-
3
-
-
8844228915
-
Attacks on biometric systems: A case study in fingerprints
-
(San Jose, CA), January
-
U. Uludag and A. K. Jain, "Attacks on biometric systems: a case study in fingerprints," in Proc. SPIE, Security, Seganography and Watermarking of Multimedia Contents VI, vol. 5306, pp. 622-633, (San Jose, CA), January 2004.
-
(2004)
Proc. SPIE, Security, Seganography and Watermarking of Multimedia Contents VI
, vol.5306
, pp. 622-633
-
-
Uludag, U.1
Jain, A.K.2
-
4
-
-
82055208335
-
An analysis of minutiae matching strength
-
(Halmstad, Sweden), June
-
N. Ratha, J. H. Connell, and R. M. Bolle, "An analysis of minutiae matching strength," in Proc. Audio and Video-based Biometric Person Authentication (AVBPA), pp. 223-228, (Halmstad, Sweden), June 2001.
-
(2001)
Proc. Audio and Video-based Biometric Person Authentication (AVBPA)
, pp. 223-228
-
-
Ratha, N.1
Connell, J.H.2
Bolle, R.M.3
-
5
-
-
33645158216
-
Biometric security concerns
-
U.K. Biometric Working Group, September
-
U.K. Biometric Working Group, "Biometric security concerns," Technical Report, CESG, September 2003, http://www.cesg.gov.uk/site/ast/ biometrics/media/BiometricSecurityConcerns.pdf.
-
(2003)
Technical Report, CESG
-
-
-
6
-
-
33744742101
-
Can images be regenerated from biometric templates?
-
(Arlington, VA), September
-
A. Adler, "Can images be regenerated from biometric templates?," in Biometrics Consortium Conference, (Arlington, VA), September 2003.
-
(2003)
Biometrics Consortium Conference
-
-
Adler, A.1
-
8
-
-
26444470872
-
Towards reconstructing fingerprints from minutiae points
-
(Orlando, FL), March
-
A. Ross, J. Shah, and A. K. Jain, "Towards reconstructing fingerprints from minutiae points," in Proc. SPIE, Biometric Technology for Human Identification II, vol. 5779, pp. 68-80, (Orlando, FL), March 2005.
-
(2005)
Proc. SPIE, Biometric Technology for Human Identification II
, vol.5779
, pp. 68-80
-
-
Ross, A.1
Shah, J.2
Jain, A.K.3
-
9
-
-
33750920115
-
Synthetic fingerprint-image generation
-
(Barcelona, Spain), September
-
R. Cappelli, R. Erol, D. Maio, and D. Maltoni, "Synthetic fingerprint-image generation," in Proc. Int'l. Conf. Pattern Recognition (ICPR), vol. 3, pp. 475-478, (Barcelona, Spain), September 2000.
-
(2000)
Proc. Int'l. Conf. Pattern Recognition (ICPR)
, vol.3
, pp. 475-478
-
-
Cappelli, R.1
Erol, R.2
Maio, D.3
Maltoni, D.4
-
11
-
-
4944251726
-
Images can be regenerated from quantized biometric match score data
-
(Niagara Falls, Canada), May
-
A. Adler, "Images can be regenerated from quantized biometric match score data," in Proc. Canadian Conf. Electrical Computer Eng., pp. 469-472, (Niagara Falls, Canada), May 2004.
-
(2004)
Proc. Canadian Conf. Electrical Computer Eng.
, pp. 469-472
-
-
Adler, A.1
-
12
-
-
0033601655
-
Verification watermarks on fingerprint recognition and retrieval
-
(San Jose, USA), January
-
M. Yeung and S. Pankanti, "Verification watermarks on fingerprint recognition and retrieval," in Proc. SPIE, Security and Watermarking of Multimedia Contents, vol. 3657, pp. 66-78, (San Jose, USA), January 1999.
-
(1999)
Proc. SPIE, Security and Watermarking of Multimedia Contents
, vol.3657
, pp. 66-78
-
-
Yeung, M.1
Pankanti, S.2
-
13
-
-
0442296538
-
Hiding biometric data
-
A. K. Jain and U. Uludag, "Hiding biometric data," IEEE Trans. Pattern Anal. Mach. Intelligence, vol. 25, no. 11, pp. 1493-1498, 2003.
-
(2003)
IEEE Trans. Pattern Anal. Mach. Intelligence
, vol.25
, Issue.11
, pp. 1493-1498
-
-
Jain, A.K.1
Uludag, U.2
-
14
-
-
0036031504
-
Biometric authentication for ID cards with hologram watermarks
-
(Bellingham, WA), January
-
L. C. Ferri, A. Mayerhofer, M. Frank, C. Vielhauer, and R. Steinmetz, "Biometric authentication for ID cards with hologram watermarks," in Proc. SPIE, Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 629-640, (Bellingham, WA), January 2002.
-
(2002)
Proc. SPIE, Security and Watermarking of Multimedia Contents IV
, vol.4675
, pp. 629-640
-
-
Ferri, L.C.1
Mayerhofer, A.2
Frank, M.3
Vielhauer, C.4
Steinmetz, R.5
-
15
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
N. Ratha, J. Connell, and R. bolle, "Enhancing security and privacy in biometrics-based authentication systems," IBM Systems Journal, vol. 40, no. 3, pp. 614-634, 2001.
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.1
Connell, J.2
Bolle, R.3
-
16
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, "Biometric cryptosystems: issues and challenges," Proceedings of the IEEE, vol. 92, no. 6, pp. 948-960, 2004.
-
(2004)
Proceedings of the IEEE
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
-
17
-
-
33744717971
-
Fuzzy vault for fingerprints
-
To appear in. (Rye Brook, NY), July
-
U. Uludag, S. Pankanti, and A. K. Jain, "Fuzzy vault for fingerprints," To appear in Proc. Audio- and Video-based Biometric Person Authentication (AVBPA), (Rye Brook, NY), July 2005.
-
(2005)
Proc. Audio- And Video-based Biometric Person Authentication (AVBPA)
-
-
Uludag, U.1
Pankanti, S.2
Jain, A.K.3
|