-
1
-
-
48649102434
-
Optimal iris fuzzy sketches
-
May
-
J. Bringer, H. Chabanne, G. Cohen, B. Kindarj, and G. Zemor. Optimal iris fuzzy sketches. In First IEEE International Conference on Biometrics: Theory, Applications, and Systems BTAS 2007, volume 705, May 2007.
-
(2007)
First IEEE International Conference on Biometrics: Theory, Applications, and Systems BTAS 2007
, vol.705
-
-
Bringer, J.1
Chabanne, H.2
Cohen, G.3
Kindarj, B.4
Zemor, G.5
-
2
-
-
57049133508
-
Embedding renewable cryptographic keys Int continuous noisy data
-
UK
-
I. Buhan, J. Doumen, P. Hartel, Q. Tang, and R. Veldhuis. Embedding renewable cryptographic keys Int continuous noisy data. In Information and communications security, 10th International conference ICICS, pages 294-310, UK, 2008.
-
(2008)
Information and Communications Security, 10th International Conference ICICS
, pp. 294-310
-
-
Buhan, I.1
Doumen, J.2
Hartel, P.3
Tang, Q.4
Veldhuis, R.5
-
3
-
-
60749108051
-
An analysis on invertibility of cancelable biometrics based on biohashing
-
K. H. Cheung, A. w.-K. Kong, J. You, and D. Zhang. An analysis on invertibility of cancelable biometrics based on biohashing. In CISST'2005, pages 40-45,2005.
-
(2005)
CISST'2005
, pp. 40-45
-
-
Cheung, K.H.1
Kong, A.W.-K.2
You, J.3
Zhang, D.4
-
4
-
-
84933530882
-
Approximating discrete probability distributions with dependence trees
-
C. Chow and C. Liu. Approximating discrete probability distributions with dependence trees. In IEEE Transactions on Information Theory, IT-14, pages 462-467, 1968.
-
(1968)
IEEE Transactions on Information Theory, IT-14
, pp. 462-467
-
-
Chow, C.1
Liu, C.2
-
5
-
-
0036487317
-
The importance of being random: Statistical principles of iris recognition
-
J. Daugman. The importance of being random: Statistical principles of iris recognition. In Pattern Rec. 36, pages 279-291,2003.
-
(2003)
Pattern Rec.
, vol.36
, pp. 279-291
-
-
Daugman, J.1
-
6
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SlAM Journal on Computing, 38, 2008.
-
(2008)
SlAM Journal on Computing
, vol.38
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
7
-
-
33750918446
-
Combining cryptography with biometrics effectively
-
Univesity of Cambridge, Computer Laboratory July
-
F. Hao, R. Anderson, and J. Daugman. Combining cryptography with biometrics effectively. Technical Report 640, Univesity of Cambridge, Computer Laboratory, July 2005.
-
(2005)
Technical Report 640
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
9
-
-
43949116287
-
Biometric template security
-
January
-
A. K. Jain, K. Nandakumar, and A. Nagar. Biometric template security. In EURASIP Journal on Advances in Signal Processing, , Special Issue on Biometrics, January 2008.
-
(2008)
EURASIP Journal on Advances in Signal Processing, , Special Issue on Biometrics
-
-
Jain, A.K.1
Nandakumar, K.2
Nagar, A.3
-
13
-
-
33745839618
-
Overview of the face recognition grand challenge
-
June
-
P. J. Phillips, P. J. Flynn, T. Scruggs, K. W. Bowyer, J. Chang, K. Hoffman, J. Marques, J. Min, and W. Worek. Overview of the face recognition grand challenge. In IEEE CVPR, volume 2, pages 454-461, http://face.nisLgov/ frgc/, June 2005.
-
(2005)
IEEE CVPR
, vol.2
, pp. 454-461
-
-
Phillips, P.J.1
Flynn, P.J.2
Scruggs, T.3
Bowyer, K.W.4
Chang, J.5
Hoffman, K.6
Marques, J.7
Min, J.8
Worek, W.9
-
14
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
N. Ratha, J. Connell, and R. Bolle. Enhancing security and privacy in biometrics-based authentication system. IBM Systems Journal, 40(3):614-634, 2001. (Pubitemid 32933421)
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
15
-
-
84862962092
-
-
Technical report, National Institute of Standards and Technology
-
A. Rukhin, J. Soto, J. Nechvatal, E. Barker, S. Leigh, M. Levenson, D. Banks, A. Heckert, J. Dray, S. Vo, A. Rukhin, J. Soto, M. Smid, S. Leigh, M. Vangel, A. Heckert, J. Dray, and L. E. Bassham III. A statistical test suite for random and pseudorandom number generators for cryptographic applications. Technical report, National Institute of Standards and Technology, 2008.
-
(2008)
Bassham III. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications
-
-
Rukhin, A.1
Soto, J.2
Nechvatal, J.3
Barker, E.4
Leigh, S.5
Levenson, M.6
Banks, D.7
Heckert, A.8
Dray, J.9
Vo, S.10
Rukhin, A.11
Soto, J.12
Smid, M.13
Leigh, S.14
Vangel, M.15
Heckert, A.16
Dray, J.17
-
16
-
-
70449640064
-
Privacy weaknesses in biometric sketches the 2009 IEEE symposium on security and privacy
-
K. Simoens, P. Tuyls, and B. Preneel. Privacy weaknesses in biometric sketches. In the 2009 IEEE Symposium on Security and Privacy, IEEE Computer Society, pages 188-203,2009.
-
(2009)
IEEE Computer Society
, pp. 188-203
-
-
Simoens, K.1
Tuyls, P.2
Preneel, B.3
-
18
-
-
19444368925
-
Biometric encryption-enrollment and verification procedures
-
April
-
c. Soutar, D. Roberge, S. A. Stofanov, R. Gilroy, and B. Y. K. Y. Kumar. Biometric encryption-enrollment and verification procedures. In Proceedings of SPIE, volume 3386, pages 24-35, April 1998.
-
(1998)
Proceedings of SPIE
, vol.3386
, pp. 24-35
-
-
Soutar, C.1
Roberge, D.2
Stofanov, S.A.3
Gilroy, R.4
Kumar, B.Y.K.Y.5
-
19
-
-
33845435077
-
Capacity and examples of template protecting biometric authentication systems
-
Prague
-
P. Tuyls and J. Goseling. Capacity and examples of template protecting biometric authentication systems. In LNCS, editor, Biometric authentication workshop (BioAW 2004), number 3087, pages 158-170, Prague, 2004.
-
(2004)
LNCS, Editor, Biometric Authentication Workshop (BioAW 2004)
, Issue.3087
, pp. 158-170
-
-
Tuyls, P.1
Goseling, J.2
-
21
-
-
84862923564
-
Privacy enhancing technology for a 3d-face recognition system
-
X. Zhou, T. Kevenaar, E. Kelkboom, C. Busch, M. van der Veen, and A. Nouak. Privacy enhancing technology for a 3d-face recognition system. In BIOSIG 2007, 2007.
-
(2007)
BIOSIG 2007
-
-
Zhou, X.1
Kevenaar, T.2
Kelkboom, E.3
Busch, C.4
Veen Der M.Van5
Nouak, A.6
-
23
-
-
54049103508
-
A 3d face recognition algorithm using histogram-based features
-
Crete, Greece
-
X. Zhou, H. Seibert, C. Busch, and W. Funk. A 3d face recognition algorithm using histogram-based features. In Eurographics Workshop on 3D Object Retrieval, pages 65-71, Crete, Greece, 2008.
-
(2008)
Eurographics Workshop on 3D Object Retrieval
, pp. 65-71
-
-
Zhou, X.1
Seibert, H.2
Busch, C.3
Funk, W.4
-
24
-
-
70350228909
-
A security analysis of biometric template protection schemes
-
International Conference on Image Analysis and Recognition IC1AR 2009, 29-38
-
X. Zhou, S. D. Wolthusen, C. Busch, and A. Kuijper. A security analysis of biometric template protection schemes. In International Conference on Image Analysis and Recognition IC1AR 2009, pages 29-38. LNCS 5627, 2009.
-
(2009)
LNCS
, pp. 5627
-
-
Zhou, X.1
Wolthusen, S.D.2
Busch, C.3
Kuijper, A.4
|