-
1
-
-
79952504002
-
Security evaluation of biometrics
-
International Standards Organization
-
"Security Evaluation of Biometrics," in ISO/IEC CD 19792. International Standards Organization, 2008.
-
(2008)
ISO/IEC CD 19792
-
-
-
2
-
-
34548118752
-
Fingerprint image reconstruction from standard templates
-
DOI 10.1109/TPAMI.2007.1087
-
R. Cappelli, A. Lumini, D. Maio, and D. Maltoni, "Fingerprint Image Reconstruction From Standard Templates," IEEE TPAMI, vol. 29, no. 9, pp. 1489-1503, Sept. 2007. (Pubitemid 47299906)
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.9
, pp. 1489-1503
-
-
Cappelli, R.1
Lumini, A.2
Maio, D.3
Maltoni, D.4
-
3
-
-
33947530278
-
Generating cancelable fingerprint templates
-
DOI 10.1109/TPAMI.2007.1004, Special issue on Biometrics: Progress and Directions
-
N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, "Generating Cancelable Fingerprint Templates," IEEE TPAMI, vol. 29, no. 4, pp. 561-572, April 2007. (Pubitemid 46464397)
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.K.1
Chikkerur, S.2
Connell, J.H.3
Bolle, R.M.4
-
4
-
-
36348947793
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
February
-
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data," Cryptology ePrint Archive, Tech. Rep. 235, February 2006.
-
(2006)
Cryptology EPrint Archive, Tech. Rep. 235
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
6
-
-
33747624401
-
Combining crypto with biometrics effectively
-
DOI 10.1109/TC.2006.138
-
F. Hao, R. Anderson, and J. Daugman, "Combining Crypto with Biometrics Effectively," IEEE Trans. on Computers, vol. 55, no. 9, pp. 1081-1088, Sept. 2006. (Pubitemid 44263808)
-
(2006)
IEEE Transactions on Computers
, vol.55
, Issue.9
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
7
-
-
56749174787
-
Theoretical and practical boundaries of binary secure sketches
-
Dec.
-
J. Bringer, H. Chabanne, G. Cohen, B. Kindarji, and G. Zmor, "Theoretical and Practical Boundaries of Binary Secure Sketches," IEEE Trans. on Info. Forensics & Security, vol. 3, no. 4, pp. 673-683, Dec. 2008.
-
(2008)
IEEE Trans. on Info. Forensics & Security
, vol.3
, Issue.4
, pp. 673-683
-
-
Bringer, J.1
Chabanne, H.2
Cohen, G.3
Kindarji, B.4
Zmor, G.5
-
11
-
-
36348986198
-
Fingerprint-based fuzzy vault: Implementation and performance
-
DOI 10.1109/TIFS.2007.908165
-
K. Nandakumar, A. K. Jain, and S. Pankanti, "Fingerprint-based Fuzzy Vault: Implementation and Performance," IEEE Trans. on Info. Forensics & Security, vol. 2, no. 4, pp. 744-757, Dec. 2007. (Pubitemid 350157947)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.4
, pp. 744-757
-
-
Nandakumar, K.1
Jain, A.K.2
Pankanti, S.3
-
12
-
-
34247366845
-
Finding the original point set hidden among chaff
-
DOI 10.1145/1128817.1128845, Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
-
E.-C. Chang, R. Shen, and F. W. Teo, "Finding the Original Point Set Hidden Among Chaff," in Proc. of ACM Symposium on Information, Computer and Communications Security, Taipei, Taiwan, 2006, pp. 182-188. (Pubitemid 46644737)
-
(2006)
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
, vol.2006
, pp. 182-188
-
-
Chang, E.-C.1
Shen, R.2
Teo, F.W.3
-
13
-
-
50249107013
-
Cracking fuzzy vaults and biometric encryption
-
Baltimore, USA, Sept.
-
W. J. Scheirer and T. E. Boult, "Cracking Fuzzy Vaults and Biometric Encryption," in Proc. of Biometrics Symp., Baltimore, USA, Sept. 2007.
-
(2007)
Proc. of Biometrics Symp.
-
-
Scheirer, W.J.1
Boult, T.E.2
-
14
-
-
8344236959
-
Biometric encrpytion
-
McGraw Hill
-
C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, and B. V. K. V. Kumar, "Biometric Encrpytion," in ICSA Guide to Cryptography. McGraw Hill, 1999.
-
(1999)
ICSA Guide to Cryptography
-
-
Soutar, C.1
Roberge, D.2
Stoianov, A.3
Gilroy, R.4
Kumar, B.V.K.V.5
-
15
-
-
37849020496
-
Robust extraction of secret bits from minutiae
-
Seoul, Korea, August
-
E. C. Chang and S. Roy, "Robust Extraction of Secret Bits From Minutiae," in Proc. of Second Intl. Conf. on Biometrics, Seoul, Korea, August 2007, pp. 750-759.
-
(2007)
Proc. of Second Intl. Conf. on Biometrics
, pp. 750-759
-
-
Chang, E.C.1
Roy, S.2
-
16
-
-
78049382207
-
Privacy and security of features extracted from minutiae aggregates
-
Dallas, USA, March
-
A. Nagar, S. Rane, and A. Vetro, "Privacy and Security of Features Extracted from Minutiae Aggregates," in Proc. of ICASSP, Dallas, USA, March 2010.
-
(2010)
Proc. of ICASSP
-
-
Nagar, A.1
Rane, S.2
Vetro, A.3
-
17
-
-
69749099895
-
Fingerprint verification using spectral minutiae representations
-
Sept.
-
H. Xu, R. N. J. Veldhuis, A. M. Bazen, T. A. M. Kevenaar, T. A. H. M. Akkermans, and B. Gokberk, "Fingerprint Verification Using Spectral Minutiae Representations," IEEE Trans. on Info. Forensics & Security, vol. 4, no. 3, pp. 397-409, Sept. 2009.
-
(2009)
IEEE Trans. on Info. Forensics & Security
, vol.4
, Issue.3
, pp. 397-409
-
-
Xu, H.1
Veldhuis, R.N.J.2
Bazen, A.M.3
Kevenaar, T.A.M.4
Akkermans, T.A.H.M.5
Gokberk, B.6
-
18
-
-
84975609428
-
Pattern recognition with binary phase-only filters
-
March
-
J. L. Horner and J. R. Leger, "Pattern recognition with binary phase-only filters," Applied Optics, vol. 24, no. 5, pp. 609-611, March 1985.
-
(1985)
Applied Optics
, vol.24
, Issue.5
, pp. 609-611
-
-
Horner, J.L.1
Leger, J.R.2
-
19
-
-
33748541543
-
Quad-phase-only filter implementation
-
Nov.
-
B. D. Hansche, J. J. Mason, and F. M. Dickey, "Quad-phase-only filter implementation," Applied Optics, vol. 28, no. 22, pp. 4840-4844, Nov. 1989.
-
(1989)
Applied Optics
, vol.28
, Issue.22
, pp. 4840-4844
-
-
Hansche, B.D.1
Mason, J.J.2
Dickey, F.M.3
-
20
-
-
69949138195
-
A biometric key-binding and template protection framework using correlation filters
-
Alghero, Italy, June
-
V. N. Boddeti, F. Su, and B. V. K. Vijaya Kumar, "A Biometric Key-binding and Template Protection Framework Using Correlation Filters," in Proc. of Third Intl. Conf. on Biometrics, Alghero, Italy, June 2009, pp. 919-929.
-
(2009)
Proc. of Third Intl. Conf. on Biometrics
, pp. 919-929
-
-
Boddeti, V.N.1
Su, F.2
Vijaya Kumar, B.V.K.3
-
21
-
-
77949833513
-
Leveraging reliable bits: ECC design considerations for practical secure biometric systems
-
London, UK, Dec.
-
Y. Wang, S. Rane, and A. Vetro, "Leveraging Reliable Bits: ECC Design Considerations for Practical Secure Biometric Systems," in Proc. of First IEEE Workshop on Info. Forensics & Security, London, UK, Dec. 2009.
-
(2009)
Proc. of First IEEE Workshop on Info. Forensics & Security
-
-
Wang, Y.1
Rane, S.2
Vetro, A.3
-
22
-
-
33751580079
-
FVC2002: Second fingerprint verification competition
-
D. Maio, D. Maltoni, J. L. Wayman, and A. K. Jain, "FVC2002: Second Fingerprint Verification Competition," in Proc. of ICPR, Quebec City, Canada, August 2002, pp. 811-814. (Pubitemid 44844609)
-
(2002)
Proceedings - International Conference on Pattern Recognition
, vol.16
, Issue.3
, pp. 811-814
-
-
Maio, D.1
Maltoni, D.2
Cappelli, R.3
Wayman, J.L.4
Jain, A.K.5
-
23
-
-
77950367675
-
A hybrid biometric cryptosystem for securing fingerprint minutiae templates
-
June
-
A. Nagar, K. Nandakumar, and A. K. Jain, "A Hybrid Biometric Cryptosystem for Securing Fingerprint Minutiae Templates," Pattern Recognition Letters, vol. 31, no. 8, pp. 733-741, June 2010.
-
(2010)
Pattern Recognition Letters
, vol.31
, Issue.8
, pp. 733-741
-
-
Nagar, A.1
Nandakumar, K.2
Jain, A.K.3
-
24
-
-
77952661812
-
Information leakage in fuzzy commitment schemes
-
June
-
T. Ignatenko and F. M. J. Willems, "Information Leakage in Fuzzy Commitment Schemes," IEEE Trans. on Info. Forensics & Security, vol. 5, no. 2, pp. 337-348, June 2010.
-
(2010)
IEEE Trans. on Info. Forensics & Security
, vol.5
, Issue.2
, pp. 337-348
-
-
Ignatenko, T.1
Willems, F.M.J.2
-
25
-
-
0036487317
-
The importance of being random: Statistical principles of iris recognition
-
J. Daugman, "The Importance of being Random: Statistical Principles of Iris Recognition," Pattern Recognition, vol. 36, pp. 279-291, 2003.
-
(2003)
Pattern Recognition
, vol.36
, pp. 279-291
-
-
Daugman, J.1
|