off-line biometric identification
    • G. Davida, Y. Frankel, and B. Matt, "On enabling secure applications through off-line biometric identification," IEEE Symposium on Privacy and Security, pp. 148-157, 1998.
    • (1998) IEEE Symposium on Privacy and Security , pp. 148-157
    • Davida, G.1    Frankel, Y.2    Matt, B.3
  • 14
    • 33845435077 scopus 로고    scopus 로고
    • Capacity and examples of template-protecting biometric authentication systems
    • P. Tuyls and J. Goseling, "Capacity and Examples of Template-Protecting Biometric Authentication Systems," ECCV Workshop BioAW 2004, pp. 158-170, 2004.
    • (2004) ECCV Workshop BioAW 2004 , pp. 158-170
    • Tuyls, P.1    Goseling, J.2
  • 20
    • 27244453175 scopus 로고    scopus 로고
    • Symmetric hash functions for fingerprint minutiae
    • Pattern Recognition and Data Mining: Third International Conference on Advances in Pattern Recognition, ICAPR 2005. Proceedings
    • S Tulyakov, V Chavan, and V Govindaraju, "Symmetric Hash Functions for Fingerprint Minutiae," Proc. Int'l Workshop Pattern Recognition for Crime Prevention, Security, and Surveillance, pp. 30-38, 2005. (Pubitemid 41520452)
    • (2005) Lecture Notes in Computer Science , vol.3687 , Issue.PART II , pp. 30-38
    • Tulyakov, S.1    Farooq, F.2    Govindaraju, V.3
  • 21
    • 26444448320 scopus 로고    scopus 로고
    • Cancelable key-based fingerprint templates
    • R Ang, R Safavi-Naini, and L McAven, "Cancelable Key-Based Fingerprint Templates," ACISP 2005, pp. 242-252.
    • ACISP 2005 , pp. 242-252
    • Ang, R.1    Safavi-Naini, R.2    McAven, L.3
  • 24
    • 33947177191 scopus 로고    scopus 로고
    • Random multispace quantization as an analytic mechanism for BioHashing of biometric and random identity inputs
    • Dec
    • A. Teoh, A. Goh, and D. Ngo, "Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 28, no. 12, pp. 1892-1901, Dec. 2006.
    • (2006) IEEE Transactions on Pattern Analysis and Machine Intelligence , vol.28 , Issue.12 , pp. 1892-1901
    • Teoh, A.1    Goh, A.2    Ngo, D.3
  • 26
  • 28
    • 33746176055 scopus 로고    scopus 로고
    • A touch of money
    • DOI 10.1109/MSPEC.2006.1653001
    • A. K. Jain and S. Pankanti, "A Touch of Money", IEEE Spectrum, pp. 22-27, July 2006. (Pubitemid 44080992)
    • (2006) IEEE Spectrum , vol.43 , Issue.7 , pp. 22-27
    • Jain, A.K.1    Pankanti, S.2
  • 33
    • 0003195066 scopus 로고
    • The MD5 message-digest algorithm
    • Network Working Group, MIT Laboratory for Computer Science and RSA Data Security, Inc.
    • R. L. Rivest, "The MD5 Message-Digest Algorithm," RFC1321, Network Working Group, MIT Laboratory for Computer Science and RSA Data Security, Inc., 1992.
    • (1992) RFC 1321
    • Rivest, R.L.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.