-
2
-
-
11244340682
-
Biometric-based cryptographic key generation
-
Y. Chang, W. Zhang, T. Chen, Biometric-based cryptographic key generation, in: Proceedings of the IEEE International Conference on Multimedia and Expo (ICME 2004), vol. 3, 2004, pp. 22032206
-
(2004)
Proceedings of the IEEE International Conference on Multimedia and Expo (ICME 2004)
, vol.3
, pp. 2203-2206
-
-
Chang, Y.1
Zhang, W.2
Chen, T.3
-
3
-
-
48649088535
-
Multi-bits biometric string generation based on the likelihood ratio
-
(BTAS 2007)
-
C. Chen, R. Veldhuis, T. Kevenaar, A. Akkermans, Multi-bits biometric string generation based on the likelihood ratio, in: Proceedings of the IEEE International Conference on Biometrics: Theory, Applications, and System (BTAS 2007), 2007, pp. 16
-
(2007)
Proceedings of the IEEE International Conference on Biometrics: Theory, Applications, and System
, pp. 16
-
-
Chen, C.1
Veldhuis, R.2
Kevenaar, T.3
Akkermans, A.4
-
4
-
-
68949091963
-
Biometric quantization through detection rate optimized bit allocation
-
Article ID 784834, 16 p
-
C. Chen, R. Veldhuis, T. Kevenaar, and A. Akkermans Biometric quantization through detection rate optimized bit allocation EURASIP Journal on Advances in Signal Processing 2009 2009 Article ID 784834, 16 p
-
(2009)
EURASIP Journal on Advances in Signal Processing
, vol.2009
-
-
Chen, C.1
Veldhuis, R.2
Kevenaar, T.3
Akkermans, A.4
-
5
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, L. Reyzin, A. Smith, Fuzzy extractors: how to generate strong keys from biometrics and other noisy data, in: Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Lecture Notes in Computer Science, vol. 3027, 2004, pp. 523540.
-
(2004)
Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Lecture Notes in Computer Science
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
7
-
-
0036037919
-
Private key generation from on-line handwritten signatures
-
F. Hao, and C.W. Chan Private key generation from on-line handwritten signatures Information Management & Computer Security 10 no. 4 2002 159 164
-
(2002)
Information Management & Computer Security
, vol.10
, Issue.4
, pp. 159-164
-
-
Hao, F.1
Chan, C.W.2
-
10
-
-
33750954911
-
Face recognition with renewable and privacy preserving binary templates
-
T.A.M. Kevenaar, G.J. Schrijen, M. van der Veen, A.H.M. Akkermans, F. Zuo, Face recognition with renewable and privacy preserving binary templates, in: Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID '05), 2005, pp. 2126.
-
(2005)
Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID '05)
, pp. 21-26
-
-
Kevenaar, T.A.M.1
Schrijen, G.J.2
Veen Der M.Van3
Akkermans, A.H.M.4
Zuo, F.5
-
11
-
-
35248839355
-
New shielding functions to enhance privacy and prevent misuse of biometric templates
-
LNCS
-
J.-P. Linnartz, P. Tuyls, New shielding functions to enhance privacy and prevent misuse of biometric templates, in: Proceedings of the 4th International Conference on Audio and Video-based Biometric Person Authentication (AVBPA 03), LNCS, vol. 2688, 2003, pp. 393402.
-
(2003)
Proceedings of the 4th International Conference on Audio and Video-based Biometric Person Authentication (AVBPA 03)
, vol.2688
, pp. 393-402
-
-
Linnartz, J.-P.1
Tuyls, P.2
-
12
-
-
77649250983
-
Secure sketch for biometric templates
-
LNCS
-
Q. Li, Y. Sutcu, N. Memon, Secure sketch for biometric templates, in: Proceedings of the12th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT '06), LNCS, vol. 4284, pp. 99113.
-
Proceedings of the12th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT '06)
, vol.4284
, pp. 99-113
-
-
Li, Q.1
Sutcu, Y.2
Memon, N.3
-
13
-
-
0034829626
-
Cryptographic key generation from voice
-
2001
-
F. Monrose, M.K. Reiter, Q. Li, S. Wetzel, Cryptographic key generation from voice, in: Proceedings of the IEEE Symposium on Security and Privacy (S&P 2001), 2001, pp. 202213.
-
Proceedings of the IEEE Symposium on Security and Privacy (S&P 2001)
, pp. 202-213
-
-
Monrose, F.1
Reiter, M.K.2
Li, Q.3
Wetzel, S.4
-
14
-
-
84894038661
-
Using voice to generate cryptographic keys
-
F. Monrose, M.K. Reiter, Q. Li, S. Wetzel, Using voice to generate cryptographic keys, in: Proceedings of the Odyssey 2001, The Speaker Verification Workshop, 2001.
-
(2001)
Proceedings of the Odyssey 2001, the Speaker Verification Workshop
-
-
Monrose, F.1
Reiter, M.K.2
Li, Q.3
Wetzel, S.4
-
15
-
-
33745164328
-
Overview of the face recognition grand challenge
-
P.J. Philips, P.J. Flynn, T. Scruggs, K.W. Bowyer, J. Chang, K. Hoffman, J. Marques, J. Min, W. Worek, Overview of the face recognition grand challenge, in: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR 05), vol. 1, 2005, pp. 947954.
-
(2005)
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (CVPR 05)
, vol.1
, pp. 947-954
-
-
Philips, P.J.1
Flynn, P.J.2
Scruggs, T.3
Bowyer, K.W.4
Chang, J.5
Hoffman, K.6
Marques, J.7
Min, J.8
Worek, W.9
-
16
-
-
4544292940
-
Illumination and Expression (PIE) database
-
T. Sim, S. Baker, M. Bsat, The CMU Pose, Illumination and Expression (PIE) database, in: Proceedings of the Fifth IEEE Conference on Automatic Face and Gesture Recognition (FGR 02), 2002, pp. 4651.
-
(2002)
Proceedings of the Fifth IEEE Conference on Automatic Face and Gesture Recognition (FGR 02)
, pp. 46-51
-
-
Sim, T.1
Baker, S.2
Bsat, M.3
Cmu Pose, T.4
-
17
-
-
37849020774
-
2N discretisation of biophasor in cancellable biometrics
-
A.B.J. Teoh, K.-A. Toh, W.K. Yip, 2N discretisation of biophasor in cancellable biometrics, in: Proceedings of the Second International Conference on Biometrics (ICB 2007), Lecture Notes in Computer Science, vol. 4642, 2007, pp. 435444.
-
(2007)
Proceedings of the Second International Conference on Biometrics (ICB 2007), Lecture Notes in Computer Science
, vol.4642
, pp. 435-444
-
-
Teoh, A.B.J.1
Toh, K.-A.2
Yip, W.K.3
-
18
-
-
8344273612
-
Personalised cryptographic key generation based on FaceHashing
-
A.B.J. Teoh, D.C.L. Ngo, and A. Goh Personalised cryptographic key generation based on FaceHashing Computers and Security 23 7 2004 606 614
-
(2004)
Computers and Security
, vol.23
, Issue.7
, pp. 606-614
-
-
Teoh, A.B.J.1
Ngo, D.C.L.2
Goh, A.3
-
19
-
-
38949203738
-
Cancellable biometrics and annotations on BioHash
-
Elsevier
-
A.B.J. Teoh, W.K. Yip, and S. Lee Cancellable biometrics and annotations on BioHash Pattern Recognition 41 6 2008 2034 2044 Elsevier
-
(2008)
Pattern Recognition
, vol.41
, Issue.6
, pp. 2034-2044
-
-
Teoh, A.B.J.1
Yip, W.K.2
Lee, S.3
-
20
-
-
26444507172
-
Practical biometric authentication with template protection
-
P. Tuyls, A.H.M. Akkermans, T.A.M. Kevenaar, G.-J. Schrijen, A.M. Bazen, N.J. Veldhuis, Practical biometric authentication with template protection, in: Proceedings of the Fifth International Conference on Audio- and Video-based Biometric Person Authentication, LNCS, vol. 3546, 2005, pp. 436446.
-
(2005)
Proceedings of the Fifth International Conference on Audio- And Video-based Biometric Person Authentication, LNCS
, vol.3546
, pp. 436-446
-
-
Tuyls, P.1
Akkermans, A.H.M.2
Kevenaar, T.A.M.3
Schrijen, G.-J.4
Bazen, A.M.5
Veldhuis, N.J.6
-
21
-
-
5044251072
-
Reliable biometric authentication with privacy protection
-
E. Verbitskiy, P. Tuyls, D. Denteneer, J.P. Linnartz, Reliable biometric authentication with privacy protection, in: Proceedings of the 24th Benelux Symposium on Information Theory, 2003, pp. 125132.
-
(2003)
Proceedings of the 24th Benelux Symposium on Information Theory
, pp. 125-132
-
-
Verbitskiy, E.1
Tuyls, P.2
Denteneer, D.3
Linnartz, J.P.4
-
22
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
U. Uludag, S. Pankanti, S. Prabhakar, and A.K. Jain Biometric cryptosystems: issues and challenges Proceedings of the IEEE 92 6 2004 948 960
-
(2004)
Proceedings of the IEEE
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
-
24
-
-
33744964385
-
Generation of replaceable cryptographic keys from dynamic handwritten signatures
-
W.K. Yip, A. Goh, D.C.L. Ngo, A.B.J. Teoh, Generation of replaceable cryptographic keys from dynamic handwritten signatures, in: Proceedings of the First International Conference on Biometrics, Lecture Notes in Computer Science, vol. 3832, 2006, pp. 509515.
-
(2006)
Proceedings of the First International Conference on Biometrics, Lecture Notes in Computer Science
, vol.3832
, pp. 509-515
-
-
Yip, W.K.1
Goh, A.2
Ngo, D.C.L.3
Teoh, A.B.J.4
|