-
1
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM Journal on Computing, 38:97-139, 2008.
-
(2008)
SIAM Journal on Computing
, vol.38
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
2
-
-
77954556974
-
Scale invariant gabor descriptorbased noncooperative iris recognition
-
February 2010
-
Y. Du, C. Belcher, and Z. Zhou. Scale invariant gabor descriptorbased noncooperative iris recognition. EURASIP J. Adv. Signal Process, 2010:37:1-37:10, February 2010.
-
(2010)
EURASIP J. Adv. Signal Process
, vol.37
-
-
Du, Y.1
Belcher, C.2
Zhou, Z.3
-
4
-
-
80052999541
-
Biometric convolution using multiple biometrics
-
Google Patents
-
V. Govindaraju, V. Chavan, and S. Chikkerur. Biometric convolution using multiple biometrics. Google Patents, 2005.
-
(2005)
-
-
Govindaraju, V.1
Chavan, V.2
Chikkerur, S.3
-
5
-
-
33747624401
-
Combining crypto with biometrics effectively
-
DOI 10.1109/TC.2006.138
-
F. Hao, R. Anderson, and J. Daugman. Combining crypto with biometrics effectively. IEEE Transactions on Computers, 55(9):1081-1088, 2006. (Pubitemid 44263808)
-
(2006)
IEEE Transactions on Computers
, vol.55
, Issue.9
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
7
-
-
10044236375
-
Biometrics: A grand challenge
-
A. Jain, S. Pankanti, S. Prabhakar, L. Hong, A. Ross, and J. Wayman. Biometrics: a grand challenge. In Proceedings of the 17th International Conference on Pattern Recognition, pages 935-942, 2004.
-
(2004)
Proceedings of the 17th International Conference on Pattern Recognition
, pp. 935-942
-
-
Jain, A.1
Pankanti, S.2
Prabhakar, S.3
Hong, L.4
Ross, A.5
Wayman, J.6
-
8
-
-
30844458593
-
A fuzzy vault scheme
-
DOI 10.1007/s10623-005-6343-z
-
A. Juels and M. Sudan. A fuzzy vault scheme. Designs, Codes and Cryptography, 38:237-257, 2006. (Pubitemid 43102559)
-
(2006)
Designs, Codes, and Cryptography
, vol.38
, Issue.2
, pp. 237-257
-
-
Juels, A.1
Sudan, M.2
-
9
-
-
52349122571
-
A new method for generating an invariant iris private key based on the fuzzy vault system
-
Y. Lee, K. Park, S. Lee, K. Bae, and J. Kim. A new method for generating an invariant iris private key based on the fuzzy vault system. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 38(5):1302-1313, 2008.
-
(2008)
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
, vol.38
, Issue.5
, pp. 1302-1313
-
-
Lee, Y.1
Park, K.2
Lee, S.3
Bae, K.4
Kim, J.5
-
10
-
-
38049136534
-
An efficient protocol for secure two-party computation in the presence of malicious adversaries
-
Y. Lindell and B. Pinkas. An efficient protocol for secure two-party computation in the presence of malicious adversaries. In Advances in Cryptology - EUROCRYPT 2007, 4515:52-78, 2007.
-
(2007)
Advances in Cryptology - EUROCRYPT 2007
, vol.4515
, pp. 52-78
-
-
Lindell, Y.1
Pinkas, B.2
-
11
-
-
77951209095
-
Cancelable templates for sequence-based biometrics with application to on-line signature recognition
-
E. Maiorana, P. Campisi, J. Fierrez, J. Ortega-Garcia, and A. Neri. Cancelable templates for sequence-based biometrics with application to on-line signature recognition. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, 40(3):525-538, 2010.
-
(2010)
IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans
, vol.40
, Issue.3
, pp. 525-538
-
-
Maiorana, E.1
Campisi, P.2
Fierrez, J.3
Ortega-Garcia, J.4
Neri, A.5
-
12
-
-
33947530278
-
Generating cancelable fingerprint templates
-
DOI 10.1109/TPAMI.2007.1004, Special issue on Biometrics: Progress and Directions
-
N. Ratha, S. Chikkerur, J. Connell, and R. Bolle. Generating cancelable fingerprint templates. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(4):561-572, 2007. (Pubitemid 46464397)
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.K.1
Chikkerur, S.2
Connell, J.H.3
Bolle, R.M.4
-
13
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
N. Ratha, J. Connell, and R. Bolle. Enhancing security and privacy in biometrics-based authentication systems. IBM System Journal, 40:614-634, 2001. (Pubitemid 32933421)
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
15
-
-
10044284550
-
Cancelable biometric filters for face recognition
-
M. Savvides, B. Kumar, and P. Khosla. Cancelable biometric filters for face recognition. In Pattern Recognition, 2004. ICPR 2004. Proceedings of the 17th International Conference on, volume 3, pages 922-925, 2004.
-
(2004)
Pattern Recognition, 2004. ICPR 2004. Proceedings of the 17th International Conference on
, vol.3
, pp. 922-925
-
-
Savvides, M.1
Kumar, B.2
Khosla, P.3
-
16
-
-
34548074162
-
Protecting biometric templates with sketch: Theory and practice
-
Y. Sutcu, Q. Li, and N. Memon. Protecting biometric templates with sketch: Theory and practice. IEEE Transactions on Information Forensics and Security, 2(3):503-512, 2007.
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.3
, pp. 503-512
-
-
Sutcu, Y.1
Li, Q.2
Memon, N.3
-
17
-
-
35148846059
-
Secure biometric templates from fingerprint-face features
-
0
-
Y. Sutcu, Q. Li, and N. Memon. Secure biometric templates from fingerprint-face features. Computer Vision and Pattern Recognition, IEEE Computer Society Conference on, 0:1-6, 2007.
-
(2007)
Computer Vision and Pattern Recognition, IEEE Computer Society Conference on
, pp. 1-6
-
-
Sutcu, Y.1
Li, Q.2
Memon, N.3
-
18
-
-
80053034474
-
Method, system and program for authenticating a user by biometric information
-
Google Patents
-
K. Takahashi, S. Hirata, H. Hino, and M. Mimura. Method, system and program for authenticating a user by biometric information. Google Patents, 2007.
-
(2007)
-
-
Takahashi, K.1
Hirata, S.2
Hino, H.3
Mimura, M.4
|