-
1
-
-
78049361648
-
Privacy-security tradeoffs in reusable biometric security systems
-
Dallas, TX, Mar.
-
L. Lai, S.-W. Ho, and H. V. Poor, "Privacy-security tradeoffs in reusable biometric security systems," in Proc. IEEEIntl. Conf. Acoustics, Speech, andSignal Processing, Dallas, TX, Mar. 2010.
-
Proc. IEEEIntl. Conf. Acoustics, Speech, AndSignal Processing
, vol.2010
-
-
Lai, L.1
Ho, S.-W.2
Poor, H.V.3
-
2
-
-
33947492044
-
From template to image: Reconstructing fingerprints from minutiae points
-
DOI 10.1109/TPAMI.2007.1018, Special issue on Biometrics: Progress and Directions
-
A. Ross, J. Shah, and A. K. Jain, "From template to image: Reconstructing fingerprints from minutiae points," IEEE Trans. Pattern Anal. Mach. Intell., vol. 29, no. 4, pp. 544-560, Apr. 2007. (Pubitemid 46464396)
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 544-560
-
-
Ross, A.1
Shah, J.2
Jain, A.K.3
-
3
-
-
34548074162
-
Protecting biometric templates with sketch: Theory and practice
-
Sep.
-
Y. Sutcu, Q. Li, and N. Memon, "Protecting biometric templates with sketch: Theory and practice," IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp. 503-512, Sep. 2007.
-
(2007)
IEEE Trans. Inf. Forensics Security
, vol.2
, Issue.3
, pp. 503-512
-
-
Sutcu, Y.1
Li, Q.2
Memon, N.3
-
4
-
-
77649250983
-
Secure sketch for biometric templates
-
Shanghai, China, Dec.
-
Q. Li, Y. Sutcu, and N. Memon, "Secure sketch for biometric templates," in Proc. Asiacrypt, Shanghai, China, Dec. 2006, pp. 99-113.
-
(2006)
Proc. Asiacrypt
, pp. 99-113
-
-
Li, Q.1
Sutcu, Y.2
Memon, N.3
-
5
-
-
35148846059
-
Secure biometric templates from fingerprint-face features
-
Minneapolis, MN, Jun.
-
Y. Sutcu, Q. Li, and N. Memon, "Secure biometric templates from fingerprint-face features," in Proc. IEEE Computer Society Workshop on Biometrics, Minneapolis, MN, Jun. 2007.
-
(2007)
Proc. IEEE Computer Society Workshop on Biometrics
-
-
Sutcu, Y.1
Li, Q.2
Memon, N.3
-
6
-
-
34547512147
-
Using distributed source coding to secure fingerprint biometrics
-
Honolulu, HI, Apr.
-
S. Draper, A. Khisti, E. Martinian, A. Vetro, and J. Yedidia, "Using distributed source coding to secure fingerprint biometrics," in Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, Honolulu, HI, Apr. 2007, pp. 129-132.
-
(2007)
Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing
, pp. 129-132
-
-
Draper, S.1
Khisti, A.2
Martinian, E.3
Vetro, A.4
Yedidia, J.5
-
7
-
-
51849094958
-
Featuretransformation of biometric templates for secure biometric systems based on error correcting codes
-
Anchorage, AK, Jun.
-
Y. Sutcu, S. Rane, J. S. Yedidia, S. Draper, andA. Vetro, "Featuretransformation of biometric templates for secure biometric systems based on error correcting codes," in Proc. IEEE Conf. Computer Vision and Pattern Recognition, Anchorage, AK, Jun. 2008.
-
(2008)
Proc. IEEE Conf. Computer Vision and Pattern Recognition
-
-
Sutcu, Y.1
Rane, S.2
Yedidia, J.S.3
Draper, A.4
Vetro, S.5
-
8
-
-
79951819190
-
-
Amsterdam, The Netherlands: Elsevier, Jan.
-
A. Vetro, S. Draper, S. Rane, and J. Yedidia, Securing Biometric Data. Amsterdam, The Netherlands: Elsevier, Jan. 2009.
-
(2009)
Securing Biometric Data.
-
-
Vetro, A.1
Draper, S.2
Rane, S.3
Yedidia, J.4
-
9
-
-
0031651014
-
On enabling secure applications through off-line biometric identifications
-
Oakland, CA, May
-
G. Davida, Y. Frankel, and B. Matt, "On enabling secure applications through off-line biometric identifications," in Proc. IEEE Symp. Securityand Privacy, Oakland, CA, May 1998, pp. 148-157.
-
(1998)
Proc. IEEE Symp. Securityand Privacy
, pp. 148-157
-
-
Davida, G.1
Frankel, Y.2
Matt, B.3
-
10
-
-
56349139535
-
The best of both worlds: Applying secure sketches to cancelable biometrics
-
J. Bringer, H. Chabannea, and B. Kindarji, "The best of both worlds: Applying secure sketches to cancelable biometrics," Sci. Comput. Program., vol. 74, pp. 43-51, 2008.
-
(2008)
Sci. Comput. Program.
, vol.74
, pp. 43-51
-
-
Bringer, J.1
Chabannea, H.2
Kindarji, B.3
-
11
-
-
33947530278
-
Generating cancelable fingerprint templates
-
DOI 10.1109/TPAMI.2007.1004, Special issue on Biometrics: Progress and Directions
-
N. Ratha, S. Chikkerur, J. Connell, and R. Bolle, "Generating cancelable fingerprint templates," IEEE Trans. Pattern Anal. Mach. Intell., vol. 29, no. 4, pp. 561-572, Apr. 2007. (Pubitemid 46464397)
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.K.1
Chikkerur, S.2
Connell, J.H.3
Bolle, R.M.4
-
12
-
-
70449640064
-
Privacy weaknesses in biometric sketches
-
K. Simoens, P. Tuyls, and B. Preneel, "Privacy weaknesses in biometric sketches," in Proc. IEEE Int. Symp. Security and Privacy, May 2009, pp. 188-203.
-
(2009)
Proc. IEEE Int. Symp. Security and Privacy, May
, pp. 188-203
-
-
Simoens, K.1
Tuyls, P.2
Preneel, B.3
-
14
-
-
0036350106
-
A fuzzy vault scheme
-
Lausanne, Switzerland, Jun./Jul.
-
A. Juels and M. Sudan, "A fuzzy vault scheme," in Proc. IEEE Int. Symp. Inf. Theory, Lausanne, Switzerland, Jun./Jul. 2002, pp. 293-297.
-
(2002)
Proc. IEEE Int. Symp. Inf. Theory
, pp. 293-297
-
-
Juels, A.1
Sudan, M.2
-
15
-
-
26444525625
-
Fuzzy vault for fingerprints
-
Audio - and Video-Based Biometric Person Authentication: 5th International Conference, AVBPA 2005. Proceedings
-
U. Uludag, S. Pankanti, and A. K. Jain, "Fuzzy vault for fingerprints," Audio-and Video-Based Biometric Person Authentication, pp. 310-319, Jul. 2005. (Pubitemid 41423047)
-
(2005)
Lecture Notes in Computer Science
, vol.3546
, pp. 310-319
-
-
Uludag, U.1
Pankanti, S.2
Jain, A.K.3
-
17
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Interlaken, Switzerland, May
-
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Proc. Advances in Cryptology (EUROCRYPT), Interlaken, Switzerland, May 2004, pp. 523-540.
-
(2004)
Proc. Advances in Cryptology (EUROCRYPT)
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
19
-
-
34547512629
-
On privacy in secure biometrics authentication systems
-
Honolulu, HI, Apr.
-
T. Ignatenko and F. M. J. Willems, "On privacy in secure biometrics authentication systems," in Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, Honolulu, HI, Apr. 2007, pp. 121-124.
-
(2007)
Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing
, pp. 121-124
-
-
Ignatenko, T.1
Willems, F.M.J.2
-
20
-
-
33845435077
-
Capacity and examples of template-protecting biometric authentication systems
-
Berlin, Germany: Springer
-
P. Tuyls and J. Goseling, "Capacity and examples of template-protecting biometric authentication systems," in Biometric Authentication. Berlin, Germany: Springer, 2004, pp. 158-170.
-
(2004)
Biometric Authentication
, pp. 158-170
-
-
Tuyls, P.1
Goseling, J.2
-
21
-
-
77951799602
-
Biometric template transformation: A security analysis
-
San Jose, Jan.
-
A. Nagar, K. Nandakumar, and A. K. Jain, "Biometric template transformation: A security analysis," in Proc. SPIE, Electronic Imaging, Media Forensics and Security, San Jose, Jan. 2010.
-
Proc. SPIE, Electronic Imaging, Media Forensics and Security
, vol.2010
-
-
Nagar, A.1
Nandakumar, K.2
Jain, A.K.3
-
22
-
-
85043062313
-
Efficient biometric verification in encrypted domain
-
Sassari, Italy
-
M. Upmanyu, A. M. Namboodiri, K. Srinathan, and C. V. Jawahar, "Efficient biometric verification in encrypted domain," in Proc. Int. Conf. Biometrics, Sassari, Italy, 2009.
-
(2009)
Proc. Int. Conf. Biometrics
-
-
Upmanyu, M.1
Namboodiri, A.M.2
Srinathan, K.3
Jawahar, C.V.4
-
24
-
-
43949116287
-
Biometric template security
-
Jan.
-
A. K. Jain, K. Nandakumar, and A. Nagar, "Biometric template security," EURASIP J. Advances Signal Process., vol. 2008, pp. 1-17, Jan. 2008.
-
(2008)
EURASIP J. Advances Signal Process.
, vol.2008
, pp. 1-17
-
-
Jain, A.K.1
Nandakumar, K.2
Nagar, A.3
-
25
-
-
79951830125
-
Privacy-security tradeoffs in biometric security systems\Part I: Single use case
-
Mar.
-
L. Lai, S.-W. Ho, and H. V. Poor, "Privacy-security tradeoffs in biometric security systems\Part I: Single use case," IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, Mar. 2011.
-
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.1
, pp. 2011
-
-
Lai, L.1
Ho, S.-W.2
Poor, H.V.3
-
26
-
-
64549142823
-
Privacy leakage in biometric secrecy systems
-
Monticello, IL, Sep.
-
T. Ignatenko and F. M. J. Willems, "Privacy leakage in biometric secrecy systems," in Proc. Annu. Allerton Conf. Communication, Control, and Computing, Monticello, IL, Sep. 2008.
-
(2008)
Proc. Annu. Allerton Conf. Communication, Control, and Computing
-
-
Ignatenko, T.1
Willems, F.M.J.2
-
27
-
-
70450232005
-
Biometric systems: Privacy and secrecy aspects
-
Dec.
-
T. Ignatenko and F. M. J. Willems, "Biometric systems: Privacy and secrecy aspects," IEEE Trans. Inf. Forensics Security, vol. 4, no. 4, pp. 956-973, Dec. 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, Issue.4
, pp. 956-973
-
-
Ignatenko, T.1
Willems, F.M.J.2
-
28
-
-
64549127364
-
Privacy-security tradeoffs in biometric security systems
-
Monticello, IL, Sep. 23-26
-
L. Lai, S.-W. Ho, and H. V. Poor, "Privacy-security tradeoffs in biometric security systems," in Proc. 46th Annu. Allerton Conf. Communication, Control, and Computing, Monticello, IL, Sep. 23-26, 2008.
-
(2008)
Proc. 46th Annu. Allerton Conf. Communication, Control, and Computing
-
-
Lai, L.1
Ho, S.-W.2
Poor, H.V.3
-
29
-
-
85043074494
-
An information theoretic framework for biometric security systems
-
Sassari, Italy, Jun.
-
L. Lai, S.-W. Ho, and H. V. Poor, "An information theoretic framework for biometric security systems," in Proc. Int. Conf. Biometrics, Sassari, Italy, Jun. 2009.
-
(2009)
Proc. Int. Conf. Biometrics
-
-
Lai, L.1
Ho, S.-W.2
Poor, H.V.3
-
30
-
-
2642554156
-
Design of Slepian-Wolf codes by channel code partitioning
-
Snowbird, UT, Mar.
-
V. Stankovic, A. D. Liveris, Z. Xiong, and C. N. Georghiades, "Design of Slepian-Wolf codes by channel code partitioning," in Proc. IEEE Conf. Data Compression, Snowbird, UT, Mar. 2004.
-
(2004)
Proc. IEEE Conf. Data Compression
-
-
Stankovic, V.1
Liveris, A.D.2
Xiong, Z.3
Georghiades, C.N.4
-
31
-
-
0032651629
-
Distributed source coding using syndromes (DISCUS): Design and construction
-
Snowbird, UT, Mar.
-
S. Pradhan and K. Ramchandran, "Distributed source coding using syndromes (DISCUS): Design and construction," in Proc. IEEE Conf. Data Compression, Snowbird, UT, Mar. 1999.
-
(1999)
Proc. IEEE Conf. Data Compression
-
-
Pradhan, S.1
Ramchandran, K.2
-
32
-
-
52349098088
-
Feature extraction for a Slepian-Wolf biometric system using LDPC codes
-
Toronto, Canada, Jul.
-
Y. Sutcu, S. Rane, J. S. Yedidia, S. Draper, and A. Vetro, "Feature extraction for a Slepian-Wolf biometric system using LDPC codes," in Proc. IEEEInt. Symp. Inf. Theory, Toronto, Canada, Jul. 2008.
-
(2008)
Proc. IEEEInt. Symp. Inf. Theory
-
-
Sutcu, Y.1
Rane, S.2
Yedidia, J.S.3
Draper, S.4
Vetro, A.5
-
33
-
-
0016576623
-
Source coding with side information and a converse for the degraded broadcast channel
-
Nov.
-
R. Ahlswede and I. Csiszár, "Source coding with side information and a converse for the degraded broadcast channel," IEEE Trans. Inf. Theory, vol. 21, no. 6, pp. 629-637, Nov. 1975.
-
(1975)
IEEE Trans. Inf. Theory
, vol.21
, Issue.6
, pp. 629-637
-
-
Ahlswede, R.1
Csiszár, I.2
-
34
-
-
0015681689
-
A theorem on the entropy of certain binary sequences and applications: Part i
-
Nov.
-
A. D. Wyner and J. Ziv, "A theorem on the entropy of certain binary sequences and applications: Part I," IEEE Trans. Inf. Theory, vol. 19, no. 6, pp. 769-777, Nov. 1973.
-
(1973)
IEEE Trans. Inf. Theory
, vol.19
, Issue.6
, pp. 769-777
-
-
Wyner, A.D.1
Ziv, J.2
|