-
2
-
-
84555206666
-
Evaluation of cancelable biometric systems: Application to finger-knuckle-prints
-
R. Belguechi, E. Cherrier, M. E. Abed, and C. Rosenberger. Evaluation of cancelable biometric systems: Application to finger-knuckle-prints. In IEEE International Conference on Hand-Based Biometrics, pages 222-227, 2011.
-
(2011)
IEEE International Conference on Hand-Based Biometrics
, pp. 222-227
-
-
Belguechi, R.1
Cherrier, E.2
Abed, M.E.3
Rosenberger, C.4
-
3
-
-
12844255931
-
Palmhashing: A novel approach for dualfactor authentication
-
T. Connie, A. Teoh, M. Goh, and D. Ngo. Palmhashing: a novel approach for dualfactor authentication. Pattern analysis application, 7:255-268, 2004.
-
(2004)
Pattern Analysis Application
, vol.7
, pp. 255-268
-
-
Connie, T.1
Teoh, A.2
Goh, M.3
Ngo, D.4
-
5
-
-
71749104688
-
Keystroke dynamics with low constraints SVM based passphrase enrollment
-
R. Giot, M. El-Abed, and C. Rosenberger. Keystroke dynamics with low constraints svm based passphrase enrollment. In IEEE International Conference on Biometrics: Theory, Applications and Systems, pages 1-6, 2009.
-
(2009)
IEEE International Conference on Biometrics: Theory, Applications and Systems
, pp. 1-6
-
-
Giot, R.1
El-Abed, M.2
Rosenberger, C.3
-
6
-
-
77949488110
-
A performance driven methodology for cancelable face templates generation
-
Y. Kim, A. Teoh, and K.-A. Toh. A performance driven methodology for cancelable face templates generation. Pattern recognition, 43:25442559, 2010.
-
(2010)
Pattern Recognition
, vol.43
, pp. 25442559
-
-
Kim, Y.1
Teoh, A.2
Toh, K.-A.3
-
7
-
-
33646095185
-
An analysis of biohashing and its variants
-
A. Kong, K.-H. Cheung, D. Zhang, M. Kamel, and J. You. An analysis of biohashing and its variants. Pattern Recognition, 39:1359-1368, 2006.
-
(2006)
Pattern Recognition
, vol.39
, pp. 1359-1368
-
-
Kong, A.1
Cheung, K.-H.2
Zhang, D.3
Kamel, M.4
You, J.5
-
9
-
-
33750533142
-
An improved biohashing for human authentication
-
A. Lumini and L. Nanni. An improved biohashing for human authentication. Pattern Recognition, 40:1057-1065, 2007.
-
(2007)
Pattern Recognition
, vol.40
, pp. 1057-1065
-
-
Lumini, A.1
Nanni, L.2
-
11
-
-
77950367675
-
A hybrid biometric cryptosystem for securing fingerprint minutiae templates
-
A. Nagar, K. Nandakumar, and A. Jain. A hybrid biometric cryptosystem for securing fingerprint minutiae templates. Pattern Recognition Letters, 33(8):733-741, 2009.
-
(2009)
Pattern Recognition Letters
, vol.33
, Issue.8
, pp. 733-741
-
-
Nagar, A.1
Nandakumar, K.2
Jain, A.3
-
15
-
-
79960821999
-
Enhancing security and privacy in biometrics-based authentication system
-
N. Ratha, J. Connelle, and R. Bolle. Enhancing security and privacy in biometrics-based authentication system. IBM Systems J., 37(11):2245-2255, 2001.
-
(2001)
IBM Systems J.
, vol.37
, Issue.11
, pp. 2245-2255
-
-
Ratha, N.1
Connelle, J.2
Bolle, R.3
-
16
-
-
70350173591
-
Dictionary attack on functional transform-based cancelable fingerprint templates
-
S. W. Shin, M.-K. Lee, D. Moon, and K. Moon. Dictionary attack on functional transform-based cancelable fingerprint templates. ETRI Journal, 31:628-630, 2009.
-
(2009)
ETRI Journal
, vol.31
, pp. 628-630
-
-
Shin, S.W.1
Lee, M.-K.2
Moon, D.3
Moon, K.4
-
17
-
-
38949203738
-
Cancellable biometrics and annotations on biohash
-
A. Teoh, Y. Kuanb, and S. Leea. Cancellable biometrics and annotations on biohash. Pattern recognition, 41:2034-2044, 2008.
-
(2008)
Pattern Recognition
, vol.41
, pp. 2034-2044
-
-
Teoh, A.1
Kuanb, Y.2
Leea, S.3
-
18
-
-
12344259813
-
Biohashing: Two factor authentication featuring fingerprint data and tokenised random number
-
A. Teoh, D. Ngo, and A. Goh. Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern recognition, 37:2245-2255, 2004.
-
(2004)
Pattern Recognition
, vol.37
, pp. 2245-2255
-
-
Teoh, A.1
Ngo, D.2
Goh, A.3
|