-
4
-
-
24944501364
-
Secure remote authentication using biometric data
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
X. Boyen, Y. Dodis, J. Katz, R. Ostrovsky, and A. Smith Secure remote authentication using biometric data EUROCRYPT 2005 Springer 147 163 (Pubitemid 41313951)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 147-163
-
-
Boyen, X.1
Dodis, Y.2
Katz, J.3
Ostrovsky, R.4
Smith, A.5
-
5
-
-
56749174787
-
Theoretical and practical boundaries of binary secure sketches
-
J. Bringer, H. Chabanne, G. Cohen, B. Kindarji, and G. Zemor Theoretical and practical boundaries of binary secure sketches IEEE Transactions on Information Forensics and Security 3 4 2008 673 683
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.4
, pp. 673-683
-
-
Bringer, J.1
Chabanne, H.2
Cohen, G.3
Kindarji, B.4
Zemor, G.5
-
6
-
-
34748924251
-
Fuzzy extractors for continuous distributions
-
DOI 10.1145/1229285.1229325, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
-
I. Buhan, J. Doumen, P. Hartel, and R. Veldhuis Fuzzy extractors for continuous distributions Proceedings of the 2nd ACM symposium on information, computer and communications security (ASIACCS), Singapore 2007 ACM 353 355 (Pubitemid 47479248)
-
(2007)
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
, pp. 353-355
-
-
Buhan, I.1
Doumen, J.2
Hartel, P.3
Veldhuis, R.4
-
9
-
-
52049107821
-
Biometric binary string generation with detection rate optimized bit allocation
-
Chen, C.; Veldhuis, R.; Kevenaar, T.; Akkermans, A. (2008). Biometric binary string generation with detection rate optimized bit allocation. In IEEE computer society conference on computer vision and pattern recognition workshops, CVPRW '08 (pp. 1-7).
-
(2008)
IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, CVPRW '08
, pp. 1-7
-
-
Chen, C.1
Veldhuis, R.2
Kevenaar, T.3
Akkermans, A.4
-
10
-
-
33744756361
-
An algorithm for distorted fingerprint matching based on local triangle feature set
-
DOI 10.1109/TIFS.2006.873605
-
X. Chen, J. Tian, X. Yang, and Y. Zhang An algorithm for distorted fingerprint matching based on local triangle feature set IEEE Transactions on Information Forensics and Security 1 2 2006 169 177 (Pubitemid 43824628)
-
(2006)
IEEE Transactions on Information Forensics and Security
, vol.1
, Issue.2
, pp. 169-177
-
-
Chen, X.1
Tian, J.2
Yang, X.3
Zhang, Y.4
-
11
-
-
0036487317
-
The importance of being random: Statistical principles of iris recognition
-
Daugman, J. (2003). The importance of being random: Statistical principles of iris recognition. Pattern Recognition 36 (2), (pp. 279-291). (URL http://www.sciencedirect.com/science/article/B6V14-458WVY9-1/2/ 747c0e472ee87bfb0df249fb45631ec7)
-
(2003)
Pattern Recognition
, vol.36
, Issue.2
, pp. 279-291
-
-
Daugman, J.1
-
12
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Springer-Verlag
-
Y. Dodis, L. Reyzin, and A. Smith Fuzzy extractors: How to generate strong keys from biometrics and other noisy data Advances in crypology-eurocrypt Vol. 3027 2004 Springer-Verlag 523 540
-
(2004)
Advances in Crypology-eurocrypt
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
14
-
-
70450245646
-
Multibiometric cryptosystem: Model structure and performance analysis
-
B. Fu, S. Yang, J. Li, and D. Hu Multibiometric cryptosystem: Model structure and performance analysis IEEE Transactions on Information Forensics and Security 4 4 2009 867 882
-
(2009)
IEEE Transactions on Information Forensics and Security
, vol.4
, Issue.4
, pp. 867-882
-
-
Fu, B.1
Yang, S.2
Li, J.3
Hu, D.4
-
15
-
-
33747624401
-
Combining crypto with biometrics effectively
-
DOI 10.1109/TC.2006.138
-
F. Hao, R. Anderson, and J. Daugman Combining crypto with biometrics effectively IEEE Transactions on Computers 55 9 2006 1081 1088 (Pubitemid 44263808)
-
(2006)
IEEE Transactions on Computers
, vol.55
, Issue.9
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
22
-
-
34547103253
-
Alignment-free cancelable fingerprint templates based on local minutiae information
-
DOI 10.1109/TSMCB.2007.896999
-
C. Lee, J.-Y. Choi, K.-A. Toh, and S. Lee Alignment-free cancelable fingerprint templates based on local minutiae information IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 37 4 2007 980 992 (Pubitemid 47103947)
-
(2007)
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
, vol.37
, Issue.4
, pp. 980-992
-
-
Lee, C.1
Choi, J.-Y.2
Toh, K.-A.3
Lee, S.4
Kim, J.5
-
23
-
-
77649250983
-
Secure sketch for biometric templates
-
Springer-Verlag
-
Q. Li, Y. Sutcu, and N. Memon Secure sketch for biometric templates Asiacrypt 2006 Springer-Verlag 99 113
-
(2006)
Asiacrypt
, pp. 99-113
-
-
Li, Q.1
Sutcu, Y.2
Memon, N.3
-
24
-
-
77951206096
-
An alignment-free fingerprint cryptosystem based on fuzzy vault scheme
-
recent Advances and Future Directions in Biometrics Personal Identification
-
P. Li, X. Yang, K. Cao, X. Tao, R. Wang, and J. Tian An alignment-free fingerprint cryptosystem based on fuzzy vault scheme Journal of Network and Computer Applications 33 3 2010 207 220 recent Advances and Future Directions in Biometrics Personal Identification
-
(2010)
Journal of Network and Computer Applications
, vol.33
, Issue.3
, pp. 207-220
-
-
Li, P.1
Yang, X.2
Cao, K.3
Tao, X.4
Wang, R.5
Tian, J.6
-
25
-
-
71349083432
-
Biometric cryptosystem using function based on-line signature recognition
-
E. Maiorana Biometric cryptosystem using function based on-line signature recognition Expert Systems with Applications 37 4 2010 3454 3461
-
(2010)
Expert Systems with Applications
, vol.37
, Issue.4
, pp. 3454-3461
-
-
Maiorana, E.1
-
30
-
-
55649093051
-
Construction of ldpc codes based on circulant permutation matrices
-
H. Qiao, W. Guan, M. Dong, and H. Xiang Construction of ldpc codes based on circulant permutation matrices Journal of Electronics and Information Technology 30 10 2008 2384 2387
-
(2008)
Journal of Electronics and Information Technology
, vol.30
, Issue.10
, pp. 2384-2387
-
-
Qiao, H.1
Guan, W.2
Dong, M.3
Xiang, H.4
-
31
-
-
33947530278
-
Generating cancelable fingerprint templates
-
DOI 10.1109/TPAMI.2007.1004, Special issue on Biometrics: Progress and Directions
-
N. Ratha, S. Chikkerur, J. Connell, and R. Bolle Generating cancelable fingerprint templates IEEE Transactions on Pattern Analysis and Machine Intelligence 29 4 2007 561 572 (Pubitemid 46464397)
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.K.1
Chikkerur, S.2
Connell, J.H.3
Bolle, R.M.4
-
33
-
-
44049084315
-
Template-free biometric-key generation by means of fuzzy genetic clustering
-
DOI 10.1109/TIFS.2008.922056, 4493362
-
W. Sheng, G. Howells, M. Fairhurst, and F. Deravi Template-free biometric-key generation by means of fuzzy genetic clustering IEEE Transactions on Information Forensics and Security 3 2 2008 183 191 (Pubitemid 351709452)
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.2
, pp. 183-191
-
-
Sheng, W.1
Howells, G.2
Fairhurst, M.3
Deravi, F.4
-
34
-
-
0032224440
-
Biometric encryption™ using image processing
-
DOI 10.1117/12.304705
-
Soutar, C.; Roverge, D.; Stojanov, S.A.; Gilroy, R.; Kumar, B.V.K.V. (1998). Biometric encryption using image processing. In Proceedings of SPIE-Optical Optical Security and Counterfeit Deterrence Technology. Vol. 3314 (pp. 178-188). (Pubitemid 35004219)
-
(1998)
Proceedings of SPIE - The International Society for Optical Engineering
, vol.3314
, pp. 178-188
-
-
Soutar, C.1
Roberge, D.2
Stoianov, A.3
Gilroy, R.4
Vijaya Kumar, B.V.K.5
-
35
-
-
51849094958
-
Feature transformation of biometric templates for secure biometric systems based on error correcting codes
-
Sutcu, Y.; Rane, S.; Yedidia, J.; Draper, S.; Vetro, A. (2008). Feature transformation of biometric templates for secure biometric systems based on error correcting codes. In IEEE computer society conference on computer vision and pattern recognition workshops CVPRW '08 (pp. 1-6).
-
(2008)
IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops CVPRW '08
, pp. 1-6
-
-
Sutcu, Y.1
Rane, S.2
Yedidia, J.3
Draper, S.4
Vetro, A.5
-
37
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
U. Uludag, S. Pankanti, S. Prabhakar, and A. Jain Biometric cryptosystems: Issues and challenges Proceedings of the IEEE 92 6 2004 948 960
-
(2004)
Proceedings of the IEEE
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.4
-
38
-
-
69749099895
-
Fingerprint verification using spectral minutiae representations
-
H. Xu, R. Veldhuis, A. Bazen, T. Kevenaar, T. Akkermans, and B. Gokberk Fingerprint verification using spectral minutiae representations IEEE Transactions on Information Forensics and Security 4 3 2009 397 409
-
(2009)
IEEE Transactions on Information Forensics and Security
, vol.4
, Issue.3
, pp. 397-409
-
-
Xu, H.1
Veldhuis, R.2
Bazen, A.3
Kevenaar, T.4
Akkermans, T.5
Gokberk, B.6
-
39
-
-
69949142920
-
Robust biometric key extraction based on iris cryptosystem
-
Zhang, L.; Sun, Z.; Tan, T.; Hu, S. (2009). Robust biometric key extraction based on iris cryptosystem. In Proceedings of The 3rd international conference of biometrics, ICB'09 (pp. 1060-1069).
-
(2009)
Proceedings of the 3rd International Conference of Biometrics, ICB'09
, pp. 1060-1069
-
-
Zhang, L.1
Sun, Z.2
Tan, T.3
Hu, S.4
|