-
3
-
-
34548118752
-
Fingerprint image reconstruction from standard templates
-
R. Cappelli, D. Lumini, D. Maio, D. Maltoni Fingerprint image reconstruction from standard templates IEEE Transactions on Pattern Analysis and Machine Intelligence 29 9 2007 1489 1503
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.9
, pp. 1489-1503
-
-
Cappelli, R.1
Lumini, D.2
Maio, D.3
Maltoni, D.4
-
6
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
N.K. Ratha, J.H. Connell, R.M. Bolle Enhancing security and privacy in biometrics-based authentication systems IBM Systems Journal 40 3 2001 614 634
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
8
-
-
78649322464
-
A frequency domain subspace blind channel estimation method for trailing zero OFDM systems
-
S. Wang, J. Cao, J. Hu A frequency domain subspace blind channel estimation method for trailing zero OFDM systems Journal of Network and Computer Applications 34 1 2011 116 120
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.1
, pp. 116-120
-
-
Wang, S.1
Cao, J.2
Hu, J.3
-
9
-
-
33947530278
-
Generating cancelable fingerprint templates
-
N.K. Ratha, S. Chikkerur, J.H. Connell, R.M. Bolle Generating cancelable fingerprint templates IEEE Transactions on Pattern Analysis and Machine Intelligence 29 4 2007 561 572
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.K.1
Chikkerur, S.2
Connell, J.H.3
Bolle, R.M.4
-
10
-
-
62349084871
-
Cracking Cancelable Fingerprint Template of Ratha
-
Q. Feng, F. Su, A. Cai, Cracking Cancelable Fingerprint Template of Ratha, in: The International Symposium on Computer Science and Computational Technology (ISCSCT08), 2008, pp. 572-575.
-
(2008)
The International Symposium on Computer Science and Computational Technology (ISCSCT08)
, pp. 572-575
-
-
Feng, Q.1
Su, F.2
Cai, A.3
-
11
-
-
77956108111
-
Generating revocable fingerprint template using minutiae pair representation
-
Z. Jin, A. Teoh, T.S. Ong, C. Tee, Generating revocable fingerprint template using minutiae pair representation, in: The Second International Conference on Education Technology and Computer (ICETC), 2010, pp. V5/251-255.
-
(2010)
The Second International Conference on Education Technology and Computer (ICETC)
-
-
Jin, Z.1
Teoh, A.2
Ong, T.S.3
Tee, C.4
-
12
-
-
78650810246
-
A revocable fingerprint template for security and privacy preserving
-
Z. Jin, A. Teoh, T.S. Ong, C. Tee A revocable fingerprint template for security and privacy preserving KSII Transactions on Internet and Information Systems 4 6 2010 1327 1341
-
(2010)
KSII Transactions on Internet and Information Systems
, vol.4
, Issue.6
, pp. 1327-1341
-
-
Jin, Z.1
Teoh, A.2
Ong, T.S.3
Tee, C.4
-
13
-
-
77951295514
-
Cancelable fingerprint templates using minutiae-based bit-strings
-
C. Lee, J. Kim Cancelable fingerprint templates using minutiae-based bit-strings Journal of Network and Computer Applications 33 3 2010 236 246
-
(2010)
Journal of Network and Computer Applications
, vol.33
, Issue.3
, pp. 236-246
-
-
Lee, C.1
Kim, J.2
-
16
-
-
79958822548
-
Pair-polar coordinate-based cancelable fingerprint templates
-
T. Ahmad, J. Hu, S. Wang Pair-polar coordinate-based cancelable fingerprint templates Pattern Recognition 44 10-11 2011 2555 2564
-
(2011)
Pattern Recognition
, vol.44
, Issue.1011
, pp. 2555-2564
-
-
Ahmad, T.1
Hu, J.2
Wang, S.3
-
17
-
-
34547103253
-
Alignment-free cancelable fingerprint templates based on local minutiae information
-
C. Lee, J.-Y. Choi, K.-A. Toh, S. Lee Alignment-free cancelable fingerprint templates based on local minutiae information IEEE Transactions on Systems, Man, Cybernetics, Part B 37 4 2007 980 992
-
(2007)
IEEE Transactions on Systems, Man, Cybernetics, Part B
, vol.37
, Issue.4
, pp. 980-992
-
-
Lee, C.1
Choi, J.-Y.2
Toh, K.-A.3
Lee, S.4
-
18
-
-
70350173591
-
Dictionary attack on functional transform-based cancelable fingerprint templates
-
S.W. Shin, M.-K. Lee, D. Moon, K. Moon Dictionary attack on functional transform-based cancelable fingerprint templates ETRI Journal 31 5 2009 628 630
-
(2009)
ETRI Journal
, vol.31
, Issue.5
, pp. 628-630
-
-
Shin, S.W.1
Lee, M.-K.2
Moon, D.3
Moon, K.4
-
19
-
-
71749121810
-
Generating provably secure cancelable fingerprint templates based on correlation-invariant random filtering
-
K. Takahashi, S. Hirata, Generating provably secure cancelable fingerprint templates based on correlation-invariant random filtering, in: IEEE Third International Conference on Biometrics: Theory, Applications, Systems (BTAS), 2009, pp. 1-6.
-
(2009)
IEEE Third International Conference on Biometrics: Theory, Applications, Systems (BTAS)
, pp. 1-6
-
-
Takahashi, K.1
Hirata, S.2
-
20
-
-
70449441699
-
Generating secure cancelable fingerprint templates using local and global features
-
H. Yang, X. Jiang, A.C. Kot, Generating secure cancelable fingerprint templates using local and global features, in: Second IEEE International Conference on Computer Science and Information Technology, 2009, pp. 645-649.
-
(2009)
Second IEEE International Conference on Computer Science and Information Technology
, pp. 645-649
-
-
Yang, H.1
Jiang, X.2
Kot, A.C.3
-
21
-
-
67549112548
-
Generating registration-free cancelable fingerprint templates
-
S. Chikkerur, N. Ratha, J. Connell, R. Bolle, Generating registration-free cancelable fingerprint templates, in: Second IEEE International Conference on Biometrics: Theory, Applications and Systems, 2008, pp. 1-6.
-
(2008)
Second IEEE International Conference on Biometrics: Theory, Applications and Systems
, pp. 1-6
-
-
Chikkerur, S.1
Ratha, N.2
Connell, J.3
Bolle, R.4
-
22
-
-
12344259813
-
Biohashing: Two factor authentication featuring fingerprint data and tokenised random number
-
A.B.J. Teoh, D.C.L. Ngo, A. Goh Biohashing: two factor authentication featuring fingerprint data and tokenised random number Pattern Recognition 37 11 2004 2245 2255
-
(2004)
Pattern Recognition
, vol.37
, Issue.11
, pp. 2245-2255
-
-
Teoh, A.B.J.1
Ngo, D.C.L.2
Goh, A.3
-
23
-
-
35148889847
-
Anonymous and revocable fingerprint recognition
-
F. Farooq, R. Bolle, J. Tsai-Yang, N. Ratha, Anonymous and revocable fingerprint recognition, in: IEEE Conference on Computer Vision and Pattern Recognition, 2007, pp. 1-7.
-
(2007)
IEEE Conference on Computer Vision and Pattern Recognition
, pp. 1-7
-
-
Farooq, F.1
Bolle, R.2
Tsai-Yang, J.3
Ratha, N.4
-
24
-
-
76549131060
-
Secure minutiae-based fingerprint templates using random triangle hashing
-
Z. Jin, A. Teoh, T.S. Ong, C. Tee, Secure minutiae-based fingerprint templates using random triangle hashing, in: First International Visual Informatics Conference, 2009, pp. 521-531.
-
(2009)
First International Visual Informatics Conference
, pp. 521-531
-
-
Jin, Z.1
Teoh, A.2
Ong, T.S.3
Tee, C.4
-
25
-
-
77957961615
-
Comparative analysis of registration based and registration free methods for cancelable fingerprint biometrics
-
A.O. Thomas, N. Ratha, J. Connell, R. Bolle, Comparative analysis of registration based and registration free methods for cancelable fingerprint biometrics, in: 19th International Conference on Pattern Recognition, 2008, pp. 1-4.
-
(2008)
19th International Conference on Pattern Recognition
, pp. 1-4
-
-
Thomas, A.O.1
Ratha, N.2
Connell, J.3
Bolle, R.4
-
29
-
-
33947177191
-
Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs
-
A.B.J. Teoh, A. Goh, D.C.L. Ngo Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs IEEE Transactions on Pattern Analysis and Machine Intelligence 28 12 2006 1892 1901
-
(2006)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.28
, Issue.12
, pp. 1892-1901
-
-
Teoh, A.B.J.1
Goh, A.2
Ngo, D.C.L.3
-
30
-
-
35148885090
-
Cancelable biometrics realization with multispace random projections
-
A.B.J. Teoh, C.T. Yuang Cancelable biometrics realization with multispace random projections IEEE Transactions on Systems, Man, Cybernetics, Part B: Cybernetics 37 5 2007 1096 1106
-
(2007)
IEEE Transactions on Systems, Man, Cybernetics, Part B: Cybernetics
, vol.37
, Issue.5
, pp. 1096-1106
-
-
Teoh, A.B.J.1
Yuang, C.T.2
-
31
-
-
67650357914
-
Inverse operation and preimage attack on BioHashing
-
Y. Lee, Y. Chung, K. Moon, Inverse operation and preimage attack on BioHashing, in: IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, Applications, 2009, pp. 92-97.
-
(2009)
IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, Applications
, pp. 92-97
-
-
Lee, Y.1
Chung, Y.2
Moon, K.3
-
32
-
-
77951867411
-
On the security of biohashing
-
8
-
X. Zhou, T. Kalker, On the security of biohashing, in: Proceedings of SPIE-IS&T Electronic Imaging, Media Forensics and Security II, vol. 7541, 2010, 75410Q, 8 pages.
-
(2010)
Proceedings of SPIE-IS&T Electronic Imaging, Media Forensics and Security II
, vol.7541
-
-
Zhou, X.1
Kalker, T.2
-
33
-
-
78650371034
-
Dynamic random projection for biometric template protection
-
B. Yang, D. Hartung, K. Simoens, C. Busch, Dynamic random projection for biometric template protection, in: IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS), 2010, pp. 1-7.
-
(2010)
IEEE International Conference on Biometrics: Theory Applications and Systems (BTAS)
, pp. 1-7
-
-
Yang, B.1
Hartung, D.2
Simoens, K.3
Busch, C.4
-
34
-
-
43749087125
-
Entropy analysis and new constructions of biometric key generation systems
-
J.D. Golic, M. Baltatu Entropy analysis and new constructions of biometric key generation systems IEEE Transactions on Information Theory 54 5 2008 2026 2040
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.5
, pp. 2026-2040
-
-
Golic, J.D.1
Baltatu, M.2
-
37
-
-
33947528272
-
A fingerprint orientation model based on 2D Fourier Expansion (FOMFE) and its application to singular-point detection and fingerprint Indexing, Special Issue on Biometrics: Progress and Directions
-
Y. Wang, J. Hu, D. Philip A fingerprint orientation model based on 2D Fourier Expansion (FOMFE) and its application to singular-point detection and fingerprint Indexing, Special Issue on Biometrics: Progress and Directions IEEE Transactions on Pattern Analysis and Machine Intelligence 29 4 2007 573 585
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 573-585
-
-
Wang, Y.1
Hu, J.2
Philip, D.3
-
38
-
-
79958822097
-
A pitfall in fingerprint bio-cryptographic key generation
-
P. Zhang, J. Hu, C. Li, M. Bennamoun, V. Bhagavatula A pitfall in fingerprint bio-cryptographic key generation Computers & Security 30 5 2011 311 319
-
(2011)
Computers & Security
, vol.30
, Issue.5
, pp. 311-319
-
-
Zhang, P.1
Hu, J.2
Li, C.3
Bennamoun, M.4
Bhagavatula, V.5
-
39
-
-
33847297478
-
Enhanced gradient-based algorithm for the estimation of fingerprint orientation field
-
Y. Wang, J. Hu, F. Han Enhanced gradient-based algorithm for the estimation of fingerprint orientation field Applied Mathematics and Computation 185 2 2007 823 833
-
(2007)
Applied Mathematics and Computation
, vol.185
, Issue.2
, pp. 823-833
-
-
Wang, Y.1
Hu, J.2
Han, F.3
|