-
1
-
-
71549143789
-
Biometric identification over encrypted data made feasible
-
Atul Prakash and Indranil Gupta, editors, volume 5905 of Lecture Notes in Computer Science, Springer
-
Michael Adjedj, Julien Bringer, Hervé Chabanne, and Bruno Kindarji. Biometric identification over encrypted data made feasible. In Atul Prakash and Indranil Gupta, editors, ICISS, volume 5905 of Lecture Notes in Computer Science, pages 86-100. Springer, 2009.
-
(2009)
ICISS
, pp. 86-100
-
-
Adjedj, M.1
Bringer, J.2
Chabanne, H.3
Kindarji, B.4
-
2
-
-
45449114377
-
An authentication protocol with encrypted biometric data
-
Serge Vaudenay, editor, volume 5023 of Lecture Notes in Computer Science, Springer
-
Julien Bringer and Hervé Chabanne. An authentication protocol with encrypted biometric data. In Serge Vaudenay, editor, AFRICACRYPT, volume 5023 of Lecture Notes in Computer Science, pages 109-124. Springer, 2008.
-
(2008)
AFRICACRYPT
, pp. 109-124
-
-
Bringer, J.1
Chabanne, H.2
-
3
-
-
48649102434
-
Optimal iris fuzzy sketches
-
Sept
-
Julien Bringer, Hervé Chabanne, Gérard Cohen, Bruno Kindarji, and Gilles Zémor. Optimal iris fuzzy sketches. In Biometrics: Theory, Applications, and Systems, 2007. BTAS 2007. First IEEE International Conference on, Sept 2007.
-
(2007)
Biometrics: Theory, Applications, and Systems, 2007. BTAS 2007. First IEEE International Conference on
-
-
Bringer, J.1
Chabanne, H.2
Cohen, G.3
Kindarji, B.4
Zémor, G.5
-
4
-
-
56749174787
-
Theoretical and practical boundaries of binary secure sketches
-
Julien Bringer, Hervé Chabanne, Gérard D. Cohen, Bruno Kindarji, and Gilles Zémor. Theoretical and practical boundaries of binary secure sketches. IEEE Transactions on Information Forensics and Security, 3(4):673-683, 2008.
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.4
, pp. 673-683
-
-
Bringer, J.1
Chabanne, H.2
Cohen, G.D.3
Kindarji, B.4
Zémor, G.5
-
5
-
-
38149070898
-
An application of the goldwasser-micali cryptosystem to biometric authentication
-
Josef Pieprzyk, Hossein Ghodosi, and Ed Dawson, editors, volume 4586 of Lecture Notes in Computer Science, Springer
-
Julien Bringer, Hervé Chabanne, Malika Izabachène, David Pointcheval, Qiang Tang, and Sébastien Zimmer. An application of the goldwasser-micali cryptosystem to biometric authentication. In Josef Pieprzyk, Hossein Ghodosi, and Ed Dawson, editors, ACISP, volume 4586 of Lecture Notes in Computer Science, pages 96-106. Springer, 2007.
-
(2007)
ACISP
, pp. 96-106
-
-
Bringer, J.1
Chabanne, H.2
Izabachène, M.3
Pointcheval, D.4
Tang, Q.5
Zimmer, S.6
-
6
-
-
77952047954
-
Extending match-on-card to local biometric identification
-
Julian Fiérrez-Aguilar, Javier Ortega-Garcia, Anna Esposito, Andrzej Drygajlo, and Marcos Faúndez-Zanuy, editors, volume 5707 of Lecture Notes in Computer Science, Springer
-
Julien Bringer, Hervé Chabanne, Tom A. M. Kevenaar, and Bruno Kindarji. Extending match-on-card to local biometric identification. In Julian Fiérrez-Aguilar, Javier Ortega-Garcia, Anna Esposito, Andrzej Drygajlo, and Marcos Faúndez-Zanuy, editors, COST 2101/2102 Conference, volume 5707 of Lecture Notes in Computer Science, pages 178-186. Springer, 2009.
-
(2009)
COST 2101/2102 Conference
, pp. 178-186
-
-
Bringer, J.1
Chabanne, H.2
Kevenaar, T.A.M.3
Kindarji, B.4
-
7
-
-
56349139535
-
The best of both worlds: Applying secure sketches to cancelable biometrics
-
Julien Bringer, Hervé Chabanne, and Bruno Kindarji. The best of both worlds: Applying secure sketches to cancelable biometrics. Sci. Comput. Program., 74(1-2):43-51, 2008.
-
(2008)
Sci. Comput. Program.
, vol.74
, Issue.1-2
, pp. 43-51
-
-
Bringer, J.1
Chabanne, H.2
Kindarji, B.3
-
9
-
-
38349176849
-
Extended private information retrieval and its application in biometrics authentications
-
Feng Bao, San Ling, Tatsuaki Okamoto, Huaxiong Wang, and Chaoping Xing, editors, volume 4856 of Lecture Notes in Computer Science, Springer
-
Julien Bringer, Hervé Chabanne, David Pointcheval, and Qiang Tang. Extended private information retrieval and its application in biometrics authentications. In Feng Bao, San Ling, Tatsuaki Okamoto, Huaxiong Wang, and Chaoping Xing, editors, CANS, volume 4856 of Lecture Notes in Computer Science, pages 175-193. Springer, 2007.
-
(2007)
CANS
, pp. 175-193
-
-
Bringer, J.1
Chabanne, H.2
Pointcheval, D.3
Tang, Q.4
-
11
-
-
84944063593
-
Modelling plastic distortion in fingerprint images
-
London, UK, Springer-Verlag
-
Raffaele Cappelli, Dario Maio, and Davide Maltoni. Modelling plastic distortion in fingerprint images. In ICAPR '01: Proceedings of the Second International Conference on Advances in Pattern Recognition, pages 369-376, London, UK, 2001. Springer-Verlag.
-
(2001)
ICAPR '01: Proceedings of the Second International Conference on Advances in Pattern Recognition
, pp. 369-376
-
-
Cappelli, R.1
Maio, D.2
Maltoni, D.3
-
12
-
-
52049107821
-
Biometric binary string generation with detection rate optimized bit allocation
-
June
-
Chun Chen, Raymond N. J. Veldhuis, Tom A. M. Kevenaar, and Anton H. M. Akkermans. Biometric binary string generation with detection rate optimized bit allocation. In IEEE CVPR 2008, Workshop on Biometrics, pages 1-7, June 2008.
-
(2008)
IEEE CVPR 2008, Workshop on Biometrics
, pp. 1-7
-
-
Chen, C.1
Veldhuis, R.N.J.2
Kevenaar, T.A.M.3
Akkermans, A.H.M.4
-
13
-
-
69949132178
-
Binary biometric representation through pairwise polar quantization
-
Massimo Tistarelli and Mark S. Nixon, editors, volume 5558 of Lecture Notes in Computer Science, Springer
-
Chun Chen and Raymond N. J. Veldhuis. Binary biometric representation through pairwise polar quantization. In Massimo Tistarelli and Mark S. Nixon, editors, ICB, volume 5558 of Lecture Notes in Computer Science, pages 72-81. Springer, 2009.
-
(2009)
ICB
, pp. 72-81
-
-
Chen, C.1
Veldhuis, R.N.J.2
-
14
-
-
0027700869
-
High confidence visual recognition of persons by a test of statistical independence
-
John Daugman. High confidence visual recognition of persons by a test of statistical independence. IEEE Trans. Pattern Anal. Mach. Intell., 15(11):1148-1161, 1993.
-
(1993)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.15
, Issue.11
, pp. 1148-1161
-
-
Daugman, J.1
-
15
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Christian Cachin and Jan Camenisch, editors, volume 3027 of Lecture Notes in Computer Science, Springer
-
Yevgeniy Dodis, Leonid Reyzin, and Adam Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In Christian Cachin and Jan Camenisch, editors, EUROCRYPT, volume 3027 of Lecture Notes in Computer Science, pages 523-540. Springer, 2004.
-
(2004)
EUROCRYPT
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
16
-
-
34547512147
-
Using distributed source coding to secure fingerprint biometrics
-
Stark Draper, Jonathan Yedidia, Ashish Khisti, Emin Martinian, Anthony Vetro. Using distributed source coding to secure fingerprint biometrics. In in Int. Conf. Acoutics Speech Signal Proc, pages 129- 132, 2007.
-
(2007)
Int. Conf. Acoutics Speech Signal Proc
, pp. 129-132
-
-
Draper, S.1
Yedidia, J.2
Khisti, A.3
Martinian, E.4
Vetro, A.5
-
17
-
-
35148889847
-
Anonymous and revocable fingerprint recognition
-
IEEE Computer Society
-
Faisal Farooq, Ruud M. Bolle, Tsai-Yang Jea, and Nalini K. Ratha. Anonymous and revocable fingerprint recognition. In CVPR. IEEE Computer Society, 2007.
-
(2007)
CVPR
-
-
Farooq, F.1
Bolle, R.M.2
Jea, T.-Y.3
Ratha, N.K.4
-
18
-
-
58349093334
-
A novel coding scheme for indexing fingerprint patterns
-
Niels da Vitoria Lobo, Takis Kasparis, Fabio Roli, James Tin-Yau Kwok, Michael Georgiopoulos, Georgios C. Anagnostopoulos, and Marco Loog, editors, volume 5342 of Lecture Notes in Computer Science, Springer
-
Aglika Gyaourova and Arun Ross. A novel coding scheme for indexing fingerprint patterns. In Niels da Vitoria Lobo, Takis Kasparis, Fabio Roli, James Tin-Yau Kwok, Michael Georgiopoulos, Georgios C. Anagnostopoulos, and Marco Loog, editors, SSPR/SPR, volume 5342 of Lecture Notes in Computer Science, pages 755-764. Springer, 2008.
-
(2008)
SSPR/SPR
, pp. 755-764
-
-
Gyaourova, A.1
Ross, A.2
-
19
-
-
44049109285
-
A fast search algorithm for a large fuzzy database
-
Feng Hao, John Daugman, and Piotr Zielinski. A fast search algorithm for a large fuzzy database. IEEE Transactions on Information Forensics and Security, 3(2):203-212, 2008.
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.2
, pp. 203-212
-
-
Hao, F.1
Daugman, J.2
Zielinski, P.3
-
20
-
-
33744965433
-
Information technology, biometric data interchange formats, part 2: Finger minutiae data
-
ISO/IEC 19794-2:2005
-
ISO/IEC 19794-2:2005. Information technology, biometric data interchange formats, part 2: Finger minutiae data. Technical report, ISO/IEC, 2005.
-
(2005)
Technical Report, ISO/IEC
-
-
-
21
-
-
0013143822
-
Fingercode: A filterbank for fingerprint representation and matching
-
IEEE Computer Society
-
Anil K. Jain, Salil Prabhakar, Lin Hong, and Sharath Pankanti. Fingercode: A filterbank for fingerprint representation and matching. In CVPR, pages 2187-. IEEE Computer Society, 1999.
-
(1999)
CVPR
, pp. 2187
-
-
Jain, A.K.1
Prabhakar, S.2
Hong, L.3
Pankanti, S.4
-
23
-
-
67549112684
-
Binary biometrics: An analytic framework to estimate the bit error probability under gaussian assumption
-
Emile J.C. Kelkboom, Gary G. Molina, Tom A.M. Kevenaar, Raymond N.J. Veldhuis, and Willem Jonker. Binary biometrics: An analytic framework to estimate the bit error probability under gaussian assumption. In IEEE BTAS 2008, pages 1-6, 2008.
-
(2008)
IEEE BTAS 2008
, pp. 1-6
-
-
Kelkboom, E.J.C.1
Molina, G.G.2
Kevenaar, T.A.M.3
Veldhuis, R.N.J.4
Jonker, W.5
-
24
-
-
33750954911
-
Face recognition with renewable and privacy preserving binary templates
-
0
-
Tom A. M. Kevenaar, Geert J. Schrijen, Michiel van der Veen, Anton H. M. Akkermans, and Fei Zuo. Face recognition with renewable and privacy preserving binary templates. Automatic Identification Advanced Technologies, IEEE Workshop on, 0:21-26, 2005.
-
(2005)
Automatic Identification Advanced Technologies, IEEE Workshop on
, pp. 21-26
-
-
Kevenaar, T.A.M.1
Schrijen, G.J.2
Van Der Veen, M.3
Akkermans, A.H.M.4
Zuo, F.5
-
25
-
-
0002719797
-
The Hungarian method for the assignment problem
-
Harold W. Kuhn. The Hungarian method for the assignment problem. Naval Research Logistic Quarterly, 2:83-97, 1955.
-
(1955)
Naval Research Logistic Quarterly
, vol.2
, pp. 83-97
-
-
Kuhn, H.W.1
-
26
-
-
35248839355
-
New shielding functions to enhance privacy and prevent misuse of biometric templates
-
Josef Kittler and Mark S. Nixon, editors, volume 2688 of Lecture Notes in Computer Science, Springer
-
Jean-Paul M. G. Linnartz and Pim Tuyls. New shielding functions to enhance privacy and prevent misuse of biometric templates. In Josef Kittler and Mark S. Nixon, editors, AVBPA, volume 2688 of Lecture Notes in Computer Science, pages 393-402. Springer, 2003.
-
(2003)
AVBPA
, pp. 393-402
-
-
Linnartz, J.-P.M.G.1
Tuyls, P.2
-
27
-
-
33751580079
-
FVC2002: Second fingerprint verification competition
-
Dario Maio, Davide Maltoni, Raffaele Cappelli, James L. Wayman, and Anil K. Jain. FVC2002: Second fingerprint verification competition. Pattern Recognition, International Conference on, 3:30811, 2002.
-
(2002)
Pattern Recognition, International Conference on
, vol.3
, pp. 30811
-
-
Maio, D.1
Maltoni, D.2
Cappelli, R.3
Wayman, J.L.4
Jain, A.K.5
-
28
-
-
0036522407
-
FVC2000: Fingerprint verification competition
-
Dario Maio, Davide Maltoni, Raffaele Cappelli, James L. Wayman, and Anil K. Jain. FVC2000: Fingerprint verification competition. IEEE Trans. Pattern Anal. Mach. Intell., 24(3):402-412, 2002.
-
(2002)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.24
, Issue.3
, pp. 402-412
-
-
Maio, D.1
Maltoni, D.2
Cappelli, R.3
Wayman, J.L.4
Jain, A.K.5
-
30
-
-
1342275940
-
-
Springer-Verlag New York, Inc.
-
Salil Prabakhar, Anil K. Jain, Dario Maio, and Davide Maltoni. Handbook of Fingerprint Recognition. Springer-Verlag New York, Inc., 2003.
-
(2003)
Handbook of Fingerprint Recognition
-
-
Prabakhar, S.1
Jain, A.K.2
Maio, D.3
Maltoni, D.4
-
31
-
-
4644343153
-
A deformable model for fingerprint matching
-
Arun Ross, Sarat Dass, and Anil Jain. A deformable model for fingerprint matching. Pattern Recogn., 38(1):95-103, 2005.
-
(2005)
Pattern Recogn.
, vol.38
, Issue.1
, pp. 95-103
-
-
Ross, A.1
Dass, S.2
Jain, A.3
-
34
-
-
26444507172
-
Practical biometric authentication with template protection
-
Takeo Kanade, Anil K. Jain, and Nalini K. Ratha, editors, volume 3546 of Lecture Notes in Computer Science, Springer
-
Pim Tuyls, Anton H. M. Akkermans, Tom A. M. Kevenaar, Geert Jan Schrijen, Asker M. Bazen, and Raymond N. J. Veldhuis. Practical biometric authentication with template protection. In Takeo Kanade, Anil K. Jain, and Nalini K. Ratha, editors, AVBPA, volume 3546 of Lecture Notes in Computer Science, pages 436-446. Springer, 2005.
-
(2005)
AVBPA
, pp. 436-446
-
-
Tuyls, P.1
Akkermans, A.H.M.2
Kevenaar, T.A.M.3
Schrijen, G.J.4
Bazen, A.M.5
Veldhuis, R.N.J.6
-
35
-
-
71749111947
-
Spectral minutiae representations of fingerprints enhanced by quality data
-
Washington DC, USA, Washington DC, September, IEEE Computer Society Press
-
Haiyun Xu and Raymond N. J. Veldhuis. Spectral minutiae representations of fingerprints enhanced by quality data. In Biometrics: Theory, Applications, and Systems, 2009. BTAS '09. IEEE 3rd International Conference on, Washington DC, USA, pages 1-5, Washington DC, September 2009. IEEE Computer Society Press.
-
(2009)
Biometrics: Theory, Applications, and Systems, 2009. BTAS '09. IEEE 3rd International Conference on
, pp. 1-5
-
-
Xu, H.1
Veldhuis, R.N.J.2
-
36
-
-
51849141886
-
Spectral minutiae: A fixed-length representation of a minutiae set
-
0
-
Haiyun Xu, Raymond N.J. Veldhuis, Tom A.M. Kevenaar, Anton H.M. Akkermans, and Asker M. Bazen. Spectral minutiae: A fixed-length representation of a minutiae set. Computer Vision and Pattern Recognition Workshop, 0:1-6, 2008.
-
(2008)
Computer Vision and Pattern Recognition Workshop
, pp. 1-6
-
-
Xu, H.1
Veldhuis, R.N.J.2
Kevenaar, T.A.M.3
Akkermans, A.H.M.4
Bazen, A.M.5
-
37
-
-
77951790032
-
Robust minutiae hash for fingerprint template protection
-
Bian Yang, Christoph Busch, Patrick Bours, and Davrondzhon Gafurov. Robust minutiae hash for fingerprint template protection. volume 7541. SPIE, 2010.
-
(2010)
SPIE
, vol.7541
-
-
Yang, B.1
Busch, C.2
Bours, P.3
Gafurov, D.4
-
38
-
-
33746820658
-
A comparative study of combining multiple enrolled samples for fingerprint verification
-
Chunyu Yang and Jie Zhou. A comparative study of combining multiple enrolled samples for fingerprint verification. Pattern Recogn., 39(11):2115-2130, 2006.
-
(2006)
Pattern Recogn.
, vol.39
, Issue.11
, pp. 2115-2130
-
-
Yang, C.1
Zhou, J.2
|