-
1
-
-
0742290133
-
An introduction to biometric recognition
-
10.1109/TCSVT.2003.818349 1051-8215
-
Jain, A.K., Ross, A., and Prabhakar, S.: ' An introduction to biometric recognition ', IEEE Trans. Circuits Syst. Video Technol., 2004, 14, p. 4-20 10.1109/TCSVT.2003.818349 1051-8215
-
(2004)
IEEE Trans. Circuits Syst. Video Technol.
, vol.14
, pp. 4-20
-
-
Jain, A.K.1
Ross, A.2
Prabhakar, S.3
-
2
-
-
43949116287
-
Biometric template security
-
10.1155/2008/657081
-
Jain, A.K., Nandakumar, K., and Nagar, A.: ' Biometric template security ', EURASIP J. Adv. Signal Process., 2008, 2008, p. 1-17 10.1155/2008/657081
-
(2008)
EURASIP J. Adv. Signal Process.
, vol.2008
, pp. 1-17
-
-
Jain, A.K.1
Nandakumar, K.2
Nagar, A.3
-
3
-
-
84879085385
-
A survey on biometric cryptosystems and cancelable biometrics
-
10.1186/1687-417X-2011-3
-
Rathgeb, C., and Uhl, A.: ' A survey on biometric cryptosystems and cancelable biometrics ', EURASIP J. Inf. Sec., 2011, 2011, (3) 10.1186/1687-417X-2011-3
-
(2011)
EURASIP J. Inf. Sec.
, vol.2011
, Issue.3
-
-
Rathgeb, C.1
Uhl, A.2
-
5
-
-
54049089250
-
Pseudo identities based on fingerprint characteristics
-
Washington, DC, USA
-
Delvaux, N., Chabanne, H., and Bringer, J.: et al. ' Pseudo identities based on fingerprint characteristics ', IIH-MSP'08: Proc. 2008 Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing, Washington, DC, USA, 2008, p. 1063-1068
-
(2008)
IIH-MSP'08: Proc. 2008 Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing
, pp. 1063-1068
-
-
Delvaux, N.1
Chabanne, H.2
Bringer, J.3
-
6
-
-
33747624401
-
Combining cryptography with biometrics effectively
-
10.1109/TC.2006.138 0018-9340
-
Hao, F., Anderson, R., and Daugman, J.: ' Combining cryptography with biometrics effectively ', IEEE Trans. Comput., 2006, 55, (9), p. 1081-1088 10.1109/TC.2006.138 0018-9340
-
(2006)
IEEE Trans. Comput.
, vol.55
, Issue.9
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
8
-
-
77952703061
-
Security issues of biometric encryption
-
Stoianov, A., Kevenaar, T., and van der Veen, M.: ' Security issues of biometric encryption ', Proc. Toronto Int. Conf. on Science and Technology for Humanity (TIC-STH), 2009, p. 34-39
-
(2009)
Proc. Toronto Int. Conf. on Science and Technology for Humanity (TIC-STH)
, pp. 34-39
-
-
Stoianov, A.1
Kevenaar, T.2
Van Der Veen, M.3
-
9
-
-
56749174787
-
Theoretical and practical boundaries of binary secure sketches
-
10.1109/TIFS.2008.2002937
-
Bringer, J., Chabanne, H., Cohen, G., Kindarji, B., and Zémor, G.: ' Theoretical and practical boundaries of binary secure sketches ', IEEE Trans. Inf. Forensics Sec., 2008, 3, p. 673-683 10.1109/TIFS.2008.2002937
-
(2008)
IEEE Trans. Inf. Forensics Sec.
, vol.3
, pp. 673-683
-
-
Bringer, J.1
Chabanne, H.2
Cohen, G.3
Kindarji, B.4
Zémor, G.5
-
11
-
-
38149138086
-
Secure biometric template protection in fuzzy commitment scheme
-
10.1587/elex.4.724
-
Teoh, A., and Kim, J.: ' Secure biometric template protection in fuzzy commitment scheme ', IEICE Electron. Express, 2007, 4, (23), p. 724-730 10.1587/elex.4.724
-
(2007)
IEICE Electron. Express
, vol.4
, Issue.23
, pp. 724-730
-
-
Teoh, A.1
Kim, J.2
-
12
-
-
51849159393
-
Biometric fuzzy extractors made practical: A proposal based on fingercodes
-
(LNCS, 4642)
-
Tong, V., Sibert, H., Lecoeur, J., and Girault, M.: ' Biometric fuzzy extractors made practical: a proposal based on fingercodes ', Int. Conf. on Biometrics, 2007, (LNCS, 4642)
-
(2007)
Int. Conf. on Biometrics
-
-
Tong, V.1
Sibert, H.2
Lecoeur, J.3
Girault, M.4
-
13
-
-
69949124290
-
Near infrared face based biometric key binding
-
Ao, M., and Li, S.Z.: ' Near infrared face based biometric key binding ', Proc. Third Int. Conf. on Biometrics, (ICB'09), 2009, p. 376-385, (LNCS, 5558)
-
(2009)
Proc. Third Int. Conf. on Biometrics, (ICB'09)
, pp. 376-385
-
-
Ao, M.1
Li, S.Z.2
-
14
-
-
70449553184
-
Face recognition with biometric encryption for privacy-enhancing self-exclusion
-
Lu, H., Martin, K., Bui, F., Plataniotis, K., and Hatzinakos, D.: ' Face recognition with biometric encryption for privacy-enhancing self-exclusion ', Proc. 16th Int. Conf. on Digital Signal Processing (DSP 2009), 2009
-
(2009)
Proc. 16th Int. Conf. on Digital Signal Processing (DSP 2009)
-
-
Lu, H.1
Martin, K.2
Bui, F.3
Plataniotis, K.4
Hatzinakos, D.5
-
15
-
-
80054963215
-
Systematic construction of iris-based fuzzy commitment schemes
-
Rathgeb, C., and Uhl, A.: ' Systematic construction of iris-based fuzzy commitment schemes ', Proc. Third Int. Conf. on Biometrics, 2009 (ICB'09), 2009, p. 947-956, (LNCS, 5558)
-
(2009)
Proc. Third Int. Conf. on Biometrics, 2009 (ICB'09)
, pp. 947-956
-
-
Rathgeb, C.1
Uhl, A.2
-
16
-
-
69949142920
-
Robust biometric key extraction based on iris cryptosystem
-
Zhang, L., Sun, Z., Tan, T., and Hu, S.: ' Robust biometric key extraction based on iris cryptosystem ', Proc. Third Int. Conf. on Biometrics, (ICB'09), 2009, p. 1060-1070, (LNCS, 5558)
-
(2009)
Proc. Third Int. Conf. on Biometrics, (ICB'09)
, pp. 1060-1070
-
-
Zhang, L.1
Sun, Z.2
Tan, T.3
Hu, S.4
-
17
-
-
73649142027
-
Achieving secure fuzzy commitment scheme for optical pufs
-
Los Alamitos, CA, USA
-
Ignatenko, T., and Willems, F.M.J.: ' Achieving secure fuzzy commitment scheme for optical pufs ', Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing, Los Alamitos, CA, USA, 2009, p. 1185-1188
-
(2009)
Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing
, pp. 1185-1188
-
-
Ignatenko, T.1
Willems, F.M.J.2
-
20
-
-
77952661812
-
Information leakage in fuzzy commitment schemes
-
10.1109/TIFS.2010.2046984
-
Ignatenko, T., and Willems, F.M.J.: ' Information leakage in fuzzy commitment schemes ', Trans. Inf. Forensics Sec., 2010, 5, (2), p. 337-348 10.1109/TIFS.2010.2046984
-
(2010)
Trans. Inf. Forensics Sec.
, vol.5
, Issue.2
, pp. 337-348
-
-
Ignatenko, T.1
Willems, F.M.J.2
-
21
-
-
78149253456
-
Esketch: A privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics
-
Failla, P., Sutcu, Y., and Barni, M.: ' Esketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics ', Proc. 12th ACM workshop on Multimedia and security, ser. MMSec'10, 2010, p. 241-246
-
(2010)
Proc. 12th ACM Workshop on Multimedia and Security, Ser. MMSec'10
, pp. 241-246
-
-
Failla, P.1
Sutcu, Y.2
Barni, M.3
-
22
-
-
70449640064
-
Privacy weaknesses in biometric sketches
-
Simoens, K., Tuyls, P., and Preneel, B.: ' Privacy weaknesses in biometric sketches ', Proc. 30th IEEE Symp. on Security and Privacy, 2009, p. 188-203
-
(2009)
Proc. 30th IEEE Symp. on Security and Privacy
, pp. 188-203
-
-
Simoens, K.1
Tuyls, P.2
Preneel, B.3
-
23
-
-
79952513447
-
Efficient strategies for playing the indistinguishability game for fuzzy sketches
-
Buhan-Dulman, I., Merchan, J.G., and Kelkboom, E.: ' Efficient strategies for playing the indistinguishability game for fuzzy sketches ', Proc. IEEE Workshop on Information Forensics and Security (WIFS), 2010
-
(2010)
Proc. IEEE Workshop on Information Forensics and Security (WIFS)
-
-
Buhan-Dulman, I.1
Merchan, J.G.2
Kelkboom, E.3
-
24
-
-
79951844995
-
Preventing the decodability attack based cross-matching in a fuzzy commitment scheme
-
10.1109/TIFS.2010.2091637
-
Kelkboom, E.J.C., Breebaart, J., Kevenaar, T.A.M., Buhan, I., and Veldhuis, R.N.J.: ' Preventing the decodability attack based cross-matching in a fuzzy commitment scheme ', Trans. Inf. Forensics Sec., 2010, 6, (1), p. 107-121 10.1109/TIFS.2010.2091637
-
(2010)
Trans. Inf. Forensics Sec.
, vol.6
, Issue.1
, pp. 107-121
-
-
Kelkboom, E.J.C.1
Breebaart, J.2
Kevenaar, T.A.M.3
Buhan, I.4
Veldhuis, R.N.J.5
-
25
-
-
84856116593
-
Reliability-balanced feature level fusion for fuzzy commitment scheme
-
Washington, DC, USA, October
-
Rathgeb, C., Uhl, A., and Wild, P.: ' Reliability-balanced feature level fusion for fuzzy commitment scheme ', Proc. Int. Joint Conf. on Biometrics (IJCB'11), Washington, DC, USA, October, 2011, p. 1-7
-
(2011)
Proc. Int. Joint Conf. on Biometrics (IJCB'11)
, pp. 1-7
-
-
Rathgeb, C.1
Uhl, A.2
Wild, P.3
-
26
-
-
67549130623
-
User adaptive fuzzy commitment for signature templates protection and renewability
-
10.1117/1.2885239
-
Maiorana, E., Campisi, P., and Neri, A.: ' User adaptive fuzzy commitment for signature templates protection and renewability ', SPIE J. Electron. Imaging Spec. Section Biometrics, Adv. Sec. Usability Interoperability, 2008, 17, (1), p. 1-12 10.1117/1.2885239
-
(2008)
SPIE J. Electron. Imaging Spec. Section Biometrics, Adv. Sec. Usability Interoperability
, vol.17
, Issue.1
, pp. 1-12
-
-
Maiorana, E.1
Campisi, P.2
Neri, A.3
-
29
-
-
78650403067
-
Binary feature vector fingerprint representation from minutiae vicinities
-
Bringer, J., and Despiegel, V.: ' Binary feature vector fingerprint representation from minutiae vicinities ', Proc. Fourth IEEE Int. Conf. on Biometrics: Theory, Applications and Systems (BTAS'10), 2010, p. 1-6
-
(2010)
Proc. Fourth IEEE Int. Conf. on Biometrics: Theory, Applications and Systems (BTAS'10)
, pp. 1-6
-
-
Bringer, J.1
Despiegel, V.2
-
30
-
-
65549084496
-
The best bits in an iris code
-
10.1109/TPAMI.2008.185 0162-8828
-
Hollingsworth, K.P., Bowyer, K.W., and Flynn, P.J.: ' The best bits in an iris code ', IEEE Trans. Pattern Anal. Mach. Intell., 2009, 31, (6), p. 964-973 10.1109/TPAMI.2008.185 0162-8828
-
(2009)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.31
, Issue.6
, pp. 964-973
-
-
Hollingsworth, K.P.1
Bowyer, K.W.2
Flynn, P.J.3
-
31
-
-
0000744902
-
Binomial and negative binomial analogues under correlated bernoulli trials
-
The American Statistician 0003-1305
-
Viveros, R., Balasubramanian, K., and Balakrishnan, N.: ' Binomial and negative binomial analogues under correlated bernoulli trials ', Am. Stat., 1984, 48, (3), p. 243-247 The American Statistician 0003-1305
-
(1984)
Am. Stat.
, vol.48
, Issue.3
, pp. 243-247
-
-
Viveros, R.1
Balasubramanian, K.2
Balakrishnan, N.3
-
32
-
-
26444507172
-
Practical biometric authentication with template protection
-
Tuyls, P., Akkermans, A.H.M., Kevenaar, T.A.M., Schrijen, G.J., Bazen, A.M., and Veldhuis, R.N.J.: ' Practical biometric authentication with template protection ', Proc. Audio- and Video-Based Biometric Person Authentication, 2005, 3546, p. 436-446
-
(2005)
Proc. Audio- And Video-Based Biometric Person Authentication
, vol.3546
, pp. 436-446
-
-
Tuyls, P.1
Akkermans, A.H.M.2
Kevenaar, T.A.M.3
Schrijen, G.J.4
Bazen, A.M.5
Veldhuis, R.N.J.6
-
33
-
-
77951204673
-
Binary biometrics: An analytic framework to estimate the performance curves under Gaussian assumption
-
10.1109/TSMCA.2010.2041657
-
Kelkboom, E.J.C., Molina, G.G., Breebaart, J., Veldhuis, R.N.J., Kevenaar, T.A.M., and Jonker, W.: ' Binary biometrics: an analytic framework to estimate the performance curves under Gaussian assumption ', Trans. Syst. Man, Cybern.-Part A: Syst. Humans, 2010, 40, (3), p. 555-571 10.1109/TSMCA.2010. 2041657
-
(2010)
Trans. Syst. Man, Cybern.-Part A: Syst. Humans
, vol.40
, Issue.3
, pp. 555-571
-
-
Kelkboom, E.J.C.1
Molina, G.G.2
Breebaart, J.3
Veldhuis, R.N.J.4
Kevenaar, T.A.M.5
Jonker, W.6
-
34
-
-
77955377975
-
Two-factor authentication or how to potentially counterfeit experimental results in biometric systems
-
Rathgeb, C., and Uhl, A.: ' Two-factor authentication or how to potentially counterfeit experimental results in biometric systems ', Proc. Int. Conf. on Image Analysis and Recognition (ICIAR'10), Part II, 2010, p. 296-305, (LNCS 6112)
-
(2010)
Proc. Int. Conf. on Image Analysis and Recognition (ICIAR'10), Part II
, pp. 296-305
-
-
Rathgeb, C.1
Uhl, A.2
-
36
-
-
2942628075
-
Efficient iris recogntion by characterizing key local variations
-
10.1109/TIP.2004.827237 1057-7149
-
Ma, L., Tan, T., Wang, Y., and Zhang, D.: ' Efficient iris recogntion by characterizing key local variations ', IEEE Trans. Image Process., 2004, 13, (6), p. 739-750 10.1109/TIP.2004.827237 1057-7149
-
(2004)
IEEE Trans. Image Process.
, vol.13
, Issue.6
, pp. 739-750
-
-
-
38
-
-
0742290132
-
How iris recognition works
-
10.1109/TCSVT.2003.818350
-
Daugman, J.: ' How iris recognition works ', IEEE Trans. Circiuts Syst. Video Technol., 2004, 14, (1), p. 21-30 10.1109/TCSVT.2003.818350
-
(2004)
IEEE Trans. Circiuts Syst. Video Technol.
, vol.14
, Issue.1
, pp. 21-30
-
-
Daugman, J.1
-
39
-
-
77957968173
-
Cancelable iris biometric
-
Zuo, J., Ratha, N.K., and Connel, J.H.: ' Cancelable iris biometric ', Proc. 19th Int. Conf. on Pattern Recognition, (ICPR'08), 2008, p. 1-4
-
(2008)
Proc. 19th Int. Conf. on Pattern Recognition, (ICPR'08)
, pp. 1-4
-
-
Zuo, J.1
Ratha, N.K.2
Connel, J.H.3
|