-
4
-
-
43949116287
-
Biometric template security
-
A. Jain, K. Nandakumar, and A. Nagar, "Biometric template security," EURASIP J. Adv. Signal Process., vol. 2008, 2008.
-
(2008)
EURASIP J. Adv. Signal Process.
, vol.2008
-
-
Jain, A.1
Nandakumar, K.2
Nagar, A.3
-
7
-
-
36348947793
-
-
Tech. Rep. Feb. A preliminary version of this work appeared in EUROCRYPT 2004
-
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, Fuzzy Extractors: How to Generate Strong Keys From Biometrics and Other Noisy Data Cryptology ePrint Archive, Tech. Rep. 235, Feb. 2006, A preliminary version of this work appeared in EUROCRYPT 2004.
-
(2006)
Fuzzy Extractors: How to Generate Strong Keys From Biometrics and Other Noisy Data Cryptology ePrint Archive
, vol.235
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
8
-
-
70450232005
-
Biometric systems: Privacy and secrecy aspects
-
Dec.
-
T. Ignatenko and F. M. J. Willems, "Biometric systems: Privacy and secrecy aspects," IEEE Trans. Inf. Forensics Security, vol. 4, no. 4, pp. 956-973, Dec. 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, Issue.4
, pp. 956-973
-
-
Ignatenko, T.1
Willems, F.M.J.2
-
9
-
-
37849020774
-
N discretisation of Bio- Phasor in cancellable biometrics
-
Seoul, South Korea, Aug.
-
N discretisation of Bio- Phasor in cancellable biometrics," in Proc. Second Int. Conf. Biometrics, Seoul, South Korea, Aug. 2007, pp. 435-444.
-
(2007)
Proc. Second Int. Conf. Biometrics
, pp. 435-444
-
-
Teoh, A.B.J.1
Toh, K.-A.2
Yip, W.K.3
-
10
-
-
33947530278
-
Generating cancelable fingerprint templates
-
DOI 10.1109/TPAMI.2007.1004, Special issue on Biometrics: Progress and Directions
-
N. K. Ratha, S. Chikkerur, J. H. Connell, and R.M. Bolle, "Generating cancelable fingerprint templates," IEEE Trans. Pattern Anal. Mach. Intell., vol. 29, no. 4, pp. 561-572, Apr. 2007. (Pubitemid 46464397)
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.K.1
Chikkerur, S.2
Connell, J.H.3
Bolle, R.M.4
-
11
-
-
56749150770
-
Bio-cryptographic protocols with bipartite biotokens
-
Tampa, FL
-
W. Scheirer and T. Boult, "Bio-cryptographic protocols with bipartite biotokens," in Proc. Biometric Symp., Tampa, FL, 2008.
-
(2008)
Proc. Biometric Symp.
-
-
Scheirer, W.1
Boult, T.2
-
12
-
-
37849009414
-
Hardening fingerprint fuzzy vault using password
-
Seoul, South Korea, Aug.
-
K. Nandakumar, A. Nagar, and A. K. Jain, "Hardening fingerprint fuzzy vault using password," in Proc. Second Int. Conf. Biometrics, Seoul, South Korea, Aug. 2007, pp. 927-937.
-
(2007)
Proc. Second Int. Conf. Biometrics
, pp. 927-937
-
-
Nandakumar, K.1
Nagar, A.2
Jain, A.K.3
-
13
-
-
0026065565
-
Eigenfaces for recognition
-
M. Turk and A. Pentland, "Eigenfaces for recognition," J. Cognitive NeuroSci., vol. 3, no. 1, pp. 71-86, 1991.
-
(1991)
J. Cognitive NeuroSci.
, vol.3
, Issue.1
, pp. 71-86
-
-
Turk, M.1
Pentland, A.2
-
14
-
-
0031185845
-
Eigenfaces vs. fisherfaces: Recognition using class specific linear projection
-
P. N. Belhumeur, J. P. Hespanha, and D. J. Kriegman, "Eigenfaces versus Fisherfaces: Recognition using class specific linear projection," IEEE Trans. Pattern Anal.Mach. Intell., vol. 9, no. 7, pp. 711-720, Jul. 1997. (Pubitemid 127762263)
-
(1997)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.19
, Issue.7
, pp. 711-720
-
-
Belhumeur, P.N.1
Hespanha, J.P.2
Kriegman, D.J.3
-
15
-
-
0002736715
-
Recognizing persons by their iris patterns
-
A. K. Jain, R. Bolle, and S. Pankanti, Eds. London, U.K.: Kluwer
-
J. Daugman, "Recognizing persons by their iris patterns," in Biometrics: Personal Identification in Networked Society, A. K. Jain, R. Bolle, and S. Pankanti, Eds. London, U.K.: Kluwer, 1999, pp. 103-122.
-
(1999)
Biometrics: Personal Identification in Networked Society
, pp. 103-122
-
-
Daugman, J.1
-
16
-
-
70450245646
-
Multibiometric cryptosystem: Model structure and performance analysis
-
Dec.
-
B. Fu, S. X. Yang, J. Li, and D. Hu, "Multibiometric cryptosystem: Model structure and performance analysis," IEEE Trans. Inf. Forensics Security, vol. 4, no. 4, pp. 867-882, Dec. 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, Issue.4
, pp. 867-882
-
-
Fu, B.1
Yang, S.X.2
Li, J.3
Hu, D.4
-
17
-
-
71749111955
-
Multi-algorithm fusion with template protection
-
Washington, DC, Sep.
-
E. Kelkboom, X. Zhou, J. Breebaart, R. Veldhuis, and C. Busch, "Multi-algorithm fusion with template protection," in Proc. IEEE 3rd Int. Conf. Biometrics: Theory, Applications, and Systems,Washington, DC, Sep. 2009.
-
(2009)
Proc. IEEE 3rd Int. Conf. Biometrics: Theory, Applications, and Systems
-
-
Kelkboom, E.1
Zhou, X.2
Breebaart, J.3
Veldhuis, R.4
Busch, C.5
-
18
-
-
27644521507
-
Automatic secure fingerprint verification system based on fuzzy vault scheme
-
Philadelphia, PA, Mar.
-
S.Yang and I.Verbauwhede, "Automatic secure fingerprint verification system based on fuzzy vault scheme," in Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, Philadelphia, PA, Mar. 2005, vol. 5, pp. 609-612.
-
(2005)
Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing
, vol.5
, pp. 609-612
-
-
Yang, S.1
Verbauwhede, I.2
-
19
-
-
36348986198
-
Fingerprint-based fuzzy vault: Implementation and performance
-
DOI 10.1109/TIFS.2007.908165
-
K.Nandakumar, A. K. Jain, and S. Pankanti, "Fingerprint-based fuzzy vault: Implementation and performance," IEEE Trans. Inf. Forensics Security, vol. 2, no. 4, pp. 744-757, Dec. 2007. (Pubitemid 350157947)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.4
, pp. 744-757
-
-
Nandakumar, K.1
Jain, A.K.2
Pankanti, S.3
-
20
-
-
33845514726
-
Protecting face biometric data on smartcard with Reed-Solomon code
-
New York, Jun.
-
Y. C. Feng and P. C. Yuen, "Protecting face biometric data on smartcard with Reed-Solomon code," in Proc. CVPR Workshop on Biometrics, New York, Jun. 2006.
-
(2006)
Proc. CVPR Workshop on Biometrics
-
-
Feng, Y.C.1
Yuen, P.C.2
-
21
-
-
37849013877
-
Biometric key binding: Fuzzy vault based on iris images
-
Seoul, South Korea, Aug.
-
Y. J. Lee, K. Bae, S. J. Lee, K. R. Park, and J. Kim, "Biometric key binding: Fuzzy vault based on iris images," in Proc. Second Int. Conf. Biometrics, Seoul, South Korea, Aug. 2007, pp. 800-808.
-
(2007)
Proc. Second Int. Conf. Biometrics
, pp. 800-808
-
-
Lee, Y.J.1
Bae, K.2
Lee, S.J.3
Park, K.R.4
Kim, J.5
-
22
-
-
33747674301
-
Cryptographic key generation using handwritten signature
-
Orlando, FL, Apr.
-
M. Freire-Santos, J. Fierrez-Aguilar, and J. Ortega-Garcia, "Cryptographic key generation using handwritten signature," in Proc. SPIE Conf. Biometric Technologies for Human Identification, Orlando, FL, Apr. 2006, vol. 6202, pp. 225-231.
-
(2006)
Proc. SPIE Conf. Biometric Technologies for Human Identification
, vol.6202
, pp. 225-231
-
-
Freire-Santos, M.1
Fierrez-Aguilar, J.2
Ortega-Garcia, J.3
-
23
-
-
56749174787
-
Theoretical and practical boundaries of binary secure sketches
-
Dec.
-
J. Bringer, H. Chabanne, G. Cohen, B. Kindarji, and G. Zemor, "Theoretical and practical boundaries of binary secure sketches," IEEE Trans. Inf. Forensics Security, vol. 3, no. 4, pp. 673-683, Dec. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.4
, pp. 673-683
-
-
Bringer, J.1
Chabanne, H.2
Cohen, G.3
Kindarji, B.4
Zemor, G.5
-
24
-
-
33750954911
-
Face recognition with renewable and privacy preserving binary templates
-
DOI 10.1109/AUTOID.2005.24, 1544395, Proceedings - Fourth IEEE Workshop on Automatic Identification Advanced Technologies, AUTO ID 2005
-
T. A. M. Kevenaar, G. J. Schrijen, M. vanderVeen, A. H. M. Akkermans, and F. Zuo, "Face recognition with renewable and privacy preserving binary templates," in Proc. AutoID, 2005, pp. 21-26. (Pubitemid 44733944)
-
(2005)
Proceedings - Fourth IEEE Workshop on Automatic Identification Advanced Technologies, AUTO ID 2005
, vol.2005
, pp. 21-26
-
-
Kevenaar, T.A.M.1
Schrijen, G.J.2
Van Der Veen, M.3
Akkermans, A.H.M.4
Zuo, F.5
-
25
-
-
33747624401
-
Combining crypto with biometrics effectively
-
DOI 10.1109/TC.2006.138
-
F. Hao, R. Anderson, and J. Daugman, "Combining crypto with biometrics effectively," IEEE Trans. Comput., vol. 55, no. 9, pp. 1081-1088, Sep. 2006. (Pubitemid 44263808)
-
(2006)
IEEE Transactions on Computers
, vol.55
, Issue.9
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
26
-
-
78149261619
-
Fuzzy commitment for function based signature template protection
-
Mar
-
E. Maiorana and P. Campisi, "Fuzzy commitment for function based signature template protection," IEEE Signal Process. Lett., vol. 17, no. 3, pp. 249-252, Mar. 2010.
-
(2010)
IEEE Signal Process. Lett.
, vol.17
, Issue.3
, pp. 249-252
-
-
Maiorana, E.1
Campisi, P.2
-
27
-
-
50249107013
-
Cracking fuzzy vaults and biometric encryption
-
Baltimore, MD, Sep.
-
W. J. Scheirer and T. E. Boult, "Cracking fuzzy vaults and biometric encryption," in Proc. Biometrics Symp., Baltimore, MD, Sep. 2007.
-
(2007)
Proc. Biometrics Symp.
-
-
Scheirer, W.J.1
Boult, T.E.2
-
28
-
-
70350569787
-
Biometric keys: Suitable use cases and achievable information content
-
R. Plaga, "Biometric keys: Suitable use cases and achievable information content," Int. J. Inf. Security, vol. 8, pp. 447-454, 2009.
-
(2009)
Int. J. Inf. Security
, vol.8
, pp. 447-454
-
-
Plaga, R.1
-
29
-
-
35148846059
-
Secure biometric templates from fingerprint-face features
-
Minneapolis, MN, Jun.
-
Y. Sutcu, Q. Li, and N. Memon, "Secure biometric templates from fingerprint-face features," in Proc. CVPR Workshop Biometrics, Minneapolis, MN, Jun. 2007.
-
(2007)
Proc. CVPR Workshop Biometrics
-
-
Sutcu, Y.1
Li, Q.2
Memon, N.3
-
30
-
-
67549107384
-
Multibiometric template security using fuzzy vault
-
Washington, DC, Sep.
-
K. Nandakumar and A. K. Jain, "Multibiometric template security using fuzzy vault," in Proc. IEEE 2nd Int. Conf. Biometrics: Theory, Applications, and Systems, Washington, DC, Sep. 2008.
-
(2008)
Proc. IEEE 2nd Int. Conf. Biometrics: Theory, Applications, and Systems
-
-
Nandakumar, K.1
Jain, A.K.2
-
31
-
-
60649105959
-
Privacyaware biometrics: Design and implementation of a multimodal verification system
-
Los Alamitos, CA
-
S. Cimato, M. Gamassi, V. Piuri, R. Sassi, and F. Scotti, "Privacyaware biometrics: Design and implementation of a multimodal verification system," in Proc. IEEE Ann. Conf. Computer Security Applications, Los Alamitos, CA, 2008.
-
(2008)
Proc. IEEE Ann. Conf. Computer Security Applications
-
-
Cimato, S.1
Gamassi, M.2
Piuri, V.3
Sassi, R.4
Scotti, F.5
-
32
-
-
84855914460
-
Secure sketch for multiple secrets
-
Nejra, Spain
-
C. Fang, Q. Li, and E.-C. Chang, "Secure sketch for multiple secrets," in Proc. Int. Conf. Applied Cryptography and Network Security, Nejra, Spain, 2010.
-
(2010)
Proc. Int. Conf. Applied Cryptography and Network Security
-
-
Fang, C.1
Li, Q.2
Chang, E.-C.3
-
33
-
-
0036581041
-
Methods for binary multidimensional scaling
-
D. Rhodes, "Methods for binary multidimensional scaling," Neural Computation, vol. 14, pp. 1195-1232, 2002.
-
(2002)
Neural Computation
, vol.14
, pp. 1195-1232
-
-
Rhodes, D.1
-
34
-
-
38749118638
-
Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions
-
DOI 10.1109/FOCS.2006.49, 4031381, 47th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2006
-
A. Andoni and P. Indyk, "Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions," in IEEE Symp. Foundations Computer Science, 2006, pp. 459-468. (Pubitemid 351175534)
-
(2006)
Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS
, pp. 459-468
-
-
Andoni, A.1
Indyk, P.2
-
35
-
-
68949091963
-
Biometric quantization through detection rate optimized bit allocation
-
C. Chen, R. N. J. Veldhuis, T. A. M. Kevenaar, and A. H. M. Akkermans, "Biometric quantization through detection rate optimized bit allocation," EURASIP J. Adv. Signal Process., vol. 2009, 2009.
-
(2009)
EURASIP J. Adv. Signal Process.
, vol.2009
-
-
Chen, C.1
Veldhuis, R.N.J.2
Kevenaar, T.A.M.3
Akkermans, A.H.M.4
-
36
-
-
69949132178
-
Binary biometric representation through pairwise polar quantization
-
C. Chen and R. Veldhuis, "Binary biometric representation through pairwise polar quantization," in Proc. Int. Conf. Biometrics, 2009, pp. 72-81.
-
(2009)
Proc. Int. Conf. Biometrics
, pp. 72-81
-
-
Chen, C.1
Veldhuis, R.2
-
37
-
-
78049382207
-
Privacy and security of features extracted from minutiae aggregates
-
Dallas, TX, Mar.
-
A. Nagar, S. Rane, and A. Vetro, "Privacy and security of features extracted from minutiae aggregates," in Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing, Dallas, TX, Mar. 2010, pp. 524-531.
-
(2010)
Proc. IEEE Int. Conf. Acoustics, Speech and Signal Processing
, pp. 524-531
-
-
Nagar, A.1
Rane, S.2
Vetro, A.3
-
38
-
-
51849141886
-
Spectral minutiae: A fixed-length representation of a minutiae set
-
Anchorage, AK
-
H. Xu, R. Veldhuis, T. Kevenaar, A. Akkermans, and A. Bazen, "Spectral minutiae: A fixed-length representation of a minutiae set," in Proc. IEEE Computer Vision and Pattern Recognition Workshop on Biometrics, Anchorage, AK, 2008.
-
(2008)
Proc. IEEE Computer Vision and Pattern Recognition Workshop on Biometrics
-
-
Xu, H.1
Veldhuis, R.2
Kevenaar, T.3
Akkermans, A.4
Bazen, A.5
-
39
-
-
35148889847
-
Anonymous and revocable fingerprint recognition
-
Minneapolis, MN, Jun.
-
F. Farooq, R. Bolle, T. Jea, and N. Ratha, "Anonymous and revocable fingerprint recognition," in Proc. IEEE Computer Vision and Pattern Recognition, Minneapolis, MN, Jun. 2007.
-
(2007)
Proc. IEEE Computer Vision and Pattern Recognition
-
-
Farooq, F.1
Bolle, R.2
Jea, T.3
Ratha, N.4
-
41
-
-
3543115398
-
-
Online. Available:
-
J. I. Hall, Notes on Coding Theory 2001 [Online]. Available: http://www.mth.msu.edu/~jhall/classes/codenotes/GRS.pdf
-
(2001)
Notes on Coding Theory
-
-
Hall, J.I.1
-
43
-
-
67349227385
-
Robustness of multimodal biometric fusion methods against spoof attacks
-
R. N. Rodrigues, L. L. Ling, and V. Govindaraju, "Robustness of multimodal biometric fusion methods against spoof attacks," J. Vis. Lang. Comput., vol. 20, no. 3, pp. 169-179, 2009.
-
(2009)
J. Vis. Lang. Comput.
, vol.20
, Issue.3
, pp. 169-179
-
-
Rodrigues, R.N.1
Ling, L.L.2
Govindaraju, V.3
-
45
-
-
34247366845
-
Finding the original point set hidden among chaff
-
Taipei, Taiwan, Jun.
-
E.-C. Chang, R. Shen, and F. W. Teo, "Finding the original point set hidden among chaff," in Proc. 2006 ACM Symp. Information, Computer and Communications Security, Taipei, Taiwan, Jun. 2006.
-
(2006)
Proc. 2006 ACM Symp. Information, Computer and Communications Security
-
-
Chang, E.-C.1
Shen, R.2
Teo, F.W.3
-
46
-
-
0036487317
-
The importance of being random: Statistical principles of iris recognition
-
J. Daugman, "The importance of being random: Statistical principles of iris recognition," Pattern Recognit., vol. 36, pp. 279-291, 2003.
-
(2003)
Pattern Recognit.
, vol.36
, pp. 279-291
-
-
Daugman, J.1
-
47
-
-
84855950971
-
-
Michigan State University, Tech. Rep. MSU-CSE-11-4
-
A. Nagar, K. Nandakumar, and A. K. Jain, Multibiometric Cryptosystems Department of Computer Science and Engineering, Michigan State University, Tech. Rep. MSU-CSE-11-4, 2011.
-
(2011)
Multibiometric Cryptosystems Department of Computer Science and Engineering
-
-
Nagar, A.1
Nandakumar, K.2
Jain, A.K.3
-
48
-
-
0031122443
-
On-line fingerprint verification
-
A. K. Jain, L. Hong, and R. Bolle, "On-line fingerprint verification," IEEE Trans. Pattern Anal. Mach. Intell., vol. 19, no. 4, pp. 302-314, Apr. 1997. (Pubitemid 127762887)
-
(1997)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.19
, Issue.4
, pp. 302-314
-
-
Jain, A.1
Hong, L.2
Bolle, R.3
-
49
-
-
52949099082
-
-
Master's Thesis, Department of Computer Science and Electrical Engineering,West Virginia University,Morgantown, WV
-
S. Shah, "Enhanced Iris Recognition: Algorithms for Segmentation, Matching and Synthesis," Master's Thesis, Department of Computer Science and Electrical Engineering,West Virginia University,Morgantown, WV, 2006.
-
(2006)
Enhanced Iris Recognition: Algorithms for Segmentation Matching and Synthesis
-
-
Shah, S.1
|