-
1
-
-
33947492044
-
From template to image: Reconstructing fingerprints from minutiae points
-
Apr.
-
A. Ross, J. Shah, and A. Jain, "From template to image: Reconstructing fingerprints from minutiae points," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 29, pp. 544-560, Apr. 2007.
-
(2007)
IEEE Trans. Pattern Analysis and Machine Intelligence
, vol.29
, pp. 544-560
-
-
Ross, A.1
Shah, J.2
Jain, A.3
-
2
-
-
34548074162
-
Protecting biometric templates with sketch: Theory and practice
-
Sept.
-
Y. Sutcu, Q. Li, and N. Memon, "Protecting biometric templates with sketch: Theory and practice," IEEE Trans. Inf. Forensics and Security, vol. 2, pp. 503-512, Sept. 2007.
-
(2007)
IEEE Trans. Inf. Forensics and Security
, vol.2
, pp. 503-512
-
-
Sutcu, Y.1
Li, Q.2
Memon, N.3
-
3
-
-
34547512147
-
Using distributed source coding to secure fingerprint biometrics
-
Apr.
-
S. Draper, A. Khisti, E. Martinian, A. Vetro, and J. Yedidia, "Using distributed source coding to secure fingerprint biometrics," in Proc. IEEE Intl. Conf. on Acoustics, Speech, and Signal Processing, (Honolulu, HI), pp. 129-132, Apr. 2007.
-
(2007)
Proc. IEEE Intl. Conf. on Acoustics, Speech, and Signal Processing, (Honolulu, HI)
, pp. 129-132
-
-
Draper, S.1
Khisti, A.2
Martinian, E.3
Vetro, A.4
Yedidia, J.5
-
4
-
-
64549127364
-
Privacy-security tradeoffs in biometric security systems
-
L. Lai, S.-W. Ho, and H. V. Poor, "Privacy-security tradeoffs in biometric security systems," in Proc. 46th Annual Allerton Conf. on Communication, Control, and Computing, (Monticello, IL), Sep. 23-26, 2008.
-
Proc. 46th Annual Allerton Conf. on Communication, Control, and Computing, (Monticello, IL), Sep. 23-26, 2008
-
-
Lai, L.1
Ho, S.-W.2
Poor, H.V.3
-
5
-
-
64549142823
-
Privacy leakage in biometric secrecy systems
-
T. Ignatenko and F. Willems, "Privacy leakage in biometric secrecy systems," in Proc. 46th Annual Allerton Conf. on Communication, Control, and Computing, (Monticello, IL), Sep. 23-26, 2008.
-
Proc. 46th Annual Allerton Conf. on Communication, Control, and Computing, (Monticello, IL), Sep. 23-26, 2008
-
-
Ignatenko, T.1
Willems, F.2
-
6
-
-
0016576623
-
Source coding with side information and a converse for the degraded broadcast channel
-
Nov.
-
R. Ahlswede and I. Csiszár, "Source coding with side information and a converse for the degraded broadcast channel," IEEE Trans. Inf. Theory, vol. 21, pp. 629-637, Nov. 1975.
-
(1975)
IEEE Trans. Inf. Theory
, vol.21
, pp. 629-637
-
-
Ahlswede, R.1
Csiszár, I.2
-
7
-
-
0015681689
-
A theorem on the entropy of certain binary sequences and applications: Part I
-
Nov.
-
A. D. Wyner and J. Ziv, "A theorem on the entropy of certain binary sequences and applications: Part I," IEEE Trans. Inf. Theory, vol. 19, pp. 769-777, Nov. 1973.
-
(1973)
IEEE Trans. Inf. Theory
, vol.19
, pp. 769-777
-
-
Wyner, A.D.1
Ziv, J.2
|