메뉴 건너뛰기




Volumn 5, Issue 6, 2011, Pages 389-397

Context-based biometric key generation for Iris

Author keywords

[No Author keywords available]

Indexed keywords

BIOMETRIC DATA; BIOMETRIC TEMPLATE; CONTEXT-BASED; GENERIC TREATMENT; IRIS BIOMETRICS; IRIS CODE; KEY GENERATION;

EID: 84858732220     PISSN: 17519632     EISSN: 17519640     Source Type: Journal    
DOI: 10.1049/iet-cvi.2010.0176     Document Type: Article
Times cited : (56)

References (33)
  • 1
    • 41949091158 scopus 로고    scopus 로고
    • Image understanding for iris biometrics: a survey
    • 10.1016/j.cviu.2007.08.005, 1077-3142
    • Bowyer, K.W., Hollingsworth, K., and Flynn, P.J.: 'Image understanding for iris biometrics: a survey', Comput. Vis. Image Underst., 2008, 110, (2), p. 281-30710.1016/j.cviu.2007.08.005 1077-3142
    • (2008) Comput. Vis. Image Underst. , vol.110 , Issue.2 , pp. 281-307
    • Bowyer, K.W.1    Hollingsworth, K.2    Flynn, P.J.3
  • 2
    • 80052450225 scopus 로고    scopus 로고
    • Biometric encryption
    • Li, S.Z., Encyclopedia of biometrics, Springer Verlag)
    • Cavoukian, A., and Stoianov, A.: 'Biometric encryption', Li, S.Z., Encyclopedia of biometrics, (Springer Verlag 2009), p. 260-269
    • (2009) , pp. 260-269
    • Cavoukian, A.1    Stoianov, A.2
  • 4
    • 10044222391 scopus 로고    scopus 로고
    • Biometric cryptosystems: issues and challenges
    • 10.1109/JPROC.2004.827372, 0018-9219
    • Uludag, U., Pankanti, S., Prabhakar, S., and Jain, A.K.: 'Biometric cryptosystems: issues and challenges', Proc. IEEE, 2004, 92, (6), p. 948-96010.1109/JPROC.2004.827372 0018-9219
    • (2004) Proc. IEEE , vol.92 , Issue.6 , pp. 948-960
    • Uludag, U.1    Pankanti, S.2    Prabhakar, S.3    Jain, A.K.4
  • 5
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: how to generate strong keys from biometrics and other noisy data
    • Dodis, Y., Ostrovsky, R., Reyzin, L., and Smith, A.: 'Fuzzy extractors: how to generate strong keys from biometrics and other noisy data', Proc. Eurocrypt 2004, (LNCS, 3027), 2004, p. 523-540
    • (2004) Proc. Eurocrypt 2004, (LNCS, 3027) , pp. 523-540
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 8
    • 0031651014 scopus 로고    scopus 로고
    • On enabling secure applications through off-line biometric identification
    • Davida, G., Frankel, Y., and Matt, B.: 'On enabling secure applications through off-line biometric identification', Proc. IEEE, Symp. on Security and Privacy, 1998, p. 148-157
    • (1998) Proc. IEEE, Symp. on Security and Privacy , pp. 148-157
    • Davida, G.1    Frankel, Y.2    Matt, B.3
  • 9
    • 8844234621 scopus 로고    scopus 로고
    • On the relation of error correction and cryptography to an off line biometric based identication scheme
    • Davida, G., Frankel, Y., and Matt, B.: 'On the relation of error correction and cryptography to an off line biometric based identication scheme', Proc. WCC99, Workshop on Coding and Cryptography, 1999, p. 129-138
    • (1999) Proc. WCC99, Workshop on Coding and Cryptography , pp. 129-138
    • Davida, G.1    Frankel, Y.2    Matt, B.3
  • 10
    • 0742290132 scopus 로고    scopus 로고
    • How iris recognition works
    • 10.1109/ICIP.2002.1037952, 1051-8215
    • Daugman, J.: 'How iris recognition works', IEEE Trans. Circuits Syst. Video Technol., 2004, 14, (1), p. 21-3010.1109/ICIP.2002.1037952 1051-8215
    • (2004) IEEE Trans. Circuits Syst. Video Technol. , vol.14 , Issue.1 , pp. 21-30
    • Daugman, J.1
  • 12
    • 33747624401 scopus 로고    scopus 로고
    • Combining cryptography with biometrics effectively
    • 10.1109/TC.2006.138, 0018-9340
    • Hao, F., Anderson, R., and Daugman, J.: 'Combining cryptography with biometrics effectively', IEEE Trans. Comput., 2006, 55, (9), p. 1081-108810.1109/TC.2006.138 0018-9340
    • (2006) IEEE Trans. Comput. , vol.55 , Issue.9 , pp. 1081-1088
    • Hao, F.1    Anderson, R.2    Daugman, J.3
  • 14
    • 56749174787 scopus 로고    scopus 로고
    • Theoretical and practical boundaries of binary secure sketches
    • 10.1109/TIFS.2008.2002937
    • Bringer, J., Chabanne, H., Cohen, G., Kindarji, B., and Zémor, G.: 'Theoretical and practical boundaries of binary secure sketches', IEEE Trans. Inf. Forensics Sec., 2008, 3, p. 673-68310.1109/TIFS.2008.2002937
    • (2008) IEEE Trans. Inf. Forensics Sec. , vol.3 , pp. 673-683
    • Bringer, J.1    Chabanne, H.2    Cohen, G.3    Kindarji, B.4    Zémor, G.5
  • 21
    • 77955358246 scopus 로고    scopus 로고
    • Performance of Iris based hard fuzzy vault
    • 10.1109/CIT.2008.Workshops.20
    • Reddy, E.S., and Babu, I.R.: 'Performance of Iris based hard fuzzy vault', IJCSNS Int J. Comput. Sci. Netw. Secur., 2008, 8, (1), p. 297-30410.1109/CIT.2008.Workshops.20
    • (2008) IJCSNS Int J. Comput. Sci. Netw. Secur. , vol.8 , Issue.1 , pp. 297-304
    • Reddy, E.S.1    Babu, I.R.2
  • 24
    • 44049084315 scopus 로고    scopus 로고
    • Template-free biometric-key generation by means of fuzzy genetic clustering
    • Sheng, W., Howells, G., Fairhurst, M., and Deravi, F.: 'Template-free biometric-key generation by means of fuzzy genetic clustering', Trans. Inf. Forensics Sec., 2008, 3, (2), p. 183-191
    • (2008) Trans. Inf. Forensics Sec. , vol.3 , Issue.2 , pp. 183-191
    • Sheng, W.1    Howells, G.2    Fairhurst, M.3    Deravi, F.4
  • 26
    • 77952661812 scopus 로고    scopus 로고
    • Information leakage in fuzzy commitment schemes
    • 10.1109/TIFS.2010.2046984
    • Ignatenko, T., and Willems, F.M.J.: 'Information leakage in fuzzy commitment schemes', Trans. Inf. Forensics Sec., 2010, 5, (2), p. 337-34810.1109/TIFS.2010.2046984
    • (2010) Trans. Inf. Forensics Sec. , vol.5 , Issue.2 , pp. 337-348
    • Ignatenko, T.1    Willems, F.M.J.2
  • 28
    • 84889618817 scopus 로고    scopus 로고
    • Biometric encryption: the new breed of untraceable biometrics
    • and Boulgouris, N.V., Plataniotis, K.N., Micheli-Tzanakov, E., lsquo;', lsquo;Biometrics: fundamentals, theory, and systems' (Wiley, 2009) p. 10.1002/9780470522356.ch26
    • Cavoukian, A., and Stoianov, A.: Boulgouris, N.V., Plataniotis, K.N., Micheli-Tzanakov, E., 'Biometric encryption: the new breed of untraceable biometrics', 'Biometrics: fundamentals, theory, and systems' (Wiley, 2009) p. 655-71810.1002/9780470522356.ch26
    • Cavoukian, A.1    Stoianov, A.2
  • 29
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometrics-based authentication systems
    • 10.1147/sj.403.0614, 0018-8670
    • Ratha, N.K., Connell, J.H., and Bolle, R.M.: 'Enhancing security and privacy in biometrics-based authentication systems', IBM Syst. J., 2001, 40, p. 614-63410.1147/sj.403.0614 0018-8670
    • (2001) IBM Syst. J. , vol.40 , pp. 614-634
    • Ratha, N.K.1    Connell, J.H.2    Bolle, R.M.3
  • 32
    • 2942628075 scopus 로고    scopus 로고
    • Efficient Iris recogntion by characterizing key local variations
    • 10.1109/TIP.2004.827237, 1057-7149
    • Ma, L., Tan, T., Wang, Y., and Zhang, D.: 'Efficient Iris recogntion by characterizing key local variations', IEEE Trans. Image Process., 2004, 13, (6), p. 739-75010.1109/TIP.2004.827237 1057-7149
    • (2004) IEEE Trans. Image Process. , vol.13 , Issue.6 , pp. 739-750
    • Ma, L.1    Tan, T.2    Wang, Y.3    Zhang, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.