메뉴 건너뛰기




Volumn , Issue , 2012, Pages 238-244

Retrieving secrets from iris fuzzy commitment

Author keywords

[No Author keywords available]

Indexed keywords

BINARY FEATURES; DISTRIBUTION ANALYSIS; FUZZY COMMITMENT; IRIS CODE; IRIS PATTERNS; MARKOV MODEL; SECURITY ASSESSMENT; USER PRIVACY;

EID: 84866781016     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICB.2012.6199814     Document Type: Conference Paper
Times cited : (12)

References (21)
  • 1
    • 24944579285 scopus 로고    scopus 로고
    • collected by the Chinese Academy of Sciences' Institute of Automation (CASIA)
    • Casia iris image database. collected by the Chinese Academy of Sciences' Institute of Automation (CASIA), http://biometrics.idealtest.org/.
    • Casia Iris Image Database
  • 4
    • 60749108051 scopus 로고    scopus 로고
    • An analysis on invertibility of cancelable biometrics based on biohashing
    • K. H. Cheung, A. W.-K. Kong, J. You, and D. Zhang. An analysis on invertibility of cancelable biometrics based on biohashing. In CISST'2005, pages 40-45, 2005.
    • (2005) CISST'2005 , pp. 40-45
    • Cheung, K.H.1    Kong, A.W.-K.2    You, J.3    Zhang, D.4
  • 5
    • 0036487317 scopus 로고    scopus 로고
    • The importance of being random: Statistical principles of iris recognition
    • J. Daugman. The importance of being random: Statistical principles of iris recognition. In Pattern Rec. 36, pages 279-291, 2003.
    • (2003) Pattern Rec. , vol.36 , pp. 279-291
    • Daugman, J.1
  • 6
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith. Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM Journal on Computing, 38, 2008.
    • (2008) SIAM Journal on Computing , vol.38
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 13
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometrics-based authentication system
    • N. Ratha, J. Connell, and R. Bolle. Enhancing security and privacy in biometrics-based authentication system. IBM Systems Journal, 40(3):614-634, 2001.
    • (2001) IBM Systems Journal , vol.40 , Issue.3 , pp. 614-634
    • Ratha, N.1    Connell, J.2    Bolle, R.3
  • 16
    • 84866779951 scopus 로고    scopus 로고
    • Iris recognition takes steps into a brave new world
    • Iris recognition takes steps into a brave new world. Biometric Technology Today, 14(2):1-2, 2006.
    • (2006) Biometric Technology Today , vol.14 , Issue.2 , pp. 1-2
  • 18
    • 44849118766 scopus 로고    scopus 로고
    • Privacy protection of biometric templates: Cryptography on noisy data
    • ISSN 0035 3248
    • P. Tulys. Privacy protection of biometric templates: cryptography on noisy data. In Revue HF (Rev. HF) ISSN 0035 3248, no 3, pages 55-64, 2004.
    • (2004) Revue HF (Rev. HF) , Issue.3 , pp. 55-64
    • Tulys, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.