-
1
-
-
43949116287
-
Biometric template security
-
Jan
-
A. K. Jain, K. Nandakumar, and A. Nagar, "Biometric template security," EURASIP J. Adv. Signal Process., vol. 8, no. 2, pp. 1-17, Jan. 2008.
-
(2008)
EURASIP J. Adv. Signal Process
, vol.8
, Issue.2
, pp. 1-17
-
-
Jain, A.K.1
Nandakumar, K.2
Nagar, A.3
-
2
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
N. K. Ratha, J. H. Connell, and R. M. Bolle, "Enhancing security and privacy in biometrics-based authentication systems," IBM Syst. J., vol. 40, no. 3, pp. 614-634, 2001. (Pubitemid 32933421)
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
3
-
-
33947530278
-
Generating cancelable fingerprint templates
-
DOI 10.1109/TPAMI.2007.1004, Special issue on Biometrics: Progress and Directions
-
N. Ratha, S. Chikkerur, J. Connell, and R. M. Bolle, "Generating cancelable fingerprint templates," IEEE Trans. Pattern Anal.Mach. Intell., vol. 29, no. 4, pp. 561-572, Apr. 2007. (Pubitemid 46464397)
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.K.1
Chikkerur, S.2
Connell, J.H.3
Bolle, R.M.4
-
4
-
-
34547103253
-
Alignment-free cancelable fingerprint templates based on local minutiae information
-
DOI 10.1109/TSMCB.2007.896999
-
C. Lee, J. Y. Choi, K. A. Toh, and S. Lee, "Alignment-free cancelable fingerprint templates based on local minutiae information," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 37, no. 4, pp. 980-992, Aug. 2007. (Pubitemid 47103947)
-
(2007)
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
, vol.37
, Issue.4
, pp. 980-992
-
-
Lee, C.1
Choi, J.-Y.2
Toh, K.-A.3
Lee, S.4
Kim, J.5
-
5
-
-
35148829897
-
Symmetric hash functions for secure fingerprint biometric systems
-
DOI 10.1016/j.patrec.2007.08.008, PII S0167865507002620
-
S. Tulyakov, F. Farooq, P. Mansukhani, and V. Govindaraju, "Symmetric hash functions for secure fingerprint biometric systems," Pattern Recognit. Lett., vol. 28, no. 16, pp. 2427-2436, Dec. 2007. (Pubitemid 47538796)
-
(2007)
Pattern Recognition Letters
, vol.28
, Issue.16
, pp. 2427-2436
-
-
Tulyakov, S.1
Farooq, F.2
Mansukhani, P.3
Govindaraju, V.4
-
6
-
-
67549112548
-
Generating registration-free cancelable fingerprint templates
-
S. Chikkerur, N. Ratha, J. Connell, and R. M. Bolle, "Generating registration-free cancelable fingerprint templates," in Proc. Int. Conf. Biometrics: Theory, Applications and Systems (BTAS 08), 2008, pp. 1-6.
-
(2008)
Proc. Int. Conf. Biometrics: Theory, Applications and Systems (BTAS 08
, pp. 1-6
-
-
Chikkerur, S.1
Ratha, N.2
Connell, J.3
Bolle, R.M.4
-
7
-
-
52049107805
-
Matching with secure fingerprint templates using non-invertible transform
-
D. Ahn, S. G. Kong, Y. S. Chung, and K. Y. Moon, "Matching with secure fingerprint templates using non-invertible transform," in Proc. Image and Signal Processing (CISP'08), 2008, pp. 29-33.
-
(2008)
Proc. Image and Signal Processing (CISP'08
, pp. 29-33
-
-
Ahn, D.1
Kong, S.G.2
Chung, Y.S.3
Moon, K.Y.4
-
8
-
-
78149478733
-
Combination of symmetric hash functions for secure fingerprint matching
-
Istanbul
-
G. Kumar, S. Tulyakov, and V. Govindaraju, "Combination of symmetric hash functions for secure fingerprint matching," in Proc. 20th Int. Conf. Pattern Recognition (ICPR), Istanbul, 2010, pp. 890-893.
-
(2010)
Proc. 20th Int. Conf. Pattern Recognition (ICPR)
, pp. 890-893
-
-
Kumar, G.1
Tulyakov, S.2
Govindaraju, V.3
-
9
-
-
84870278821
-
Alignment and bit extraction for secure fingerprint biometrics
-
San Jose, CA
-
A. Nagar, S. Rane, and A. Vetro, "Alignment and bit extraction for secure fingerprint biometrics," in Proc. Media Forensics and Security, San Jose, CA, 2010.
-
(2010)
Proc. Media Forensics and Security
-
-
Nagar, A.1
Rane, S.2
Vetro, A.3
-
10
-
-
84856090844
-
Fingerprint template protection with minutia vicinity decomposition
-
Washington DC
-
J. Zhe and A. T. B. Jin, "Fingerprint template protection with minutia vicinity decomposition," in Proc. Int. Conf. Biometrics (IJCB 2011), Washington, DC, 2011.
-
(2011)
Proc. Int. Conf. Biometrics (IJCB 2011)
-
-
Zhe, J.1
Jin, A.T.B.2
-
11
-
-
12344259813
-
Biohashing: Two factor authentication featuring fingerprint data and tokenised random number
-
DOI 10.1016/j.patcog.2004.04.011, PII S0031320304001876
-
A. T. B. Jin, D. N. C. Ling, and A. Goh, "Biohashing: Two factor authentication featuring fingerprint data and tokenised random number," Pattern Recognit., vol. 37, no. 11, pp. 2245-2255, 2004. (Pubitemid 40134555)
-
(2004)
Pattern Recognition
, vol.37
, Issue.11
, pp. 2245-2255
-
-
Jin, A.T.B.1
Ling, D.N.C.2
Goh, A.3
-
12
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Proc. Int. Conf. Cryptology (EUROCRYPT 04), 2004, pp. 523-540.
-
(2004)
Proc. Int. Conf. Cryptology (EUROCRYPT 04
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
13
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," SIAM J. Comput., vol. 38, no. 1, pp. 97-139, 2008.
-
(2008)
SIAM J. Comput
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
16
-
-
36348986198
-
Fingerprint-based fuzzy vault: Implementation and performance
-
DOI 10.1109/TIFS.2007.908165
-
K. Nandakumar, A. K. Jain, and S. Pankati, "Fingerprint-based fuzzy vault: Implementation and performance," IEEE Trans. Inf. Forensics Security, vol. 2, no. 4, pp. 744-757, Dec. 2007. (Pubitemid 350157947)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.4
, pp. 744-757
-
-
Nandakumar, K.1
Jain, A.K.2
Pankanti, S.3
-
17
-
-
77957941531
-
Securing fingerprint template: Fuzzy vault with minutiae descriptors
-
A. Nagar, K. Nandakumar, and A. K. Jain, "Securing fingerprint template: Fuzzy vault with minutiae descriptors," in Proc. 19th Int. Conf. Pattern Recognition (ICPR 2008), 2008, pp. 1-4.
-
(2008)
Proc. 19th Int. Conf. Pattern Recognition (ICPR 2008
, pp. 1-4
-
-
Nagar, A.1
Nandakumar, K.2
Jain, A.K.3
-
18
-
-
77951206096
-
An alignment-free fingerprint cryptosystem based on fuzzy vault scheme
-
May
-
P. Li et al., "An alignment-free fingerprint cryptosystem based on fuzzy vault scheme," J. Netw. Comput. Applicat., vol. 33, no. 3, pp. 207-220, May 2010.
-
(2010)
J. Netw. Comput. Applicat
, vol.33
, Issue.3
, pp. 207-220
-
-
Li, P.1
-
19
-
-
84871057818
-
-
BioLab Jan
-
BioLab., FVC-onGoingWeb Site, Jan. 2012 [Online].Available: http://biolab.csr.unibo.it/fvcongoing
-
(2012)
FVC-onGoingWeb Site
-
-
-
20
-
-
78049513630
-
Minutia Cylinder-Code: A new representation and matching technique for fingerprint recognition
-
Dec.
-
R. Cappelli, M. Ferrara, and D. Maltoni, "Minutia Cylinder-Code: A new representation and matching technique for fingerprint recognition," IEEE Trans. Pattern Anal. Mach. Intell., vol. 32, no. 12, pp. 2128-2141, Dec. 2010.
-
(2010)
IEEE Trans. Pattern Anal. Mach. Intell
, vol.32
, Issue.12
, pp. 2128-2141
-
-
Cappelli, R.1
Ferrara, M.2
Maltoni, D.3
-
22
-
-
1342275940
-
-
2nd ed. New York: Springer-Verlag
-
D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, 2nd ed. New York: Springer-Verlag, 2009.
-
(2009)
Handbook of Fingerprint Recognition
-
-
Maltoni, D.1
Maio, D.2
Jain, A.K.3
Prabhakar, S.4
-
23
-
-
84879085385
-
A survey on biometric cryptosystems and cancelable biometrics
-
C. Rathgeb and A. Uhl, "A survey on biometric cryptosystems and cancelable biometrics," EURASIP J. Inf. Security, pp. 1-25, 2011.
-
(2011)
EURASIP J. Inf. Security
, pp. 1-25
-
-
Rathgeb, C.1
Uhl, A.2
-
24
-
-
78650371034
-
Dynamic random projection for biometric template protection
-
B. Yang, D. Hartung, K. Simoens, and C. Busch, "Dynamic random projection for biometric template protection," in Proc. Fourth IEEE Int. Conf. Biometrics: Theory Applications and Systems (BTAS), 2010, pp. 1-7.
-
(2010)
Proc. Fourth IEEE Int. Conf. Biometrics: Theory Applications and Systems (BTAS
, pp. 1-7
-
-
Yang, B.1
Hartung, D.2
Simoens, K.3
Busch, C.4
-
25
-
-
77951790032
-
Robust minutiae hash for fingerprint template protection
-
B. Yang, C. Busch, P. Bours, and D. Gafurov, "Robust minutiae hash for fingerprint template protection," in Proc. Media Forensics and Security II, 2010, p. 75410.
-
(2010)
Proc. Media Forensics and Security II
, pp. 75410
-
-
Yang, B.1
Busch, C.2
Bours, P.3
Gafurov, D.4
-
29
-
-
79952415141
-
MCC: A baseline algorithm for fingerprint verification in FVC-onGoing
-
Singapore
-
R. Cappelli, M. Ferrara, D. Maltoni, and M. Tistarelli, "MCC: A baseline algorithm for fingerprint verification in FVC-onGoing," in Proc. 11th Int. Conf. Control, Automation, Robotics and Vision (ICARCV), Singapore, 2010.
-
(2010)
Proc. 11th Int. Conf. Control, Automation, Robotics and Vision (ICARCV)
-
-
Cappelli, R.1
Ferrara, M.2
Maltoni, D.3
Tistarelli, M.4
-
31
-
-
33751580079
-
FVC2002: Second fingerprint verification competition
-
D. Maio, D. Maltoni, R. Cappelli, J. L. Wayman, and A. K. Jain, "FVC2002: Second fingerprint verification competition," in Proc. Int. Conf. Pattern Recognition, 2002, vol. 16, pp. 811-814. (Pubitemid 44844609)
-
(2002)
Proceedings - International Conference on Pattern Recognition
, vol.16
, Issue.3
, pp. 811-814
-
-
Maio, D.1
Maltoni, D.2
Cappelli, R.3
Wayman, J.L.4
Jain, A.K.5
-
32
-
-
34948865766
-
Revocable fingerprint biotokens: Accuracy and security analysis
-
T. E. Boult, W. J. Scheirer, and R.Woodworth, "Revocable fingerprint biotokens: Accuracy and security analysis," in Proc. IEEE Conf. Computer Vision and Pattern Recognition (CVPR), 2007, pp. 1-8.
-
(2007)
Proc. IEEE Conf. Computer Vision and Pattern Recognition (CVPR
, pp. 1-8
-
-
Boult, T.E.1
Scheirer, W.J.2
Woodworth, R.3
-
33
-
-
70449441699
-
Generating secure cancelable fingerprint templates using local and global features
-
H. Yang, X. Jiang, and A. C. Kot, "Generating secure cancelable fingerprint templates using local and global features," in Proc. IEEE Int. Conf. Computer Science and Information Technology (ICCSIT 2009), 2009, pp. 645-649.
-
(2009)
Proc. IEEE Int. Conf. Computer Science and Information Technology (ICCSIT 2009
, pp. 645-649
-
-
Yang, H.1
Jiang, X.2
Kot, A.C.3
-
34
-
-
79851480642
-
Non-invertible geometrical transformation for fingerprint minutiae template protection
-
B. Yang, C. Busch, P. Bours, and D. Gafurov, "Non-invertible geometrical transformation for fingerprint minutiae template protection," in Proc. 1st Int. Workshop on Security and Communication Networks (IWSCN), 2009, pp. 1-7.
-
(2009)
Proc. 1st Int. Workshop on Security and Communication Networks (IWSCN
, pp. 1-7
-
-
Yang, B.1
Busch, C.2
Bours, P.3
Gafurov, D.4
-
35
-
-
79958822548
-
Pair-polar coordinate-based cancelable fingerprint templates
-
T. Ahmad, J. Hu, and S. Wang, "Pair-polar coordinate-based cancelable fingerprint templates," Pattern Recognit., vol. 44, no. 10-11, pp. 2555-2564, 2011.
-
(2011)
Pattern Recognit
, vol.44
, Issue.10-11
, pp. 2555-2564
-
-
Ahmad, T.1
Hu, J.2
Wang, S.3
-
36
-
-
34547600795
-
Fingerprint verification competition 2006
-
DOI 10.1016/S0969-4765(07)70140-6, PII S0969476507701406
-
R. Cappelli, M. Ferrara, A. Franco, and D. Maltoni, "Fingerprint verification competition 2006," Biometric Technol. Today, vol. 15, no. 7-8, pp. 7-9, Aug. 2007. (Pubitemid 47198493)
-
(2007)
Biometric Technology Today
, vol.15
, Issue.7-8
, pp. 7-9
-
-
Cappelli, R.1
Ferrara, M.2
Franco, A.3
Maltoni, D.4
-
38
-
-
84866776956
-
Criteria towardsmetrics for benchmarking template protection algorithms
-
New Delhi
-
K. Simoens et al., "Criteria towardsmetrics for benchmarking template protection algorithms," in Proc. 5th IAPR Int. Conf. Biometrics (ICB 2012), New Delhi, 2012, pp. 498-505.
-
(2012)
Proc. 5th IAPR Int. Conf. Biometrics (ICB 2012)
, pp. 498-505
-
-
Simoens, K.1
-
39
-
-
71749106685
-
A reference architecture for biometric template protection based on pseudo identities
-
Darmstadt, Germany
-
J. Breebaart, C. Busch, J. Grave, and E. Kindt, "A reference architecture for biometric template protection based on pseudo identities," in Proc. BIOSIG 2008, Special Interest Group on Biometrics and Electronic Signatures, Darmstadt, Germany, 2008.
-
(2008)
Proc. BIOSIG 2008, Special Interest Group on Biometrics and Electronic Signatures
-
-
Breebaart, J.1
Busch, C.2
Grave, J.3
Kindt, E.4
-
40
-
-
78650512455
-
Fingerprint reconstruction: From minutiae to phase
-
Feb.
-
J. Feng and A. K. Jain, "Fingerprint reconstruction: From minutiae to phase," IEEE Trans. Pattern Anal. Mach. Intell., vol. 33, no. 2, pp. 209-223, Feb. 2011.
-
(2011)
IEEE Trans. Pattern Anal. Mach. Intell
, vol.33
, Issue.2
, pp. 209-223
-
-
Feng, J.1
Jain, A.K.2
-
42
-
-
84871089306
-
-
Neurotechnology Inc Apr
-
NeurotechnologyWeb Site, Neurotechnology Inc., Apr. 2012 [Online]. Available: http://www.neurotechnology.com/
-
(2012)
NeurotechnologyWeb Site
-
-
-
43
-
-
33644816032
-
Performance evaluation of fingerprint verification systems
-
Jan
-
R. Cappelli, D. Maio, D. Maltoni, J. L. Wayman, and A. K. Jain, "Performance evaluation of fingerprint verification systems," IEEE Trans. Pattern Anal. Mach. Intell., vol. 28, no. 1, pp. 3-18, Jan. 2006.
-
(2006)
IEEE Trans. Pattern Anal. Mach. Intell
, vol.28
, Issue.1
, pp. 3-18
-
-
Cappelli, R.1
Maio, D.2
Maltoni, D.3
Wayman, J.L.4
Jain, A.K.5
|