-
1
-
-
38149030200
-
Biometric Encryption: a Positive-sum Technology That Achieves Strong Authentication, Security and Privacy
-
[2010-05-20]
-
Cavoukian A, Stoianov A. Biometric Encryption: a Positive-sum Technology That Achieves Strong Authentication, Security and Privacy [R/OL]. [2010-05-20]. http://www.ipc.on.ca.
-
-
-
Cavoukian, A.1
Stoianov, A.2
-
2
-
-
33947506091
-
Method for Producing a Digital Signature with Aid of a Biometric Feature
-
German Patent DE 42 43 908 A1. [2010-05-20]
-
Bodo A. Method for Producing a Digital Signature with Aid of a Biometric Feature. German Patent DE 42 43 908 A1 [P/OL]. 1994[2010-05-20]. http://depatisnet.dpma.de/ipc/recherchex.do
-
(1994)
-
-
Bodo, A.1
-
4
-
-
52149117439
-
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
-
Dodis Y, Ostrovsky R, Reyzin L, et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data [J]. SIAM Journal on Computing, 2008, 38(1): 97-139.
-
(2008)
SIAM Journal on Computing
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
-
5
-
-
35248839355
-
New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates
-
New York: Springer-Verlag
-
Linnartz J P, Tuyls P. New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates [C]//4th Conference on Audio and Video Based Person Authentication. New York: Springer-Verlag, 2003: 393-402.
-
(2003)
4th Conference on Audio and Video Based Person Authentication
, pp. 393-402
-
-
Linnartz, J.P.1
Tuyls, P.2
-
6
-
-
33747624401
-
Combining Crypto with Biometrics Effectively
-
Hao F, Anderson R, Daugman J. Combining Crypto with Biometrics Effectively [J]. IEEE Trans on Computers, 2006, 55(9): 1081-1088.
-
(2006)
IEEE Trans on Computers
, vol.55
, Issue.9
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
9
-
-
36348986198
-
Fingerprint-Based Fuzzy Vault: Implementation and Performance
-
Nandakumar K, Jain A K, Pankanti S. Fingerprint-Based Fuzzy Vault: Implementation and Performance [J]. IEEE Trans on Information Forensics and Security, 2007, 2(4): 744-757.
-
(2007)
IEEE Trans on Information Forensics and Security
, vol.2
, Issue.4
, pp. 744-757
-
-
Nandakumar, K.1
Jain, A.K.2
Pankanti, S.3
-
10
-
-
52349122571
-
A New Method for Generating an Invariant Iris Private Key Based on the Fuzzy Vault System
-
Lee Y J, Park K R, Lee S J, et al. A New Method for Generating an Invariant Iris Private Key Based on the Fuzzy Vault System [J]. IEEE Trans on Systems, Man, and Cybernetics-Part B: Cybernetics, 2008, 38(5): 1302-1313.
-
(2008)
IEEE Trans on Systems, Man, and Cybernetics-Part B: Cybernetics
, vol.38
, Issue.5
, pp. 1302-1313
-
-
Lee, Y.J.1
Park, K.R.2
Lee, S.J.3
-
14
-
-
34147097906
-
Biometrics Based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme
-
Washington DC: IEEE Computer Society
-
Nagar A, Chaudhury S. Biometrics Based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme [C]//Proceedings of the 18th International Conference on Pattern Recognition. Washington DC: IEEE Computer Society, 2006: 537-540.
-
(2006)
Proceedings of the 18th International Conference on Pattern Recognition
, pp. 537-540
-
-
Nagar, A.1
Chaudhury, S.2
-
16
-
-
50249107013
-
Cracking Fuzzy Vaults and Biometric Encryption
-
Baltimore: IEEE
-
Scheirer W J, Boult T E. Cracking Fuzzy Vaults and Biometric Encryption [C]//Biometrics Symposium. Baltimore: IEEE, 2007: 1-6.
-
(2007)
Biometrics Symposium
, pp. 1-6
-
-
Scheirer, W.J.1
Boult, T.E.2
-
18
-
-
56749120040
-
The Fuzzy Vault for Fingerprints is Vulnerable to Brute Force Attack
-
[2010-06-03]
-
Mihailescu P. The Fuzzy Vault for Fingerprints is Vulnerable to Brute Force Attack [J/OL]. [2010-06-03]. http://www.uni-math.gwdg.de/preda/mihailescu-papers/vault.pdf.
-
-
-
Mihailescu, P.1
-
21
-
-
33749253169
-
Fingerprint Enhancement Using STFT Analysis
-
Chikkerur S, Cartwright A N, Govindaraju V. Fingerprint Enhancement Using STFT Analysis [J]. Pattern Recognition, 2007, 40(1): 198-211.
-
(2007)
Pattern Recognition
, vol.40
, Issue.1
, pp. 198-211
-
-
Chikkerur, S.1
Cartwright, A.N.2
Govindaraju, V.3
-
22
-
-
32644449022
-
A Chaincode Based Scheme for Fingerprint Feature Extraction
-
Shi Z, Govindaraju V. A Chaincode Based Scheme for Fingerprint Feature Extraction [J]. Pattern Recognition Letters, 2006, 27(5): 462-468.
-
(2006)
Pattern Recognition Letters
, vol.27
, Issue.5
, pp. 462-468
-
-
Shi, Z.1
Govindaraju, V.2
|