메뉴 건너뛰기




Volumn , Issue , 2010, Pages 15-21

Implementing Fingercode-based identity matching in the encrypted domain

Author keywords

Biometric based Identification; Fingercode; Secure signal processing; Signal processing in the encrypted domain

Indexed keywords

BIOMETRIC SYSTEMS; CLASSICAL APPROACH; FEATURE SIZES; FINGERCODE; MATCHING ALGORITHM; SECURE SIGNAL PROCESSING;

EID: 78650079218     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/BIOMS.2010.5610445     Document Type: Conference Paper
Times cited : (21)

References (11)
  • 4
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • Springer-Verlag
    • P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Lecture Notes in Computer Science, vol. 1592. Springer-Verlag, 1999, pp. 223-238.
    • (1999) Lecture Notes in Computer Science , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 5
    • 60449095773 scopus 로고    scopus 로고
    • On the implementation of the discrete Fourier transform in the encrypted domain
    • March
    • T. Bianchi, A. Piva, and M. Barni, "On the implementation of the discrete Fourier transform in the encrypted domain," IEEE Transaction on Information Forensics and Security, vol. 4, no. 1, pp. 86-97, March 2009.
    • (2009) IEEE Transaction on Information Forensics and Security , vol.4 , Issue.1 , pp. 86-97
    • Bianchi, T.1    Piva, A.2    Barni, M.3
  • 6
    • 77249117753 scopus 로고    scopus 로고
    • Composite signal representation for fast and storage-efficient processing of encrypted signals
    • March 2010
    • --, "Composite signal representation for fast and storage-efficient processing of encrypted signals," IEEE Transaction on Information Forensics and Security, vol. 5, no. 1, pp. 180-187, March 2010.
    • IEEE Transaction on Information Forensics and Security , vol.5 , Issue.1 , pp. 180-187
  • 7
    • 38149074802 scopus 로고    scopus 로고
    • Efficient and secure comparison for on-line auctions
    • ser. Lecture Notes in Computer Science, J. Pieprzyk, H. Ghodosi, and E. Dawson, Eds., Springer
    • I. Damgård, M. Geisler, and M. Krøigard, "Efficient and secure comparison for on-line auctions," in ACISP, ser. Lecture Notes in Computer Science, J. Pieprzyk, H. Ghodosi, and E. Dawson, Eds., vol. 4586. Springer, 2007, pp. 416-430.
    • (2007) ACISP , vol.4586 , pp. 416-430
    • Damgard, I.1    Geisler, M.2    Krigard, M.3
  • 8
    • 72449131818 scopus 로고    scopus 로고
    • Secure twoparty computation is practical
    • ser. Lecture Notes in Computer Science, M. Matsui, Ed., Springer
    • B. Pinkas, T. Schneider, N. Smart, and S. Williams, "Secure twoparty computation is practical," in ASIACRYPT, ser. Lecture Notes in Computer Science, M. Matsui, Ed., vol. 5912. Springer, 2009, pp. 250-267.
    • (2009) ASIACRYPT , vol.5912 , pp. 250-267
    • Pinkas, B.1    Schneider, T.2    Smart, N.3    Williams, S.4
  • 11
    • 78650090123 scopus 로고    scopus 로고
    • Sample fingerprint databases
    • available at
    • "Sample fingerprint databases," VeriFinger download page, 2006, available at http://www.neurotechnology.com/download.html.
    • (2006) VeriFinger Download Page


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.