-
1
-
-
41949091158
-
Image understanding for iris biometrics: a survey
-
10.1016/j.cviu.2007.08.005, 1077-3142
-
Bowyer, K.W., Hollingsworth, K., and Flynn, P.J.: 'Image understanding for iris biometrics: a survey', Comput. Vis. Image Underst., 2008, 110, (2), p. 281-30710.1016/j.cviu.2007.08.005 1077-3142
-
(2008)
Comput. Vis. Image Underst.
, vol.110
, Issue.2
, pp. 281-307
-
-
Bowyer, K.W.1
Hollingsworth, K.2
Flynn, P.J.3
-
2
-
-
80052450225
-
Biometric encryption
-
Li, S.Z., Encyclopedia of biometrics, Springer Verlag)
-
Cavoukian, A., and Stoianov, A.: 'Biometric encryption', Li, S.Z., Encyclopedia of biometrics, (Springer Verlag 2009), p. 260-269
-
(2009)
, pp. 260-269
-
-
Cavoukian, A.1
Stoianov, A.2
-
3
-
-
43949116287
-
Biometric template security
-
10.1155/2008/579416
-
Jain, A.K., Nandakumar, K., and Nagar, A.: 'Biometric template security', EURASIP J. Adv. Signal Process., 2008, 2008, p. 1-1710.1155/2008/579416
-
(2008)
EURASIP J. Adv. Signal Process.
, vol.2008
, pp. 1-17
-
-
Jain, A.K.1
Nandakumar, K.2
Nagar, A.3
-
4
-
-
10044222391
-
Biometric cryptosystems: issues and challenges
-
10.1109/JPROC.2004.827372, 0018-9219
-
Uludag, U., Pankanti, S., Prabhakar, S., and Jain, A.K.: 'Biometric cryptosystems: issues and challenges', Proc. IEEE, 2004, 92, (6), p. 948-96010.1109/JPROC.2004.827372 0018-9219
-
(2004)
Proc. IEEE
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
-
5
-
-
35048865463
-
Fuzzy extractors: how to generate strong keys from biometrics and other noisy data
-
Dodis, Y., Ostrovsky, R., Reyzin, L., and Smith, A.: 'Fuzzy extractors: how to generate strong keys from biometrics and other noisy data', Proc. Eurocrypt 2004, (LNCS, 3027), 2004, p. 523-540
-
(2004)
Proc. Eurocrypt 2004, (LNCS, 3027)
, pp. 523-540
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
6
-
-
84963942455
-
Context-based texture analysis for secure revocable iris-biometric key generation
-
Rathgeb, C., and Uhl, A.: 'Context-based texture analysis for secure revocable iris-biometric key generation', Proc. Third Int. Conf. on Imaging for Crime Detection and Prevention, ICDP'09, 2009, p. pp. 1
-
(2009)
Proc. Third Int. Conf. on Imaging for Crime Detection and Prevention, ICDP'09
, pp. 1
-
-
Rathgeb, C.1
Uhl, A.2
-
7
-
-
65549084496
-
The best bits in an iris code
-
10.1109/TPAMI.2008.185, 0162-8828
-
Hollingsworth, K.P., Bowyer, K.W., and Flynn, P.J.: 'The best bits in an iris code', IEEE Trans. Pattern Anal. Mach. Intell., 2009, 31, (6), p. 964-97310.1109/TPAMI.2008.185 0162-8828
-
(2009)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.31
, Issue.6
, pp. 964-973
-
-
Hollingsworth, K.P.1
Bowyer, K.W.2
Flynn, P.J.3
-
8
-
-
0031651014
-
On enabling secure applications through off-line biometric identification
-
Davida, G., Frankel, Y., and Matt, B.: 'On enabling secure applications through off-line biometric identification', Proc. IEEE, Symp. on Security and Privacy, 1998, p. 148-157
-
(1998)
Proc. IEEE, Symp. on Security and Privacy
, pp. 148-157
-
-
Davida, G.1
Frankel, Y.2
Matt, B.3
-
9
-
-
8844234621
-
On the relation of error correction and cryptography to an off line biometric based identication scheme
-
Davida, G., Frankel, Y., and Matt, B.: 'On the relation of error correction and cryptography to an off line biometric based identication scheme', Proc. WCC99, Workshop on Coding and Cryptography, 1999, p. 129-138
-
(1999)
Proc. WCC99, Workshop on Coding and Cryptography
, pp. 129-138
-
-
Davida, G.1
Frankel, Y.2
Matt, B.3
-
10
-
-
0742290132
-
How iris recognition works
-
10.1109/ICIP.2002.1037952, 1051-8215
-
Daugman, J.: 'How iris recognition works', IEEE Trans. Circuits Syst. Video Technol., 2004, 14, (1), p. 21-3010.1109/ICIP.2002.1037952 1051-8215
-
(2004)
IEEE Trans. Circuits Syst. Video Technol.
, vol.14
, Issue.1
, pp. 21-30
-
-
Daugman, J.1
-
12
-
-
33747624401
-
Combining cryptography with biometrics effectively
-
10.1109/TC.2006.138, 0018-9340
-
Hao, F., Anderson, R., and Daugman, J.: 'Combining cryptography with biometrics effectively', IEEE Trans. Comput., 2006, 55, (9), p. 1081-108810.1109/TC.2006.138 0018-9340
-
(2006)
IEEE Trans. Comput.
, vol.55
, Issue.9
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
13
-
-
48649102434
-
Optimal iris fuzzy sketches
-
Bringer, J., Chabanne, H., Cohen, G., Kindarji, B., and Zémor, G.: 'Optimal iris fuzzy sketches', Proc. First IEEE Int. Conf. on Biometrics: Theory, Applications, and Systems, 2007, p. 1-6
-
(2007)
Proc. First IEEE Int. Conf. on Biometrics: Theory, Applications, and Systems
, pp. 1-6
-
-
Bringer, J.1
Chabanne, H.2
Cohen, G.3
Kindarji, B.4
Zémor, G.5
-
14
-
-
56749174787
-
Theoretical and practical boundaries of binary secure sketches
-
10.1109/TIFS.2008.2002937
-
Bringer, J., Chabanne, H., Cohen, G., Kindarji, B., and Zémor, G.: 'Theoretical and practical boundaries of binary secure sketches', IEEE Trans. Inf. Forensics Sec., 2008, 3, p. 673-68310.1109/TIFS.2008.2002937
-
(2008)
IEEE Trans. Inf. Forensics Sec.
, vol.3
, pp. 673-683
-
-
Bringer, J.1
Chabanne, H.2
Cohen, G.3
Kindarji, B.4
Zémor, G.5
-
15
-
-
80054963215
-
Systematic construction of iris-based fuzzy commitment schemes
-
Rathgeb, C., and Uhl, A.: 'Systematic construction of iris-based fuzzy commitment schemes', Proc., Third Int. Conf. on Biometrics ICB'09 (LNCS, 5558), 2009, p. 947-956
-
(2009)
Proc., Third Int. Conf. on Biometrics ICB'09 (LNCS, 5558)
, pp. 947-956
-
-
Rathgeb, C.1
Uhl, A.2
-
18
-
-
37849013877
-
Biometric key binding: fuzzy vault based on iris images
-
Lee, Y.J., Bae, K., Lee, S.J., Park, K.R., and Kim, J.: 'Biometric key binding: fuzzy vault based on iris images', Proc. Second Int. Conf. on Biometrics (ICB'07), 2007, p. 800-808
-
(2007)
Proc. Second Int. Conf. on Biometrics (ICB'07)
, pp. 800-808
-
-
Lee, Y.J.1
Bae, K.2
Lee, S.J.3
Park, K.R.4
Kim, J.5
-
19
-
-
57649126466
-
A novel cryptosystem based on iris key generation
-
Wu, X., Qi, N., Wang, K., and Zhang, D.: 'A novel cryptosystem based on iris key generation', Fourth Int. Conf. on Natural Computation (ICNC'08), 2008, p. 53-56
-
(2008)
Fourth Int. Conf. on Natural Computation (ICNC'08)
, pp. 53-56
-
-
Wu, X.1
Qi, N.2
Wang, K.3
Zhang, D.4
-
20
-
-
54049147348
-
An Iris cryptosystem for information security
-
Wu, X., Qi, N., Wang, K., and Zhang, D.: 'An Iris cryptosystem for information security', IIH-MSP'08: Proc. Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing, 2008, p. 1533-1536
-
(2008)
IIH-MSP'08: Proc. Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing
, pp. 1533-1536
-
-
Wu, X.1
Qi, N.2
Wang, K.3
Zhang, D.4
-
21
-
-
77955358246
-
Performance of Iris based hard fuzzy vault
-
10.1109/CIT.2008.Workshops.20
-
Reddy, E.S., and Babu, I.R.: 'Performance of Iris based hard fuzzy vault', IJCSNS Int J. Comput. Sci. Netw. Secur., 2008, 8, (1), p. 297-30410.1109/CIT.2008.Workshops.20
-
(2008)
IJCSNS Int J. Comput. Sci. Netw. Secur.
, vol.8
, Issue.1
, pp. 297-304
-
-
Reddy, E.S.1
Babu, I.R.2
-
22
-
-
77955377975
-
Two-factor authentication or how to potentially counterfeit experimental results in biometric systems
-
Rathgeb, C., and Uhl, A.: 'Two-factor authentication or how to potentially counterfeit experimental results in biometric systems', Proc. Int. Conf. on Image Analysis and Recognition (ICIAR'10), Part II, (LNCS, 6112), 2010, p. 296-305
-
(2010)
Proc. Int. Conf. on Image Analysis and Recognition (ICIAR'10), Part II, (LNCS, 6112)
, pp. 296-305
-
-
Rathgeb, C.1
Uhl, A.2
-
23
-
-
67549107384
-
Multibiometric template security using fuzzy vault
-
Nandakumar, K., and Jain, A.K.: 'Multibiometric template security using fuzzy vault', IEEE Second Int. Conf. on Biometrics: Theory, Applications, and Systems, BTAS'08, 2008, p. 1-6
-
(2008)
IEEE Second Int. Conf. on Biometrics: Theory, Applications, and Systems, BTAS'08
, pp. 1-6
-
-
Nandakumar, K.1
Jain, A.K.2
-
24
-
-
44049084315
-
Template-free biometric-key generation by means of fuzzy genetic clustering
-
Sheng, W., Howells, G., Fairhurst, M., and Deravi, F.: 'Template-free biometric-key generation by means of fuzzy genetic clustering', Trans. Inf. Forensics Sec., 2008, 3, (2), p. 183-191
-
(2008)
Trans. Inf. Forensics Sec.
, vol.3
, Issue.2
, pp. 183-191
-
-
Sheng, W.1
Howells, G.2
Fairhurst, M.3
Deravi, F.4
-
26
-
-
77952661812
-
Information leakage in fuzzy commitment schemes
-
10.1109/TIFS.2010.2046984
-
Ignatenko, T., and Willems, F.M.J.: 'Information leakage in fuzzy commitment schemes', Trans. Inf. Forensics Sec., 2010, 5, (2), p. 337-34810.1109/TIFS.2010.2046984
-
(2010)
Trans. Inf. Forensics Sec.
, vol.5
, Issue.2
, pp. 337-348
-
-
Ignatenko, T.1
Willems, F.M.J.2
-
27
-
-
77952703061
-
Security issues of biometric encryption
-
Stoianov, A., Kevenaar, T., and van der Veen, M.: 'Security issues of biometric encryption', Proc. Toronto Int. Conf. on Science and Technology for Humanity (TIC-STH), 2009, p. 34-39
-
(2009)
Proc. Toronto Int. Conf. on Science and Technology for Humanity (TIC-STH)
, pp. 34-39
-
-
Stoianov, A.1
Kevenaar, T.2
van der Veen, M.3
-
28
-
-
84889618817
-
Biometric encryption: the new breed of untraceable biometrics
-
and Boulgouris, N.V., Plataniotis, K.N., Micheli-Tzanakov, E., lsquo;', lsquo;Biometrics: fundamentals, theory, and systems' (Wiley, 2009) p. 10.1002/9780470522356.ch26
-
Cavoukian, A., and Stoianov, A.: Boulgouris, N.V., Plataniotis, K.N., Micheli-Tzanakov, E., 'Biometric encryption: the new breed of untraceable biometrics', 'Biometrics: fundamentals, theory, and systems' (Wiley, 2009) p. 655-71810.1002/9780470522356.ch26
-
-
-
Cavoukian, A.1
Stoianov, A.2
-
29
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
10.1147/sj.403.0614, 0018-8670
-
Ratha, N.K., Connell, J.H., and Bolle, R.M.: 'Enhancing security and privacy in biometrics-based authentication systems', IBM Syst. J., 2001, 40, p. 614-63410.1147/sj.403.0614 0018-8670
-
(2001)
IBM Syst. J.
, vol.40
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
30
-
-
77957968173
-
Cancelable Iris biometric
-
Zuo, J., Ratha, N.K., and Connel, J.H.: 'Cancelable Iris biometric', Proc. 19th Int. Conf. on Pattern Recognition, (ICPR'08), 2008, p. 1-4
-
(2008)
Proc. 19th Int. Conf. on Pattern Recognition, (ICPR'08)
, pp. 1-4
-
-
Zuo, J.1
Ratha, N.K.2
Connel, J.H.3
-
31
-
-
70350406514
-
Cancelable Iris biometrics using block re-mapping and image warping
-
Hämmerle-Uhl, J., Pschernig, E., and Uhl, A.: 'Cancelable Iris biometrics using block re-mapping and image warping', Proc. Information Security Conf., ISC'09, (LNCS, 5735), 2009, p. 135-142
-
(2009)
Proc. Information Security Conf., ISC'09, (LNCS, 5735)
, pp. 135-142
-
-
Hämmerle-Uhl, J.1
Pschernig, E.2
Uhl, A.3
-
32
-
-
2942628075
-
Efficient Iris recogntion by characterizing key local variations
-
10.1109/TIP.2004.827237, 1057-7149
-
Ma, L., Tan, T., Wang, Y., and Zhang, D.: 'Efficient Iris recogntion by characterizing key local variations', IEEE Trans. Image Process., 2004, 13, (6), p. 739-75010.1109/TIP.2004.827237 1057-7149
-
(2004)
IEEE Trans. Image Process.
, vol.13
, Issue.6
, pp. 739-750
-
-
Ma, L.1
Tan, T.2
Wang, Y.3
Zhang, D.4
-
33
-
-
0013143822
-
FingerCode: a filterbank for fingerprint representation and matching
-
Jain, A.K., Prabhakar, S., Hong, L., and Pankanti, S.: 'FingerCode: a filterbank for fingerprint representation and matching', Proc. Int. Conf. on Computer Vision and Pattern Recognition (CVPR'99), 1999, p. 2187-2187
-
(1999)
Proc. Int. Conf. on Computer Vision and Pattern Recognition (CVPR'99)
, pp. 2187-2187
-
-
Jain, A.K.1
Prabhakar, S.2
Hong, L.3
Pankanti, S.4
|