메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Binary feature vector fingerprint representation from minutiae vicinities

Author keywords

Binarization; Feature vector; Fingerprint; Self alignment

Indexed keywords

BINARIZATIONS; BINARY FEATURE VECTOR; BINARY QUANTIZATION; CONSTRAINED ALGORITHMS; FEATURE VECTORS; FINGERPRINT; FINGERPRINT MATCHING; FINGERPRINT REPRESENTATION; FINGERPRINT TEMPLATES; MINUTIAE SET; NEW APPROACHES; PRIVACY PROTECTION; SELF ALIGNMENT;

EID: 78650403067     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/BTAS.2010.5634488     Document Type: Conference Paper
Times cited : (62)

References (38)
  • 1
    • 71549143789 scopus 로고    scopus 로고
    • Biometric identification over encrypted data made feasible
    • Atul Prakash and Indranil Gupta, editors, volume 5905 of Lecture Notes in Computer Science, Springer
    • Michael Adjedj, Julien Bringer, Hervé Chabanne, and Bruno Kindarji. Biometric identification over encrypted data made feasible. In Atul Prakash and Indranil Gupta, editors, ICISS, volume 5905 of Lecture Notes in Computer Science, pages 86-100. Springer, 2009.
    • (2009) ICISS , pp. 86-100
    • Adjedj, M.1    Bringer, J.2    Chabanne, H.3    Kindarji, B.4
  • 2
    • 45449114377 scopus 로고    scopus 로고
    • An authentication protocol with encrypted biometric data
    • Serge Vaudenay, editor, volume 5023 of Lecture Notes in Computer Science, Springer
    • Julien Bringer and Hervé Chabanne. An authentication protocol with encrypted biometric data. In Serge Vaudenay, editor, AFRICACRYPT, volume 5023 of Lecture Notes in Computer Science, pages 109-124. Springer, 2008.
    • (2008) AFRICACRYPT , pp. 109-124
    • Bringer, J.1    Chabanne, H.2
  • 5
    • 38149070898 scopus 로고    scopus 로고
    • An application of the goldwasser-micali cryptosystem to biometric authentication
    • Josef Pieprzyk, Hossein Ghodosi, and Ed Dawson, editors, volume 4586 of Lecture Notes in Computer Science, Springer
    • Julien Bringer, Hervé Chabanne, Malika Izabachène, David Pointcheval, Qiang Tang, and Sébastien Zimmer. An application of the goldwasser-micali cryptosystem to biometric authentication. In Josef Pieprzyk, Hossein Ghodosi, and Ed Dawson, editors, ACISP, volume 4586 of Lecture Notes in Computer Science, pages 96-106. Springer, 2007.
    • (2007) ACISP , pp. 96-106
    • Bringer, J.1    Chabanne, H.2    Izabachène, M.3    Pointcheval, D.4    Tang, Q.5    Zimmer, S.6
  • 6
    • 77952047954 scopus 로고    scopus 로고
    • Extending match-on-card to local biometric identification
    • Julian Fiérrez-Aguilar, Javier Ortega-Garcia, Anna Esposito, Andrzej Drygajlo, and Marcos Faúndez-Zanuy, editors, volume 5707 of Lecture Notes in Computer Science, Springer
    • Julien Bringer, Hervé Chabanne, Tom A. M. Kevenaar, and Bruno Kindarji. Extending match-on-card to local biometric identification. In Julian Fiérrez-Aguilar, Javier Ortega-Garcia, Anna Esposito, Andrzej Drygajlo, and Marcos Faúndez-Zanuy, editors, COST 2101/2102 Conference, volume 5707 of Lecture Notes in Computer Science, pages 178-186. Springer, 2009.
    • (2009) COST 2101/2102 Conference , pp. 178-186
    • Bringer, J.1    Chabanne, H.2    Kevenaar, T.A.M.3    Kindarji, B.4
  • 7
    • 56349139535 scopus 로고    scopus 로고
    • The best of both worlds: Applying secure sketches to cancelable biometrics
    • Julien Bringer, Hervé Chabanne, and Bruno Kindarji. The best of both worlds: Applying secure sketches to cancelable biometrics. Sci. Comput. Program., 74(1-2):43-51, 2008.
    • (2008) Sci. Comput. Program. , vol.74 , Issue.1-2 , pp. 43-51
    • Bringer, J.1    Chabanne, H.2    Kindarji, B.3
  • 9
    • 38349176849 scopus 로고    scopus 로고
    • Extended private information retrieval and its application in biometrics authentications
    • Feng Bao, San Ling, Tatsuaki Okamoto, Huaxiong Wang, and Chaoping Xing, editors, volume 4856 of Lecture Notes in Computer Science, Springer
    • Julien Bringer, Hervé Chabanne, David Pointcheval, and Qiang Tang. Extended private information retrieval and its application in biometrics authentications. In Feng Bao, San Ling, Tatsuaki Okamoto, Huaxiong Wang, and Chaoping Xing, editors, CANS, volume 4856 of Lecture Notes in Computer Science, pages 175-193. Springer, 2007.
    • (2007) CANS , pp. 175-193
    • Bringer, J.1    Chabanne, H.2    Pointcheval, D.3    Tang, Q.4
  • 13
    • 69949132178 scopus 로고    scopus 로고
    • Binary biometric representation through pairwise polar quantization
    • Massimo Tistarelli and Mark S. Nixon, editors, volume 5558 of Lecture Notes in Computer Science, Springer
    • Chun Chen and Raymond N. J. Veldhuis. Binary biometric representation through pairwise polar quantization. In Massimo Tistarelli and Mark S. Nixon, editors, ICB, volume 5558 of Lecture Notes in Computer Science, pages 72-81. Springer, 2009.
    • (2009) ICB , pp. 72-81
    • Chen, C.1    Veldhuis, R.N.J.2
  • 14
    • 0027700869 scopus 로고
    • High confidence visual recognition of persons by a test of statistical independence
    • John Daugman. High confidence visual recognition of persons by a test of statistical independence. IEEE Trans. Pattern Anal. Mach. Intell., 15(11):1148-1161, 1993.
    • (1993) IEEE Trans. Pattern Anal. Mach. Intell. , vol.15 , Issue.11 , pp. 1148-1161
    • Daugman, J.1
  • 15
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Christian Cachin and Jan Camenisch, editors, volume 3027 of Lecture Notes in Computer Science, Springer
    • Yevgeniy Dodis, Leonid Reyzin, and Adam Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Christian Cachin and Jan Camenisch, editors, EUROCRYPT, volume 3027 of Lecture Notes in Computer Science, pages 523-540. Springer, 2004.
    • (2004) EUROCRYPT , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 17
    • 35148889847 scopus 로고    scopus 로고
    • Anonymous and revocable fingerprint recognition
    • IEEE Computer Society
    • Faisal Farooq, Ruud M. Bolle, Tsai-Yang Jea, and Nalini K. Ratha. Anonymous and revocable fingerprint recognition. In CVPR. IEEE Computer Society, 2007.
    • (2007) CVPR
    • Farooq, F.1    Bolle, R.M.2    Jea, T.-Y.3    Ratha, N.K.4
  • 18
    • 58349093334 scopus 로고    scopus 로고
    • A novel coding scheme for indexing fingerprint patterns
    • Niels da Vitoria Lobo, Takis Kasparis, Fabio Roli, James Tin-Yau Kwok, Michael Georgiopoulos, Georgios C. Anagnostopoulos, and Marco Loog, editors, volume 5342 of Lecture Notes in Computer Science, Springer
    • Aglika Gyaourova and Arun Ross. A novel coding scheme for indexing fingerprint patterns. In Niels da Vitoria Lobo, Takis Kasparis, Fabio Roli, James Tin-Yau Kwok, Michael Georgiopoulos, Georgios C. Anagnostopoulos, and Marco Loog, editors, SSPR/SPR, volume 5342 of Lecture Notes in Computer Science, pages 755-764. Springer, 2008.
    • (2008) SSPR/SPR , pp. 755-764
    • Gyaourova, A.1    Ross, A.2
  • 20
    • 33744965433 scopus 로고    scopus 로고
    • Information technology, biometric data interchange formats, part 2: Finger minutiae data
    • ISO/IEC 19794-2:2005
    • ISO/IEC 19794-2:2005. Information technology, biometric data interchange formats, part 2: Finger minutiae data. Technical report, ISO/IEC, 2005.
    • (2005) Technical Report, ISO/IEC
  • 21
    • 0013143822 scopus 로고    scopus 로고
    • Fingercode: A filterbank for fingerprint representation and matching
    • IEEE Computer Society
    • Anil K. Jain, Salil Prabhakar, Lin Hong, and Sharath Pankanti. Fingercode: A filterbank for fingerprint representation and matching. In CVPR, pages 2187-. IEEE Computer Society, 1999.
    • (1999) CVPR , pp. 2187
    • Jain, A.K.1    Prabhakar, S.2    Hong, L.3    Pankanti, S.4
  • 23
    • 67549112684 scopus 로고    scopus 로고
    • Binary biometrics: An analytic framework to estimate the bit error probability under gaussian assumption
    • Emile J.C. Kelkboom, Gary G. Molina, Tom A.M. Kevenaar, Raymond N.J. Veldhuis, and Willem Jonker. Binary biometrics: An analytic framework to estimate the bit error probability under gaussian assumption. In IEEE BTAS 2008, pages 1-6, 2008.
    • (2008) IEEE BTAS 2008 , pp. 1-6
    • Kelkboom, E.J.C.1    Molina, G.G.2    Kevenaar, T.A.M.3    Veldhuis, R.N.J.4    Jonker, W.5
  • 25
    • 0002719797 scopus 로고
    • The Hungarian method for the assignment problem
    • Harold W. Kuhn. The Hungarian method for the assignment problem. Naval Research Logistic Quarterly, 2:83-97, 1955.
    • (1955) Naval Research Logistic Quarterly , vol.2 , pp. 83-97
    • Kuhn, H.W.1
  • 26
    • 35248839355 scopus 로고    scopus 로고
    • New shielding functions to enhance privacy and prevent misuse of biometric templates
    • Josef Kittler and Mark S. Nixon, editors, volume 2688 of Lecture Notes in Computer Science, Springer
    • Jean-Paul M. G. Linnartz and Pim Tuyls. New shielding functions to enhance privacy and prevent misuse of biometric templates. In Josef Kittler and Mark S. Nixon, editors, AVBPA, volume 2688 of Lecture Notes in Computer Science, pages 393-402. Springer, 2003.
    • (2003) AVBPA , pp. 393-402
    • Linnartz, J.-P.M.G.1    Tuyls, P.2
  • 31
    • 4644343153 scopus 로고    scopus 로고
    • A deformable model for fingerprint matching
    • Arun Ross, Sarat Dass, and Anil Jain. A deformable model for fingerprint matching. Pattern Recogn., 38(1):95-103, 2005.
    • (2005) Pattern Recogn. , vol.38 , Issue.1 , pp. 95-103
    • Ross, A.1    Dass, S.2    Jain, A.3
  • 34
    • 26444507172 scopus 로고    scopus 로고
    • Practical biometric authentication with template protection
    • Takeo Kanade, Anil K. Jain, and Nalini K. Ratha, editors, volume 3546 of Lecture Notes in Computer Science, Springer
    • Pim Tuyls, Anton H. M. Akkermans, Tom A. M. Kevenaar, Geert Jan Schrijen, Asker M. Bazen, and Raymond N. J. Veldhuis. Practical biometric authentication with template protection. In Takeo Kanade, Anil K. Jain, and Nalini K. Ratha, editors, AVBPA, volume 3546 of Lecture Notes in Computer Science, pages 436-446. Springer, 2005.
    • (2005) AVBPA , pp. 436-446
    • Tuyls, P.1    Akkermans, A.H.M.2    Kevenaar, T.A.M.3    Schrijen, G.J.4    Bazen, A.M.5    Veldhuis, R.N.J.6
  • 35
    • 71749111947 scopus 로고    scopus 로고
    • Spectral minutiae representations of fingerprints enhanced by quality data
    • Washington DC, USA, Washington DC, September, IEEE Computer Society Press
    • Haiyun Xu and Raymond N. J. Veldhuis. Spectral minutiae representations of fingerprints enhanced by quality data. In Biometrics: Theory, Applications, and Systems, 2009. BTAS '09. IEEE 3rd International Conference on, Washington DC, USA, pages 1-5, Washington DC, September 2009. IEEE Computer Society Press.
    • (2009) Biometrics: Theory, Applications, and Systems, 2009. BTAS '09. IEEE 3rd International Conference on , pp. 1-5
    • Xu, H.1    Veldhuis, R.N.J.2
  • 37
    • 77951790032 scopus 로고    scopus 로고
    • Robust minutiae hash for fingerprint template protection
    • Bian Yang, Christoph Busch, Patrick Bours, and Davrondzhon Gafurov. Robust minutiae hash for fingerprint template protection. volume 7541. SPIE, 2010.
    • (2010) SPIE , vol.7541
    • Yang, B.1    Busch, C.2    Bours, P.3    Gafurov, D.4
  • 38
    • 33746820658 scopus 로고    scopus 로고
    • A comparative study of combining multiple enrolled samples for fingerprint verification
    • Chunyu Yang and Jie Zhou. A comparative study of combining multiple enrolled samples for fingerprint verification. Pattern Recogn., 39(11):2115-2130, 2006.
    • (2006) Pattern Recogn. , vol.39 , Issue.11 , pp. 2115-2130
    • Yang, C.1    Zhou, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.