-
1
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
N. K. Ratha, J. H. Connell, and R. M. Bolle. Enhancing security and privacy in biometrics-based authentication systems, IBM Syst. J. 40(3):614-634, 2001.
-
(2001)
IBM Syst. J.
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
2
-
-
8844228915
-
Attacks on biometric systems: A case study in fingerprints
-
Security, Steganography and Watermarking of Multimedia Contents VI, San Jose, CA, January 18-22
-
U. Uludag and A. K. Jain, Attacks on biometric systems: A case study in fingerprints, in Proceedings of SPIE-EI 2004, Security, Steganography and Watermarking of Multimedia Contents VI, San Jose, CA, January 18-22, Vol. 5306, pp. 622-633, 2004.
-
(2004)
Proceedings of SPIE-EI 2004
, vol.5306
, pp. 622-633
-
-
Uludag, U.1
Jain, A.K.2
-
3
-
-
38149030200
-
Biometric encryption:Apositive-sum technology that achieves strong authentication
-
security and privacy, Available at
-
A. Cavoukian and A. Stoianov, Biometric encryption:Apositive-sum technology that achieves strong authentication, security and privacy, March 2007. Available at www.ipc.on.ca/images/Resources/up-1bio encryp.pdf;
-
(2007)
-
-
Cavoukian, A.1
Stoianov, A.2
-
4
-
-
80052249505
-
Biometric encryption: Technology for strong authentication, security and privacy
-
E. de Leeuw, S. Fischer-Hübner, J. Tseng, and J. Borking, editors, Policies and Research in Identity Management, Springer, Boston
-
A. Cavoukian, A. Stoianov, and F. Carter, Biometric encryption: Technology for strong authentication, security and privacy, in E. de Leeuw, S. Fischer-Hübner, J. Tseng, and J. Borking, editors, IFIP International Federation for Information Processing. Policies and Research in Identity Management, Vol. 261, Springer, Boston, 2008, pp. 57-77.
-
(2008)
IFIP International Federation for Information Processing
, vol.261
, pp. 57-77
-
-
Cavoukian, A.1
Stoianov, A.2
Carter, F.3
-
5
-
-
0141611465
-
Risk of masquerade arising from the storage of biometrics
-
B. S. thesis, Australian National University, Dr. Roger Clarke, supervisor
-
C. J. Hill, Risk of masquerade arising from the storage of biometrics, B. S. thesis, Australian National University, 2001 (Dr. Roger Clarke, supervisor), http://chris.fornax.net/biometrics.html.
-
(2001)
-
-
Hill, C.J.1
-
7
-
-
33947492044
-
From templates to images: Reconstructing fingerprints from minutiae points
-
A. Ross, J, Shah, and A. K. Jain, From templates to images: Reconstructing fingerprints from minutiae points, IEEE Trans. Pattern Anal. Mach. Intell. 29(4):544-560, 2007.
-
(2007)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.29
, Issue.4
, pp. 544-560
-
-
Ross, A.1
Shah, J.2
Jain, A.K.3
-
8
-
-
34548118752
-
Fingerprint image reconstruction from standard templates
-
R. Cappelli, A. Lumini, D. Maio, and D. Maltoni, Fingerprint image reconstruction from standard templates, IEEE Trans. Pattern Anal. Mach. Intell. 29(9):1489-1503, 2007.
-
(2007)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.29
, Issue.9
, pp. 1489-1503
-
-
Cappelli, R.1
Lumini, A.2
Maio, D.3
Maltoni, D.4
-
9
-
-
84889624377
-
Privacy and security issues related to match scores
-
IEEE Workshop on Privacy Research In Vision, CVPRW
-
P. Mohanty, S. Sarkar, and R. Kasturi, Privacy and security issues related to match scores, in IEEE Workshop on Privacy Research In Vision, CVPRW, 2006.
-
(2006)
-
-
Mohanty, P.1
Sarkar, S.2
Kasturi, R.3
-
10
-
-
84889614381
-
-
OECD Directorate for Science, Technology and Industry, Committee for Information, Computer and Communications Policy: Biometric-Based Technologies (June 2004) at
-
OECD Directorate for Science, Technology and Industry, Committee for Information, Computer and Communications Policy: Biometric-Based Technologies (June 2004) at http://appli1.oecd.org/olis/2003doc.nsf/linkto/dsti-iccp-reg(2003)2-fina l.
-
-
-
-
11
-
-
84889614841
-
-
www.bioprivacy.org/bioprivacy main.htm.
-
-
-
-
12
-
-
84889624028
-
-
See, for example, the 27th International Conference of Data Protection and Privacy Commissioners, Montreux (16 September 2005), Resolution on the use of biometrics in passports, identity cards and travel documents
-
See, for example, the 27th International Conference of Data Protection and Privacy Commissioners, Montreux (16 September 2005), Resolution on the use of biometrics in passports, identity cards and travel documents: www.privacyconference2005.org/fileadmin/PDF/biometrie resolution e.pdf
-
-
-
-
13
-
-
84889614314
-
-
See, for example, European Union Article 29 Working Party, Working document on biometrics (August 2003) at
-
See, for example, European Union Article 29 Working Party, Working document on biometrics (August 2003) at: http://ec.europa.eu/justice home/fsj/privacy/docs/wpdocs/2003/wp80 en.pdf
-
-
-
-
14
-
-
84889619597
-
-
See UK Information Commissioner, Data Protection Technical Guidance Note: Privacy enhancing technologies (November 2006) at
-
See UK Information Commissioner, Data Protection Technical Guidance Note: Privacy enhancing technologies (November 2006) at http://tinyurl.com/23b6kc;
-
-
-
-
15
-
-
84889630677
-
-
European Commission Supports PETs: Promoting Data Protection by Privacy Enhancing Technologies (2 May 2007) at
-
European Commission Supports PETs: Promoting Data Protection by Privacy Enhancing Technologies (2 May 2007) at: http://ec.europa.eu/informationsociety/newsroom/cf/itemlongdetail.cfm?it em id=3402;
-
-
-
-
16
-
-
84889623138
-
-
Information and Privacy Commissioner of Ontario & Dutch Registratierkamer, Privacy-Enhancing Technologies: The Path to Anonymity (Volume I, August 1995)
-
Information and Privacy Commissioner of Ontario & Dutch Registratierkamer, Privacy-Enhancing Technologies: The Path to Anonymity (Volume I, August 1995): www.ipc.on.ca/index.asp?layid=86&fid1=329.
-
-
-
-
17
-
-
33947530278
-
Generating cancelable fingerprint templates
-
N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, Generating cancelable fingerprint templates, IEEE Trans. Pattern Anal. Mach. Intelli. 29(4):561-572, 2007.
-
(2007)
IEEE Trans. Pattern Anal. Mach. Intelli.
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.K.1
Chikkerur, S.2
Connell, J.H.3
Bolle, R.M.4
-
18
-
-
20244382052
-
Biometric encryption
-
ICSA Guide to Cryptography, McGraw-Hill, New York
-
C. Soutar, D. Roberge, A. Stoianov, R. Gilroy and B. V. K. Vijaya Kumar, Biometric encryption, in ICSA Guide to Cryptography, McGraw-Hill, New York, 1999.
-
(1999)
-
-
Soutar, C.1
Roberge, D.2
Stoianov, A.3
Gilroy, R.4
Vijaya Kumar, B.V.K.5
-
19
-
-
0031651014
-
On enabling secure applications through off-line biometric identification
-
Oakland, CA
-
G. I. Davida, Y. Frankel, and B.J. Matt, On enabling secure applications through off-line biometric identification, in Proceedings of the IEEE 1998 Symposium on Security and Privacy, Oakland, CA, 1998, pp. 148-157.
-
(1998)
Proceedings of the IEEE 1998 Symposium on Security and Privacy
, pp. 148-157
-
-
Davida, G.I.1
Frankel, Y.2
Matt, B.J.3
-
20
-
-
8844234621
-
On the relation of error correction and cryptography to an off line biometrics based identification scheme
-
Workshop on Coding and Cryptography
-
G. I. Davida,Y. Frankel, B. J. Matt, and R. Peralta, On the relation of error correction and cryptography to an off line biometrics based identification scheme, in Workshop on Coding and Cryptography, 1999, pp. 129-138.
-
(1999)
, pp. 129-138
-
-
Davida, G.I.1
Frankel, Y.2
Matt, B.J.3
Peralta, R.4
-
21
-
-
0033281372
-
Password hardening based on keystroke dynamics
-
Proceedings of Sixth ACM Conference on Computer and Communications Security (CCCS 1999)
-
F. Monrose, M. K. Reiter, and R. Wetzel, Password hardening based on keystroke dynamics, in Proceedings of Sixth ACM Conference on Computer and Communications Security (CCCS 1999), 1999, pp. 73-82.
-
(1999)
, pp. 73-82
-
-
Monrose, F.1
Reiter, M.K.2
Wetzel, R.3
-
22
-
-
0034829626
-
Cryptographic key generation from voice (extended abstract)
-
Proceedings of the 2001 IEEE Symposium on Security and Privacy, May
-
F. Monrose, M. K. Reiter, Q. (Peter) Li, and S. Wetzel, Cryptographic key generation from voice (extended abstract), in Proceedings of the 2001 IEEE Symposium on Security and Privacy, May 2001.
-
(2001)
-
-
Monrose, F.1
Reiter, M.K.2
Li, Q.3
Wetzel, S.4
-
23
-
-
0038628620
-
Password hardening based on keystroke dynamics
-
F. Monrose, M. K. Reiter, and S. Wetzel, Password hardening based on keystroke dynamics, Int. J. Inf. Secur. 1(2):69-83, 2002.
-
(2002)
Int. J. Inf. Secur.
, vol.1
, Issue.2
, pp. 69-83
-
-
Monrose, F.1
Reiter, M.K.2
Wetzel, S.3
-
24
-
-
85084163045
-
Toward speech-generated cryptographic keys on resource constrained devices
-
Proceedings of the 11th USENIX Security Symposium
-
F. Monrose, M. K. Reiter, Q. Li, D. P. Lopresti, and C. Shih, Toward speech-generated cryptographic keys on resource constrained devices, in Proceedings of the 11th USENIX Security Symposium, 2002, pp. 283-296.
-
(2002)
, pp. 283-296
-
-
Monrose, F.1
Reiter, M.K.2
Li, Q.3
Lopresti, D.P.4
Shih, C.5
-
25
-
-
33750799305
-
Robust distance measures for face recognition supporting revocable biometric tokens
-
April 10-12, 2006, IEEE Computer Society,Washington, DC
-
T. Boult, Robust distance measures for face recognition supporting revocable biometric tokens, in Proceedings of the 7th International Conference on Automatic Face and Gesture Recognition (April 10-12, 2006), IEEE Computer Society,Washington, DC, 2006, pp. 560-566.
-
(2006)
Proceedings of the 7th International Conference on Automatic Face and Gesture Recognition
, pp. 560-566
-
-
Boult, T.1
-
26
-
-
34948865766
-
Revocable fingerprint biotokens: Accuracy and security analysis
-
IEEE Conference on Computer Vision and Pattern Recognition, June
-
T. E. Boult, W. J. Scheirer, and R. Woodworth, Revocable fingerprint biotokens: Accuracy and security analysis, IEEE Conference on Computer Vision and Pattern Recognition, June 2007.
-
(2007)
-
-
Boult, T.E.1
Scheirer, W.J.2
Woodworth, R.3
-
27
-
-
27244453175
-
Symmetric hash functions for fingerprint minutiae
-
Springer, Berlin
-
S. Tulyakov, F. Farooq, and V. Govindaraju, Symmetric hash functions for fingerprint minutiae, in Lecture Notes in Computer Science, Vol. 3687, Springer, Berlin, 2005, pp. 30-38.
-
(2005)
Lecture Notes in Computer Science
, vol.3687
, pp. 30-38
-
-
Tulyakov, S.1
Farooq, F.2
Govindaraju, V.3
-
28
-
-
54049105192
-
Fingerprint controlled public key cryptographic system
-
U.S. Patent 5541994, July 30, Priority date: September 7, 1994
-
G. J. Tomko, C. Soutar, and G. J. Schmidt, Fingerprint controlled public key cryptographic system, U.S. Patent 5541994, July 30, 1996 (Priority date: September 7, 1994);
-
(1996)
-
-
Tomko, G.J.1
Soutar, C.2
Schmidt, G.J.3
-
29
-
-
77951619986
-
Biometric controlled key generation
-
U.S. Patent 5680460, October 21, Priority date: September 7, 1994
-
G. J. Tomko, C. Soutar, and G. J. Schmidt, Biometric controlled key generation, U.S. Patent 5680460, October 21, 1997 (Priority date: September 7, 1994).
-
(1997)
-
-
Tomko, G.J.1
Soutar, C.2
Schmidt, G.J.3
-
30
-
-
34547096126
-
System and method for distorting a biometric for transactions with enhanced security and privacy
-
US Patent 6,836,554, December 28, Priority date: June 16, 2000
-
R. M. Bolle, J. H. Connel, and N. K. Ratha, System and method for distorting a biometric for transactions with enhanced security and privacy, US Patent 6,836,554, December 28, 2004 (Priority date: June 16, 2000).
-
(2004)
-
-
Bolle, R.M.1
Connel, J.H.2
Ratha, N.K.3
-
31
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, Biometric cryptosystems: Issues and challenges, Proc. IEEE 92(6):948-960, 2004.
-
(2004)
Proc. IEEE
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.K.4
-
32
-
-
43949116287
-
Biometric template security
-
2008, Article ID 579416
-
A. K. Jain, K. Nandakumar, and A. Nagar, Biometric template security, EURASIP J. Adv. Signal Processing 2008:1-17, 2008, Article ID 579416.
-
(2008)
EURASIP J. Adv. Signal Processing
, pp. 1-17
-
-
Jain, A.K.1
Nandakumar, K.2
Nagar, A.3
-
33
-
-
84892363436
-
Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting
-
Springer-Verlag, London
-
P. Tuyls, B. Skoríc, and T. Kevenaar, editors, Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting, Springer-Verlag, London, 2007.
-
(2007)
-
-
Tuyls, P.1
Skoríc, B.2
Kevenaar, T.3
-
34
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Proceedings, Eurocrypt 2004
-
Y. Dodis, L. Reyzin, and A. Smith, Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, in Proceedings, Eurocrypt 2004, 2004, pp. 523-540.
-
(2004)
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
35
-
-
33747624401
-
Combining crypto with biometrics effectively
-
See also: Technical report No. 640, University of Cambridge, Computer Laboratory, July 2005
-
F. Hao, R. Anderson, and J. Daugman, Combining crypto with biometrics effectively, IEEE Trans. Comput. 55(9): 1081-1088, 2006. (See also: Technical report No. 640, University of Cambridge, Computer Laboratory, July 2005, http://www.cl.cam.ac.uk/TechReports/).
-
(2006)
IEEE Trans. Comput.
, vol.55
, Issue.9
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
36
-
-
0003476270
-
Control Coding: Fundamentals and Applications
-
2nd edition, Prentice Hall, Englewood Cliffs, NJ
-
S. Lin and D. J. Costello, Jr., Error Control Coding: Fundamentals and Applications, 2nd edition, Prentice Hall, Englewood Cliffs, NJ, 2005.
-
(2005)
-
-
Lin, S.1
Costello Jr., D.J.2
-
37
-
-
0003393908
-
Error Control Systems for Digital Communication and Storage
-
Prentice Hall, Englewood Cliffs, NJ
-
S. B. Wicker, Error Control Systems for Digital Communication and Storage, Prentice Hall, Englewood Cliffs, NJ, 1995.
-
(1995)
-
-
Wicker, S.B.1
-
38
-
-
0003855464
-
Applied Cryptography
-
2nd edition, John Wiley & Sons, New York
-
B. Schneier, Applied Cryptography, 2nd edition, John Wiley & Sons, New York, 1996.
-
(1996)
-
-
Schneier, B.1
-
39
-
-
77649250983
-
Secure sketch for biometric templates
-
Springer, Berlin
-
Q. Li, Y. Sutcu, and N. Memon, Secure sketch for biometric templates, in Advances in Cryptology-ASIACRYPT 2006, Lecture Notes in Computer Science, Vol. 4284, Springer, Berlin, 2006, pp. 99-113.
-
(2006)
Advances in Cryptology-ASIACRYPT 2006, Lecture Notes in Computer Science
, vol.4284
, pp. 99-113
-
-
Li, Q.1
Sutcu, Y.2
Memon, N.3
-
40
-
-
0027700869
-
High confidence visual recognition of persons by a test of statistical independence
-
J. G. Daugman, High confidence visual recognition of persons by a test of statistical independence, IEEE Trans. Pattern Anal. Mach. Intelli. 15 (11): 1148-1161, 1993.
-
(1993)
IEEE Trans. Pattern Anal. Mach. Intelli.
, vol.15
, Issue.11
, pp. 1148-1161
-
-
Daugman, J.G.1
-
41
-
-
0036487317
-
The importance of being random: Statistical principles of iris recognition
-
J. Daugman. The importance of being random: Statistical principles of iris recognition, Pattern Recognit. 36(2):279-291, 2003.
-
(2003)
Pattern Recognit.
, vol.36
, Issue.2
, pp. 279-291
-
-
Daugman, J.1
-
42
-
-
84889628183
-
Statistical significance as an aid to system performance evaluation
-
Springer, Berlin
-
P. Tu and R. Hartley, Statistical significance as an aid to system performance evaluation, in Lecture Notes in Computer Science, Vol. 1843/2000, Springer, Berlin, 2000, pp. 366-378.
-
(2000)
Lecture Notes in Computer Science
, vol.1843
, Issue.2000
, pp. 366-378
-
-
Tu, P.1
Hartley, R.2
-
43
-
-
0036685857
-
On the individuality of fingerprints
-
S. Pankanti, S. Prabhakar, and A. Jain, On the individuality of fingerprints, IEEE Trans. Pattern Anal. Mach. Intell. 24(8):1010-1025, 2002.
-
(2002)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.24
, Issue.8
, pp. 1010-1025
-
-
Pankanti, S.1
Prabhakar, S.2
Jain, A.3
-
44
-
-
34548067136
-
Statistical models for assessing the individuality of fingerprints
-
Y. Zhu, S. C. Dass, and A. K. Jain, Statistical models for assessing the individuality of fingerprints, IEEE Trans. Inf. Forens. Secur. 2(3, Part 1):391-401, 2007. also http://www.cse.msu.edu/cgiuser/web/tech/reports?Year=2006.
-
(2007)
IEEE Trans. Inf. Forens. Secur.
, vol.2
, Issue.3 PART 1
, pp. 391-401
-
-
Zhu, Y.1
Dass, S.C.2
Jain, A.K.3
-
45
-
-
84889619792
-
The cotton ball problem, in Biometric Consortium Conference
-
Crystal City, Arlington VA, 20-22 September, Available at
-
J. S. Wayman, The cotton ball problem, in Biometric Consortium Conference, Crystal City, Arlington VA, 20-22 September 2004. Available at http://www.biometrics.org/bc2004/program.htm.
-
(2004)
-
-
Wayman, J.S.1
-
46
-
-
84889616534
-
-
http://bias.csr.unibo.it/fvc2002/; http://bias.csr.unibo.it/fvc2004/.
-
-
-
-
47
-
-
84889621641
-
Information content of biometric features
-
Biometric Consortium Conference, September 19-21, Washington, DC. Available at
-
A. Adler, R.Youmaran, and S. Loyka, Information content of biometric features, in Biometric Consortium Conference 2005, September 19-21, Washington, DC. Available at http://www.sce.carleton.ca/faculty/adler/publications/2005/adler-2005-bi ometrics-conf-entropy.pdf.
-
(2005)
-
-
Adler, A.1
Youmaran, R.2
Loyka, S.3
-
48
-
-
39049165071
-
Towards a measure of biometric information, in Canadian Conference on Computer Electronics and Engineering (CCECE)
-
Ottawa, Canada, May 7-10, Available at, See also Chapter 23 by Youmaran and Adler in the present book
-
R. Youmaran, A. Adler, and S. Loyka, Towards a measure of biometric information, in Canadian Conference on Computer Electronics and Engineering (CCECE), Ottawa, Canada, May 7-10, 2006. Available at http://www.sce.carleton.ca/faculty/adler/publications/2006/youmaran-ccec e2006-biometric-entropy.pdf. See also Chapter 23 by Youmaran and Adler in the present book.
-
(2006)
-
-
Youmaran, R.1
Adler, A.2
Loyka, S.3
-
49
-
-
84889620873
-
NISTIR 7408
-
FRVT 2006 and ICE 2006 large-scale results, National Institute of Standards and Technology, Gaithersburg, MD 20899, March, Available at
-
FRVT 2006 and ICE 2006 large-scale results, in NISTIR 7408, National Institute of Standards and Technology, Gaithersburg, MD 20899, March 2007. Available at http://www.frvt.org/FRVT2006/docs/FRVT2006andICE2006LargeScaleReport.pdf .
-
(2007)
-
-
-
50
-
-
84889611326
-
On the requirements of biometric key generators, Technical Report TR-JHU-SPAR-BKMR-090707
-
John Hopkins University, September 7, Available at
-
L. Ballard, S. Kamara, F. Monrose, and M. Reiter, On the requirements of biometric key generators, Technical Report TR-JHU-SPAR-BKMR-090707, John Hopkins University, September 7, 2007. Available at http://www.cs.jhu.edu/seny/pubs/bkg-req.pdf.
-
(2007)
-
-
Ballard, L.1
Kamara, S.2
Monrose, F.3
Reiter, M.4
-
51
-
-
84889629582
-
Biometrics and cryptography-On biometric keys, their information content and proper use
-
Conference on Biometric Feature Identification and Analysis, Göttingen,7.9, Available at
-
R. Plaga, Biometrics and cryptography-On biometric keys, their information content and proper use, in Conference on Biometric Feature Identification and Analysis, Göttingen,7.9.2007. Available at http://www.stochastik.math.uni-goettingen.de/biometrics2007/talks/Plaga. pdf;
-
(2007)
-
-
Plaga, R.1
-
52
-
-
84863889929
-
Cryptographic Protection of Biometric Templates: Chance, Challenges and Applications
-
Darmstadt, Germany, July, Available at
-
U. Korte, R. Plaga, Cryptographic Protection of Biometric Templates: Chance, Challenges and Applications, in Proceedings of BIOSiG 2007, Darmstadt, Germany, July 2007, pp. 33-45. Available at http://gi.ioport. net/lni276658/GI-Proceedings108.pdf.
-
(2007)
Proceedings of BIOSiG 2007
, pp. 33-45
-
-
Korte, U.1
Plaga, R.2
-
53
-
-
48649102434
-
Optimal iris fuzzy sketches
-
Applications, and Systems, BTAS'07
-
J. Bringer, H. Chabanne, G. Cohen, B. Kindarji, and G. Zemor, Optimal iris fuzzy sketches, in IEEE First International Conference on Biometrics: Theory, Applications, and Systems, BTAS'07, 2007.
-
(2007)
IEEE First International Conference on Biometrics: Theory
-
-
Bringer, J.1
Chabanne, H.2
Cohen, G.3
Kindarji, B.4
Zemor, G.5
-
54
-
-
56749174787
-
Theoretical and practical boundaries of binary secure sketches
-
J. Bringer, H. Chabanne, G. Cohen, B. Kindarji, and G. Zemor, Theoretical and practical boundaries of binary secure sketches, IEEE Trans. Inf. Forens. Secur. 3(4): 673-683, 2008.
-
(2008)
IEEE Trans. Inf. Forens. Secur.
, vol.3
, Issue.4
, pp. 673-683
-
-
Bringer, J.1
Chabanne, H.2
Cohen, G.3
Kindarji, B.4
Zemor, G.5
-
55
-
-
33750920115
-
Synthetic fingerprint-image generation, in Proceedings 15th International Conference on Pattern Recognition (ICPR2000), Barcelona
-
September, See also
-
R. Cappelli, A. Erol, D. Maio, and D. Maltoni, Synthetic fingerprint-image generation, in Proceedings 15th International Conference on Pattern Recognition (ICPR2000), Barcelona, Vol. 3, September 2000. pp. 475-478, See also http://biolab.csr.unibo.it/research.asp.
-
(2000)
, vol.3
, pp. 475-478
-
-
Cappelli, R.1
Erol, A.2
Maio, D.3
Maltoni, D.4
-
56
-
-
33947506091
-
Method for producing a digital signature with aid of a biometric feature
-
German patent DE 42 43 908 A1, June 30, Priority date: Dec. 23, 1992
-
A. Bodo, Method for producing a digital signature with aid of a biometric feature, German patent DE 42 43 908 A1, June 30, 1994 (Priority date: Dec. 23, 1992).
-
(1994)
-
-
Bodo, A.1
-
57
-
-
35248839355
-
New shielding functions to enhance privacy and prevent misuse of biometric templates
-
Proceedings of the 4th International Conference on Audio and Video Based Biometric Person Authentication, Guildford, UK
-
J.-P. Linnartz and P. Tuyls, New shielding functions to enhance privacy and prevent misuse of biometric templates, in Proceedings of the 4th International Conference on Audio and Video Based Biometric Person Authentication, Guildford, UK, 2003, pp. 393-402.
-
(2003)
, pp. 393-402
-
-
Linnartz, J.-P.1
Tuyls, P.2
-
58
-
-
44049084315
-
Template-free biometric-key generation by means of fuzzy genetic clustering
-
W. Sheng, G. Howells, M. Fairhurst, and F. Deravi, Template-free biometric-key generation by means of fuzzy genetic clustering, IEEE Trans. Inf. Forens. Secur. 3(2):183-191, 2008.
-
(2008)
IEEE Trans. Inf. Forens. Secur.
, vol.3
, Issue.2
, pp. 183-191
-
-
Sheng, W.1
Howells, G.2
Fairhurst, M.3
Deravi, F.4
-
60
-
-
77957936325
-
Method and apparatus for securely handling a personal identification number or cryptographic key using biometric techniques
-
U.S. Patent 5712912, January 27, Priority date: July 28, 1995
-
G. J. Tomko and A. Stoianov, Method and apparatus for securely handling a personal identification number or cryptographic key using biometric techniques, U.S. Patent 5712912, January 27, 1998 (Priority date: July 28, 1995).
-
(1998)
-
-
Tomko, G.J.1
Stoianov, A.2
-
61
-
-
77957957939
-
Method for secure key management using a biometric
-
U.S. Patent 6219794, April 17, Priority date: April 21, 1997
-
C. Soutar, D. Roberge, A. V. Stoianov, R. Gilroy, and B. V. K. Vijaya Kumar, Method for secure key management using a biometric, U.S. Patent 6219794, April 17, 2001 (Priority date: April 21, 1997).
-
(2001)
-
-
Soutar, C.1
Roberge, D.2
Stoianov, A.V.3
Gilroy, R.4
Vijaya Kumar, B.V.K.5
-
62
-
-
84932603213
-
Biometric encryption for secure key generation, presentation at the 1998 RSA Data Security Conference
-
San Francisco, January
-
C. Soutar, Biometric encryption for secure key generation, presentation at the 1998 RSA Data Security Conference, San Francisco, January 1998.
-
(1998)
-
-
Soutar, C.1
-
63
-
-
0032224440
-
Biometric encryption using image processing
-
C. Soutar, D. Roberge, A. V. Stoianov, R. Gilroy, and B. V. K. Vijaya Kumar, Biometric encryption using image processing, in Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques II, Vol. 3314, 1998, pp. 178-188.
-
(1998)
Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques II
, vol.3314
, pp. 178-188
-
-
Soutar, C.1
Roberge, D.2
Stoianov, A.V.3
Gilroy, R.4
Vijaya Kumar, B.V.K.5
-
64
-
-
19444368925
-
Biometric encryption-enrollment and verification procedures
-
C. Soutar, D. Roberge, A. V. Stoianov, R. Gilroy, and B. V. K. Vijaya Kumar, Biometric encryption-enrollment and verification procedures, in Proceedings of SPIE, Optical Pattern Recognition IX, Vol. 3386, 1998, pp. 24-35.
-
(1998)
Proceedings of SPIE, Optical Pattern Recognition IX
, vol.3386
, pp. 24-35
-
-
Soutar, C.1
Roberge, D.2
Stoianov, A.V.3
Gilroy, R.4
Vijaya Kumar, B.V.K.5
-
65
-
-
0033281339
-
A fuzzy commitment scheme, in Sixth ACM Conference on Computer and Communications Security
-
ACM Press, New York
-
A. Juels and M. Wattenberg, A fuzzy commitment scheme, in Sixth ACM Conference on Computer and Communications Security, ACM Press, New York, 1999, pp. 28-36.
-
(1999)
, pp. 28-36
-
-
Juels, A.1
Wattenberg, M.2
-
66
-
-
5044251072
-
Reliable biometric authentication with privacy protection
-
Veldhoven, The Netherlands
-
E. Verbitskiy, P. Tuyls, D. Denteneer, and J.-P. Linnartz, Reliable biometric authentication with privacy protection, in Proceedings of the 24th Symposium on Information Theory in the Benelux, Veldhoven, The Netherlands, 2003, pp. 125-132.
-
(2003)
Proceedings of the 24th Symposium on Information Theory in the Benelux
, pp. 125-132
-
-
Verbitskiy, E.1
Tuyls, P.2
Denteneer, D.3
Linnartz, J.-P.4
-
67
-
-
33845435077
-
Capacity and examples of template protecting biometric authentication systems
-
May
-
P. Tuyls and J. Goseling, Capacity and examples of template protecting biometric authentication systems, in Biometric Authentication Workshop, Prague (ECCV2004), May 2004, pp. 158-170.
-
(2004)
Biometric Authentication Workshop, Prague (ECCV2004)
, pp. 158-170
-
-
Tuyls, P.1
Goseling, J.2
-
68
-
-
84979943964
-
Privacy protecting biometric authentication systems: an overview
-
XII European Signal Processing Conference (EUSIPCO 2004, Vienna, Austria)
-
P. Tuyls, E. Verbitskiy, J. Goseling, and D. Denteneer, Privacy protecting biometric authentication systems: an overview, in XII European Signal Processing Conference (EUSIPCO 2004, Vienna, Austria), 2004, pp. 1397-1400.
-
(2004)
, pp. 1397-1400
-
-
Tuyls, P.1
Verbitskiy, E.2
Goseling, J.3
Denteneer, D.4
-
69
-
-
44849118766
-
Privacy protection of biometric templates: Cryptography on noisy data
-
H. F. Revue editors, No. 3
-
P.Tuyls, Privacy protection of biometric templates: Cryptography on noisy data, in H. F. Revue editors, No. 3, 2004, pp. 55-64.
-
(2004)
, pp. 55-64
-
-
Tuyls, P.1
-
70
-
-
80051948713
-
Secret locking: Exploring new approaches to biometric key encapsulation
-
Reading, U.K, Available at
-
S. Kamara, B. de Medeiros, and S. Wetzel, Secret locking: Exploring new approaches to biometric key encapsulation, in Proceedings of the Second International Conference on E-business and Telecommunication Networks (ICETE 2005), Reading, U.K., 2005, pp. 254-261. Available at http://www.cs.jhu.edu/seny/pubs/locking.pdf.
-
(2005)
Proceedings of the Second International Conference on E-business and Telecommunication Networks (ICETE 2005)
, pp. 254-261
-
-
Kamara, S.1
De Medeiros, B.2
Wetzel, S.3
-
71
-
-
0036037919
-
Private key generation from on-line handwritten signatures
-
F. Hao, C. W. Chan, Private key generation from on-line handwritten signatures, Inf. Management Comput. Secur. 10(2):159-164, 2002.
-
(2002)
Inf. Management Comput. Secur.
, vol.10
, Issue.2
, pp. 159-164
-
-
Hao, F.1
Chan, C.W.2
-
72
-
-
84874268218
-
A cryptographic biometric authentication system based on genetic fingerprints
-
LNI P-128, Springer-Verlag, Berlin
-
U. Korte, M. Krawczak, U. Martini, J. Merkle, R. Plaga, M. Niesing, C. Tiemann, and H. Vinck, A cryptographic biometric authentication system based on genetic fingerprints, in Lecture Notes of Informatics, LNI P-128, Springer-Verlag, Berlin, 2008, pp. 263-276.
-
(2008)
Lecture Notes of Informatics
, pp. 263-276
-
-
Korte, U.1
Krawczak, M.2
Martini, U.3
Merkle, J.4
Plaga, R.5
Niesing, M.6
Tiemann, C.7
Vinck, H.8
-
73
-
-
14844335721
-
Reusable cryptographic fuzzy extractors
-
Washington, DC, October, Available at
-
X. Boyen, Reusable cryptographic fuzzy extractors, in 11th ACM Conference on Computer and Communications Security (CCS 2004), Washington, DC, October 2004, pp. 82-91. Available at http://crypto.stanford.edu/xb//ccs04/fuzzysecure.pdf.
-
(2004)
11th ACM Conference on Computer and Communications Security (CCS 2004)
, pp. 82-91
-
-
Boyen, X.1
-
74
-
-
34748924251
-
Fuzzy extractors for continuous distributions
-
Singapore, March
-
I. R. Buhan, J. M. Doumen, P. H. Hartel, and R. N. J. Veldhuis, Fuzzy extractors for continuous distributions, in Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS), Singapore, March 2007, pp. 353-355. See also http://eprints.eemcs.utwente.nl/7693/01/main.pdf.
-
(2007)
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS)
, pp. 353-355
-
-
Buhan, I.R.1
Doumen, J.M.2
Hartel, P.H.3
Veldhuis, R.N.J.4
-
75
-
-
26444507172
-
Practical biometric authentication with template protection
-
AVBPA 2005, Hilton Rye Town, NY, July 20-22, 2005, Lecture Notes in Computer Science, Springer, Berlin
-
P. Tuyls, A. H. M. Akkermans, T. A. M. Kevenaar, G.-J. Schrijen, A. M. Bazen, and R. N. J. Veldhuis, Practical biometric authentication with template protection, in 5th International Conference, AVBPA 2005, Hilton Rye Town, NY, July 20-22, 2005, Lecture Notes in Computer Science, Vol. 3546, Springer, Berlin, 2005, pp. 436-446.
-
(2005)
5th International Conference
, vol.3546
, pp. 436-446
-
-
Tuyls, P.1
Akkermans, A.H.M.2
Kevenaar, T.A.M.3
Schrijen, G.-J.4
Bazen, A.M.5
Veldhuis, R.N.J.6
-
76
-
-
33645656961
-
Face biometrics with renewable templates
-
Security, Steganography, andWatermarking of Multimedia Contents VIII
-
M. van der Veen, T. Kevenaar, G.-J. Schrijen, T. H. Akkermans, and Fei Zuo, Face biometrics with renewable templates, in Proceedings of SPIE, Vol. 6072: Security, Steganography, andWatermarking of Multimedia Contents VIII, 2006.
-
(2006)
Proceedings of SPIE
, vol.6072
-
-
Van Der Veen, M.1
Kevenaar, T.2
Schrijen, G.-J.3
Akkermans, T.H.4
Zuo, F.5
-
77
-
-
84873884975
-
Privacy enhancing technology for a 3D-face recognition system
-
Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 12-13, July 2007, Darmstadt, Germany, Available at
-
X. Zhou, T. A. M.Kevenaar, E.Kelkboom, C. Busch, M. van derVeen, and A. Nouak, Privacy enhancing technology for a 3D-face recognition system, in BIOSIG 2007: Biometrics and Electronic Signatures, Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, 12-13, July 2007, Darmstadt, Germany, 2007, pp. 3-14. Available at http://www.3dface.org/files/papers/zhou-CAST2007-TemplateProtection.pdf.
-
(2007)
BIOSIG 2007: Biometrics and Electronic Signatures
, pp. 3-14
-
-
Zhou, X.1
Kevenaar, T.A.M.2
Kelkboom, E.3
Busch, C.4
Van DerVeen, M.5
Nouak, A.6
-
78
-
-
35649009040
-
Template protection and its implementation in 3D face recognition systems
-
Biometric Technology for Human Identification IV, April, Available at
-
X. Zhou, Template protection and its implementation in 3D face recognition systems, in Proceedings of SPIE, Biometric Technology for Human Identification IV, Vol. 6539, April 2007. Available at http://www.3dface.org/files/papers/zhou-SPIE2007-template-protection.pdf .
-
(2007)
Proceedings of SPIE
, vol.6539
-
-
Zhou, X.1
-
79
-
-
84889613082
-
Spectral representation of fingerprints
-
24-25 May 2007, Enschede, The Netherlands.
-
H. Xu, A. M. Bazen, R. N. J. Veldhuis, T. A. M. Kevenaar, and A. H. M. Akkermans, Spectral representation of fingerprints, in Proceedings of the 28th Symposium on Information Theory in the Benelux, 24-25 May 2007, Enschede, The Netherlands. 2007, pp. 313-319.
-
(2007)
Proceedings of the 28th Symposium on Information Theory in the Benelux
, pp. 313-319
-
-
Xu, H.1
Bazen, A.M.2
Veldhuis, R.N.J.3
Kevenaar, T.A.M.4
Akkermans, A.H.M.5
-
80
-
-
48649088535
-
Multi-bits biometric string generation based on the likelihood ratio
-
Applications and Systems, September 27-29th, Washington DC
-
C. Chen, R. Veldhuis, T. Kevenaar, and T. Akkermans, Multi-bits biometric string generation based on the likelihood ratio, in IEEE Conference on Biometrics: Theory, Applications and Systems, September 27-29th, 2007, Washington DC.
-
(2007)
IEEE Conference on Biometrics: Theory
-
-
Chen, C.1
Veldhuis, R.2
Kevenaar, T.3
Akkermans, T.4
-
81
-
-
11244340682
-
Biometrics-based cryptographic key generation
-
June
-
Y. J. Chang,W. Zhang, and T. Chen, Biometrics-based cryptographic key generation, in IEEE International Conference on Multimedia and Expo (ICME), Vol. 3, June 2004, pp. 2203-2206.
-
(2004)
IEEE International Conference on Multimedia and Expo (ICME)
, vol.3
, pp. 2203-2206
-
-
Chang, Y.J.1
Zhang, W.2
Chen, T.3
-
82
-
-
84889617056
-
Biometrics-based cryptographic key generation system and method
-
US Patent Application 20060083372, Filing Date: 03/11/2005
-
Y. J. Chang, T. Chen, and W. Zhang, Biometrics-based cryptographic key generation system and method, US Patent Application 20060083372, Filing Date: 03/11/2005.
-
-
-
Chang, Y.J.1
Chen, T.2
Zhang, W.3
-
83
-
-
84873903411
-
Robust and secure biometrics: Some application examples
-
Rome, 10-12 October
-
T. Kevenaar, G. J. Schrijen, A. Akkermans, M. Damstra, P. Tuyls, and M. van der Veen, Robust and secure biometrics: Some application examples, in Information Security Solutions Europe (ISSE) Conference, Rome, 10-12 October, 2006.
-
(2006)
Information Security Solutions Europe (ISSE) Conference
-
-
Kevenaar, T.1
Schrijen, G.J.2
Akkermans, A.3
Damstra, M.4
Tuyls, P.5
Van Der Veen, M.6
-
84
-
-
84889621473
-
-
www.3Dface.org.
-
-
-
-
85
-
-
50249148485
-
Towards unattended and privacy protected border control
-
Baltimore, September, Available at
-
C. Busch, A. Nouak, X. Zhou, M. van der Veen, F. Deravi, and J.-M. Suchier, Towards unattended and privacy protected border control, in Proceedings of Biometrics Consortium Conference, Baltimore, September 2007. Available at http://www.3dface.org/files/papers/busch-BSYM2007-towardsunattended-bord er-control.pdf.
-
(2007)
Proceedings of Biometrics Consortium Conference
-
-
Busch, C.1
Nouak, A.2
Zhou, X.3
Van Der Veen, M.4
Deravi, F.5
Suchier, J.-M.6
-
86
-
-
84866781836
-
System, portable device and method for digital authenticating, crypting and signing by generating short-lived cryptokeys
-
US Patent Application 2006/0198514 A1, September 7, Priority date: October 1, 2001
-
J. Lyseggen, R. A. Lauritzsen, and K. G. S. Oyhus, System, portable device and method for digital authenticating, crypting and signing by generating short-lived cryptokeys, US Patent Application 2006/0198514 A1, September 7, 2006 (Priority date: October 1, 2001).
-
-
-
Lyseggen, J.1
Lauritzsen, R.A.2
Oyhus, K.G.S.3
-
87
-
-
84867698856
-
Data processing apparatus and method
-
PCT Patent Application PCT/GB02/00626 (WO02/098053), December 5, Priority date: May 31, 2001
-
G. D. Duffy and W. A. Jones, Data processing apparatus and method, PCT Patent Application PCT/GB02/00626 (WO02/098053), December 5, 2002 (Priority date: May 31, 2001).
-
(2002)
-
-
Duffy, G.D.1
Jones, W.A.2
-
88
-
-
70449614664
-
Constructing practical fuzzy extractors using QIM
-
Technical Report TR-CTIT-07-52 Centre for Telematics and Information Technology, University of Twente, Enschede, Available at
-
I. R. Buhan, J. M. Doumen, P. H. Hartel, and R. N. J. Veldhuis, Constructing practical fuzzy extractors using QIM, Technical Report TR-CTIT-07-52 Centre for Telematics and Information Technology, University of Twente, Enschede, 2007. Available at http://eprints.eemcs.utwente.nl/10785/01/quantizers.pdf.
-
(2007)
-
-
Buhan, I.R.1
Doumen, J.M.2
Hartel, P.H.3
Veldhuis, R.N.J.4
-
89
-
-
0036350106
-
A fuzzy vault scheme
-
2002 IEEE International Symposium on Information Theory, Piscataway, NJ
-
A. Juels and M. Sudan, A fuzzy vault scheme, in Proceedings, 2002 IEEE International Symposium on Information Theory, Piscataway, NJ, 2002, p. 408.
-
(2002)
Proceedings
, pp. 408
-
-
Juels, A.1
Sudan, M.2
-
90
-
-
84937704662
-
Secure smartcard-based fingerprint authentication
-
Biometrics Methods and Applications Workshop (WBMA'03), Berkeley, CA, November
-
T. C. Clancy, N. Kiyavash, and D. J. Lin, Secure smartcard-based fingerprint authentication, in Proceedings, ACMSIGMM 2003 Multimedia, Biometrics Methods and Applications Workshop (WBMA'03), Berkeley, CA, November 2003, pp. 45-52.
-
(2003)
Proceedings, ACMSIGMM 2003 Multimedia
, pp. 45-52
-
-
Clancy, T.C.1
Kiyavash, N.2
Lin, D.J.3
-
91
-
-
26444525625
-
Fuzzy vault for fingerprints
-
Hilton Rye Town, NY, 20-22 July 2005, Springer, Berlin
-
U. Uludag, S. Pankanti, and A. K. Jain, Fuzzy vault for fingerprints, in AVBPA 2005:Audio-and Video-Based Biometric Person Authentication (Hilton Rye Town, NY, 20-22 July 2005), Vol. 3546, Springer, Berlin, 2005, pp. 310-319.
-
(2005)
AVBPA 2005:Audio-and Video-Based Biometric Person Authentication
, vol.3546
, pp. 310-319
-
-
Uludag, U.1
Pankanti, S.2
Jain, A.K.3
-
92
-
-
21644442033
-
Secure fuzzy vault based fingerprint verification system
-
Systems, and Computers (2004)
-
S. Yang and I. Verbauwhede, Secure fuzzy vault based fingerprint verification system. in Thirty-Eighth Asilomar Conference on Signals, Systems, and Computers (2004), Vol. 1, 2004, pp. 577-581.
-
(2004)
Thirty-Eighth Asilomar Conference on Signals
, vol.1
, pp. 577-581
-
-
Yang, S.1
Verbauwhede, I.2
-
93
-
-
50249122051
-
Fingerprint alignment for a minutiae-based fuzzy vault
-
Baltimore, September
-
J. Jeffers and A. Arakala, Fingerprint alignment for a minutiae-based fuzzy vault, in Biometric Consortium Conference, Baltimore, September 2007.
-
(2007)
Biometric Consortium Conference
-
-
Jeffers, J.1
Arakala, A.2
-
94
-
-
36348986198
-
Fingerprint-based fuzzy vault: Implementation and performance
-
Available at
-
K. Nandakumar, A. K. Jain, and S. C. Pankanti, Fingerprint-based fuzzy vault: Implementation and performance, IEEE Trans. Inf. Forens. Secur. 2(4):744-757, 2007. Available at http://biometrics.cse.msu.edu/Publications/SecureBiometrics/NandakumarJa inPankanti FpFuzzyVault TIFS07.pdf.
-
(2007)
IEEE Trans. Inf. Forens. Secur.
, vol.2
, Issue.4
, pp. 744-757
-
-
Nandakumar, K.1
Jain, A.K.2
Pankanti, S.C.3
-
95
-
-
37849009414
-
Hardening fingerprint fuzzy vault using password
-
Seoul, Korea, August 27-29, Lecture Notes in Computer Science, 4642/2007, Springer, 2007, Available at
-
K. Nandakumar, A. Nagar, and A. K. Jain, Hardening fingerprint fuzzy vault using password, in Proceedings of ICB 2007, Seoul, Korea, August 27-29, 2007, Lecture Notes in Computer Science, 4642/2007, Springer, 2007, pp. 927-937. Available at http://biometrics.cse.msu.edu/Publications/SecureBiometrics/NandakumarNa garJain FpFuzzyVaultHardening ICB2007.pdf.
-
(2007)
Proceedings of ICB 2007
, pp. 927-937
-
-
Nandakumar, K.1
Nagar, A.2
Jain, A.K.3
-
96
-
-
33747674301
-
Cryptographic key generation using handwritten signature
-
Proc. SPIE, Orlando, FL, April, Available at
-
M. Freire-Santos, J. Fierrez-Aguilar, and J.Ortega-Garcia, Cryptographic key generation using handwritten signature, in Defense and Security Symposium, Biometric Technologies for Human Identification (BTHI), Proc. SPIE, Vol. 6202, Orlando, FL, April 2006, pp. 225-231. Available at http://atvs.ii.uam.es/files/2006 SPIE KeyGenSignatureFreire.pdf.
-
(2006)
Defense and Security Symposium, Biometric Technologies for Human Identification (BTHI)
, vol.6202
, pp. 225-231
-
-
Freire-Santos, M.1
Fierrez-Aguilar, J.2
Ortega-Garcia, J.3
-
98
-
-
37849013877
-
Biometric key binding: Fuzzy vault based on iris images
-
Lecture Notes in Computer Science
-
Y. J. Lee, K. Bae, S. J. Lee, K. R. Park, and J. Kim, Biometric key binding: Fuzzy vault based on iris images, in Proceedings of 2nd International Conference on Biometrics, Seoul, South Korea (August 2007), Lecture Notes in Computer Science, Vol. 4642, 2007, pp. 800-808.
-
(2007)
Proceedings of 2nd International Conference on Biometrics, Seoul, South Korea (August 2007)
, vol.4642
, pp. 800-808
-
-
Lee, Y.J.1
Bae, K.2
Lee, S.J.3
Park, K.R.4
Kim, J.5
-
99
-
-
50249133245
-
Fuzzy vault for face based cryptographic key generation
-
Baltimore, September
-
Y. Wang and K. N. Plataniotis, Fuzzy vault for face based cryptographic key generation, in Biometric Consortium Conference, Baltimore, September 2007.
-
(2007)
Biometric Consortium Conference
-
-
Wang, Y.1
Plataniotis, K.N.2
-
100
-
-
33747661750
-
Secret sharing using biometric traits
-
Orlando, FL (April 17, 2006), Proceedings of SPIE
-
A. Kholmatov, B. Yanikoglu, E. Savas, and A. Levi, Secret sharing using biometric traits, in Biometric Technology for Human Identification III, Orlando, FL (April 17, 2006), Proceedings of SPIE, Vol. 6202, 2006, pp. 62020W1-9.
-
(2006)
Biometric Technology for Human Identification III
, vol.6202
-
-
Kholmatov, A.1
Yanikoglu, B.2
Savas, E.3
Levi, A.4
-
101
-
-
35248868841
-
Computation of cryptographic keys from face biometrics
-
Lecture Notes in Computer Science (LNCS), Vol. 2828, Springer, Berlin
-
A. Goh and D. C. L. Ngo, Computation of cryptographic keys from face biometrics, in International Federation for Information Processing 2003. Lecture Notes in Computer Science (LNCS), Vol. 2828, Springer, Berlin, 2003, pp. 1-13.
-
(2003)
International Federation for Information Processing 2003
, pp. 1-13
-
-
Goh, A.1
Ngo, D.C.L.2
-
102
-
-
8344273612
-
Personalised cryptographic key generation based on FaceHashing
-
A. B. J. Teoh, D. C. L. Ngo,, and A. Goh, Personalised cryptographic key generation based on FaceHashing, Comput. Secur. 23:606-614, 2004.
-
(2004)
Comput. Secur.
, vol.23
, pp. 606-614
-
-
Teoh, A.B.J.1
Ngo, D.C.L.2
Goh, A.3
-
103
-
-
43949117579
-
Application-specific key release scheme from biometrics
-
O. T. Song, A. Teoh, and D. C. L. Ngo, Application-specific key release scheme from biometrics, Int. J. Network Secur. 6(2):127-133, 2008;
-
(2008)
Int. J. Network Secur.
, vol.6
, Issue.2
, pp. 127-133
-
-
Song, O.T.1
Teoh, A.2
Ngo, D.C.L.3
-
105
-
-
84962074661
-
Secure biometrics via syndromes
-
Control and Computing. Monticello, IL, September, Available at
-
E. Martinian, S. Yekhanin, and J. S. Yedidia, Secure biometrics via syndromes, in Allerton Conference on Communications, Control and Computing. Monticello, IL, September 2005. Available at http://www.merl.com/reports/docs/TR2005-112.pdf.
-
(2005)
Allerton Conference on Communications
-
-
Martinian, E.1
Yekhanin, S.2
Yedidia, J.S.3
-
106
-
-
52349091161
-
Secure storage of fingerprint biometrics using Slepian-Wolf codes
-
Work, UCSD, San Diego, CA, Jan., Available at
-
S. C. Draper, A. Khisti, E. Martinian, A. Vetro, and J. S. Yedidia, Secure storage of fingerprint biometrics using Slepian-Wolf codes, in Inform. Theory and Apps. Work, UCSD, San Diego, CA, Jan. 2007. Available at http://www.merl.com/reports/docs/TR2007-006.pdf.
-
(2007)
Inform. Theory and Apps.
-
-
Draper, S.C.1
Khisti, A.2
Martinian, E.3
Vetro, A.4
Yedidia, J.S.5
-
107
-
-
34547512147
-
Using distributed source coding to secure fingerprint biometrics
-
Speech and Signal Processing (ICASSP), April, Available at
-
S. C. Draper, A. Khisti, E. Martinian, A. Vetro and J. S. Yedidia, Using distributed source coding to secure fingerprint biometrics, in Proc. of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Vol. 2, April 2007, pp. 129-132. Available at http://www.merl.com/reports/docs/TR2007-005.pdf.
-
(2007)
Proc. of IEEE International Conference on Acoustics
, vol.2
, pp. 129-132
-
-
Draper, S.C.1
Khisti, A.2
Martinian, E.3
Vetro, A.4
Yedidia, J.S.5
-
108
-
-
77957960870
-
Cryptographic key generation using biometric data
-
U.S. Patent 6035398, March 7, Priority date: November 14, 1997
-
V. Bjorn, Cryptographic key generation using biometric data, U.S. Patent 6035398, March 7, 2000 (Priority date: November 14, 1997).
-
-
-
Bjorn, V.1
-
109
-
-
84889626553
-
A biometric identity based signature scheme
-
Columbia University, New York
-
A. Burnett, F. Byrne, T. Dowling, and A. Duffy, A biometric identity based signature scheme, in Applied Cryptography and Network Security Conference, Columbia University, New York, 2005.
-
(2005)
Applied Cryptography and Network Security Conference
-
-
Burnett, A.1
Byrne, F.2
Dowling, T.3
Duffy, A.4
-
110
-
-
77951610286
-
A schema for cryptographic keys generation using hybrid biometrics
-
Networking and Broadcasting, 26-27 June, Liverpool, UK
-
K. Voderhobli, C. Pattinson, and H. Donelan, A schema for cryptographic keys generation using hybrid biometrics, in 7th Annual Postgraduate Symposium: The Convergence of Telecommunications, Networking and Broadcasting, 26-27 June 2006, Liverpool, UK.
-
(2006)
7th Annual Postgraduate Symposium: The Convergence of Telecommunications
-
-
Voderhobli, K.1
Pattinson, C.2
Donelan, H.3
-
111
-
-
67649170200
-
Virtual PIN: Biometric encryption using coding theory
-
24th July, Darmstadt, Germany, 2003
-
U. Martini and S. Beinlich, Virtual PIN: Biometric encryption using coding theory, in Proceedings of the 1st Conference on Biometrics and Electronic Signatures of the GI Working Group BIOSIG, 24th July 2003, Darmstadt, Germany, 2003, pp. 91-99.
-
(2003)
Proceedings of the 1st Conference on Biometrics and Electronic Signatures of the GI Working Group BIOSIG
, pp. 91-99
-
-
Martini, U.1
Beinlich, S.2
-
112
-
-
78549296163
-
A novel biometric key scheme
-
Available at
-
Q. Li, X. Niu, and S. Sun, A novel biometric key scheme, Chinese J. Electron. 2005. Available at http://www.paper.edu.cn.
-
(2005)
Chinese J. Electron.
-
-
Li, Q.1
Niu, X.2
Sun, S.3
-
113
-
-
34548292447
-
How to protect biometric templates
-
January 2007, San Jose, CA, Proc. of SPIE
-
Y. Sutcu, Q. Li, and N. Memon, How to protect biometric templates, in SPIE Conference on Security, Steganography and Watermarking of Multimedia Contents IX, January 2007, San Jose, CA, Proc. of SPIE, Vol. 6505, 2007;
-
(2007)
SPIE Conference on Security, Steganography and Watermarking of Multimedia Contents IX
, vol.6505
-
-
Sutcu, Y.1
Li, Q.2
Memon, N.3
-
114
-
-
69949122147
-
Design and analysis of fuzzy extractors for faces
-
73061X-12
-
Y. Sutcu, Q. Li, and N. Memon, Design and analysis of fuzzy extractors for faces, in Proc. of SPIE, 7306: 73061X-1-73061X-12, 2009.
-
(2009)
Proc. of SPIE
, vol.7306
-
-
Sutcu, Y.1
Li, Q.2
Memon, N.3
-
115
-
-
34147129600
-
Cryptographic key generation from biometric data using lattice mapping
-
20-24 August 2006
-
G. Zheng, W. Li, and C. Zhan, Cryptographic key generation from biometric data using lattice mapping, in 18th International Conference on Pattern Recognition (ICPR 2006), 20-24 August 2006, 4, 2006, pp. 513-516.
-
(2006)
18th International Conference on Pattern Recognition (ICPR 2006)
, vol.4
, pp. 513-516
-
-
Zheng, G.1
Li, W.2
Zhan, C.3
-
116
-
-
77951574489
-
Coding solutions for the secure biometric storage problem
-
Technical report
-
D. Schipani and J. Rosenthal, Coding solutions for the secure biometric storage problem, Technical report, 2007, http://arxiv.org/PScache/cs/pdf/0701/0701102v1.pdf.
-
(2007)
-
-
Schipani, D.1
Rosenthal, J.2
-
117
-
-
84889611556
-
Method of biometric authentication
-
US Patent 7272245 September 18, Priority date: 05/13/2004
-
W. J. Layton, Method of biometric authentication, US Patent 7272245 September 18, 2007 (Priority date: 05/13/2004).
-
(2007)
-
-
Layton, W.J.1
-
118
-
-
1642298729
-
Best practices in testing and reporting performance of biometric devices
-
NPL Report CMSC 14/02, August
-
A. J. Mansfield and J. L. Wayman, Best practices in testing and reporting performance of biometric devices, NPL Report CMSC 14/02, August 2002. http://www.cesg.gov.uk/site/ast/biometrics/media/BestPractice.pdf.
-
(2002)
-
-
Mansfield, A.J.1
Wayman, J.L.2
-
119
-
-
33744779400
-
Biometrics: A tool for information security
-
A. K. Jain, A. Ross, and S. Pankanti, Biometrics: A tool for information security, IEEE Trans. Info. Forens. Secur. 1(2):125-143, 2006.
-
(2006)
IEEE Trans. Info. Forens. Secur.
, vol.1
, Issue.2
, pp. 125-143
-
-
Jain, A.K.1
Ross, A.2
Pankanti, S.3
-
120
-
-
0036887662
-
Biometric perils and patches
-
R. M. Bolle, J. H. Connel, and N. K. Ratha, Biometric perils and patches, Pattern Recognit. 35(12):2727-2738, 2002.
-
(2002)
Pattern Recognit.
, vol.35
, Issue.12
, pp. 2727-2738
-
-
Bolle, R.M.1
Connel, J.H.2
Ratha, N.K.3
-
121
-
-
33947529940
-
Cancelable biometrics: A case study in fingerprints
-
20-24 August 2006, Hong Kong, China, ICPR
-
N. K. Ratha, J. Connell, R. M. Bolle, and S. Chikkerur, Cancelable biometrics: A case study in fingerprints, in Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 20-24 August 2006, Hong Kong, China, ICPR (4), 2006, pp. 370-373.
-
(2006)
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006)
, Issue.4
, pp. 370-373
-
-
Ratha, N.K.1
Connell, J.2
Bolle, R.M.3
Chikkerur, S.4
-
122
-
-
33646095185
-
An analysis of Biohashing and its variants
-
A. Kong, K.-H. Cheung, D. Zhang, M. Kamel, and J. You, An analysis of Biohashing and its variants, Pattern Recognit. 39(7):1359-1368, 2006.
-
(2006)
Pattern Recognit.
, vol.39
, Issue.7
, pp. 1359-1368
-
-
Kong, A.1
Cheung, K.-H.2
Zhang, D.3
Kamel, M.4
You, J.5
-
123
-
-
12344259813
-
Biohashing: Two factor authentication featuring fingerprint data and tokenised random number
-
A. Teoh, D. Ngo,, and A. Goh, Biohashing: Two factor authentication featuring fingerprint data and tokenised random number, Pattern Recognit. 37:2245-2255, 2004.
-
(2004)
Pattern Recognit.
, vol.37
, pp. 2245-2255
-
-
Teoh, A.1
Ngo, D.2
Goh, A.3
-
124
-
-
9944223229
-
PalmHashing: A novel approach for cancelable biometrics
-
T. Connie, A. Teoh, M. Goh,, and D. Ngo, PalmHashing: A novel approach for cancelable biometrics, Inf. Processing Lett. 93:1-5, 2005.
-
(2005)
Inf. Processing Lett.
, vol.93
, pp. 1-5
-
-
Connie, T.1
Teoh, A.2
Goh, M.3
Ngo, D.4
-
125
-
-
33746368690
-
Biometric hash: High-confidence face recognition
-
D. C. L. Ngo, A. B. J. Teoh, and A. Goh, Biometric hash: High-confidence face recognition, IEEE Transactions on circuits and systems for video technology 16(6):771-775, 2006.
-
(2006)
IEEE Transactions on circuits and systems for video technology
, vol.16
, Issue.6
, pp. 771-775
-
-
Ngo, D.C.L.1
Teoh, A.B.J.2
Goh, A.3
-
126
-
-
33644662906
-
Recognition using robust bit extraction
-
043016-11
-
D. C. L. Ngo, A. Goh, and A. B. J. Teoh, Recognition using robust bit extraction, J. Electron. Imaging 14(4):043016-1-043016-11, 2005.
-
(2005)
J. Electron. Imaging
, vol.14
, Issue.4
, pp. 043016-1
-
-
Ngo, D.C.L.1
Goh, A.2
Teoh, A.B.J.3
-
127
-
-
33947411232
-
Replaceable and securely hashed keys from online signatures
-
W. K. Yip, A. B. J. Teoh, and D. C. L. Ngo, Replaceable and securely hashed keys from online signatures. IEICE Electronics Express 3(18):410-416, 2006.
-
(2006)
IEICE Electronics Express
, vol.3
, Issue.18
, pp. 410-416
-
-
Yip, W.K.1
Teoh, A.B.J.2
Ngo, D.C.L.3
-
128
-
-
33846224825
-
Secure hashing of dynamic hand signatures using wavelet-Fourier compression with BioPhasor mixing and 2N discretization
-
Article ID 59125
-
W. K. Yip, A. B. J. Teoh, and D. C. L. Ngo, Secure hashing of dynamic hand signatures using wavelet-Fourier compression with BioPhasor mixing and 2N discretization, EURASIP J. Adv. Signal Processing, Vol. 2007, Article ID 59125, 8 pages, 2007.
-
(2007)
EURASIP J. Adv. Signal Processing
, vol.2007
, pp. 8
-
-
Yip, W.K.1
Teoh, A.B.J.2
Ngo, D.C.L.3
-
129
-
-
35148885090
-
Cancelable biometrics realization with multispace random projections
-
A. B. J. Teoh and C. T. Yuang, Cancelable biometrics realization with multispace random projections, IEEE Trans. Syst. Man. Cybern. Part B: Cybernetics 37(5):1096-1106, 2007.
-
(2007)
IEEE Trans. Syst. Man. Cybern. Part B: Cybernetics
, vol.37
, Issue.5
, pp. 1096-1106
-
-
Teoh, A.B.J.1
Yuang, C.T.2
-
130
-
-
33744964477
-
Revealing the secret of FaceHashing
-
Lecture Notes in Computer Science, Springer, Berlin, Available at
-
K. H. Cheung, B. Kong, D. Zhang, M. Kamel, and J. You, Revealing the secret of FaceHashing, in Proceedings of International Conference on Biometrics (ICB 2006), Lecture Notes in Computer Science, Vol. 3832, Springer, Berlin, 2006, pp. 106-112. Available at http://staffx.webstore.ntu.edu.sg/personal/adamskong/Shared%20Documents/ publication/FaceHashingICBA2006.pdf.
-
(2006)
Proceedings of International Conference on Biometrics (ICB 2006)
, vol.3832
, pp. 106-112
-
-
Cheung, K.H.1
Kong, B.2
Zhang, D.3
Kamel, M.4
You, J.5
-
131
-
-
33750533142
-
An improved BioHashing for human authentication
-
Available at
-
A. Lumini and L. Nanni, An improved BioHashing for human authentication, Pattern Recognit. 40(3): 1057-1065, 2006. Available at http://bias.csr.unibo.it/gpubs/docs/2006 BioH.zip.
-
(2006)
Pattern Recognit.
, vol.40
, Issue.3
, pp. 1057-1065
-
-
Lumini, A.1
Nanni, L.2
-
132
-
-
33745212257
-
An advanced multi-modal method for human authentication featuring biometrics data and tokenised random numbers
-
August, Available at
-
A. Lumini and L. Nanni, An advanced multi-modal method for human authentication featuring biometrics data and tokenised random numbers, NeuroComputing 69(13):1706-1710, August 2006. Available at http://bias.csr.unibo.it/gpubs/docs/2006AMM NeuroC.zip.
-
(2006)
NeuroComputing
, vol.69
, Issue.13
, pp. 1706-1710
-
-
Lumini, A.1
Nanni, L.2
-
133
-
-
50249156015
-
Face based biometric authentication with changeable and privacy preservable templates
-
Baltimore, September
-
Y. Wang and K. N. Plataniotis, Face based biometric authentication with changeable and privacy preservable templates, in Biometric Consortium Conference, Baltimore, September 2007.
-
(2007)
Biometric Consortium Conference
-
-
Wang, Y.1
Plataniotis, K.N.2
-
134
-
-
33646813118
-
Application-specific biometric templates
-
Tarrytown, NY, March 14-15
-
M. Braithwaite, U. C. von Seelen, J. Cambier, J. Daugman, R. Glass, R. Moore, and I. Scott, Application-specific biometric templates, in IEEE Workshop on Automatic Identification Advanced Technologies, Tarrytown, NY, March 14-15, 2002, pp. 167-171.
-
(2002)
IEEE Workshop on Automatic Identification Advanced Technologies
, pp. 167-171
-
-
Braithwaite, M.1
Von Seelen, U.C.2
Cambier, J.3
Daugman, J.4
Glass, R.5
Moore, R.6
Scott, I.7
-
135
-
-
84874156152
-
A method and a system for biometric identification or verification
-
Swedish Patent 0202147-5. Priority date: July 9, 2002. PCT Patent Application WO 2004/006495, PCT/SE2003/001181. US Patent Application US2005/0210269 A1, September 22
-
M. Tiberg, A method and a system for biometric identification or verification, Swedish Patent 0202147-5. Priority date: July 9, 2002. PCT Patent Application WO 2004/006495, PCT/SE2003/001181. US Patent Application US2005/0210269 A1, September 22, 2005.
-
(2005)
-
-
Tiberg, M.1
-
136
-
-
10044284550
-
Cancelable biometric filters for face recognition
-
Cambridge, England
-
M. Savvides, B. V. K. Vijaya Kumar, and P. K. Khosla, Cancelable biometric filters for face recognition, in Proceedings of the 17th International Conference on Pattern Recognition (ICPR'04), Cambridge, England, Vol. 3, 2004, pp. 922-925.
-
(2004)
Proceedings of the 17th International Conference on Pattern Recognition (ICPR'04)
, vol.3
, pp. 922-925
-
-
Savvides, M.1
Vijaya Kumar, B.V.K.2
Khosla, P.K.3
-
137
-
-
27244453175
-
Symmetric hash functions for fingerprint minutiae
-
Springer, Berlin
-
S. Tulyakov, F. Farooq, and V. Govindaraju, Symmetric hash functions for fingerprint minutiae, in Lecture Notes in Computer Science, Vol. 3687, Springer, Berlin, 2005, pp. 30-38.
-
(2005)
Lecture Notes in Computer Science
, vol.3687
, pp. 30-38
-
-
Tulyakov, S.1
Farooq, F.2
Govindaraju, V.3
-
138
-
-
38149109053
-
Fingerprint hardening with randomly selected chaff minutiae
-
Lecture Notes in Computer Science, Springer, Berlin
-
A. Kanak and I. Sogukpinar, Fingerprint hardening with randomly selected chaff minutiae, in Computer Analysis of Images and Patterns (CAIP 2007), Lecture Notes in Computer Science, Vol. 4673, Springer, Berlin, 2007, pp. 383-390.
-
(2007)
Computer Analysis of Images and Patterns (CAIP 2007
, vol.4673
, pp. 383-390
-
-
Kanak, A.1
Sogukpinar, I.2
-
139
-
-
84872865003
-
Secure short-key cryptosystems: Forty bits is enough
-
NEC Research Institute Technical Report, Available at
-
S. Buss and P. N. Yianilos, Secure short-key cryptosystems: Forty bits is enough, NEC Research Institute Technical Report, 1999. Available at http://www.intermemory.org/pny/papers/sk/sk.pdf.
-
(1999)
-
-
Buss, S.1
Yianilos, P.N.2
-
141
-
-
26444554928
-
Vulnerabilities in biometric encryption systems
-
Tarrytown, NY. Lecture Notes in Computer Science, Springer, Berlin, Available at
-
A. Adler, Vulnerabilities in biometric encryption systems, in Audio-and Video-Based Biometric Person Authentication (AVBPA2005), Tarrytown, NY. Lecture Notes in Computer Science, Vol. 3546, Springer, Berlin, 2005, pp. 1100-1109. Available at http://www.sce.carleton.ca/faculty/adler/publications/2005/adler-2005-AV BPA-biometric-encryption.pdf.
-
(2005)
Audio-and Video-Based Biometric Person Authentication (AVBPA2005)
, vol.3546
, pp. 1100-1109
-
-
Adler, A.1
-
142
-
-
34247366845
-
Finding the original point set hidden among chaff
-
March 21-24, 2006, Taipei, Taiwan
-
E.-C. Chang, R. Shen, and F. W. Teo, Finding the original point set hidden among chaff, in Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security (ASIACCS'06), March 21-24, 2006, Taipei, Taiwan, 2006, pp. 182-188.
-
(2006)
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security (ASIACCS'06)
, pp. 182-188
-
-
Chang, E.-C.1
Shen, R.2
Teo, F.W.3
-
143
-
-
50249107013
-
Cracking fuzzy vaults and biometric encryption
-
Baltimore, September, Available at
-
W. J. Scheirer and T. E. Boult, Cracking fuzzy vaults and biometric encryption, in Biometric Consortium Conference, Baltimore, September 2007. Available at http://vast.uccs.edu/tboult/PAPERS/Scheirer-Boult-BCC07-Crack-Fuzzy-Vaul t.pdf.
-
(2007)
Biometric Consortium Conference
-
-
Scheirer, W.J.1
Boult, T.E.2
-
144
-
-
60749108051
-
An analysis on invertibility of cancelable biometrics based on biohashing
-
Systems, and Technology, Available at
-
K.-H. Cheung, A. Kong, J. You, and D. Zhang, An analysis on invertibility of cancelable biometrics based on biohashing, in Proceedings of the 2005 International Conference on Imaging Science, Systems, and Technology, 2005, pp. 40-45. Available at http://staffx.webstore.ntu.edu.sg/personal/adamskong/Shared%20Documents/ publication/IMCSE2005paperCIS3056.pdf.
-
(2005)
Proceedings of the 2005 International Conference on Imaging Science
, pp. 40-45
-
-
Cheung, K.-H.1
Kong, A.2
You, J.3
Zhang, D.4
-
145
-
-
31344447750
-
Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
-
K. Liu, H. Kargupta, and J. Ryan, Random projection-based multiplicative data perturbation for privacy preserving distributed data mining, IEEE Trans. Knowledge and Data Eng. 18(1):92-106, 2006.
-
(2006)
IEEE Trans. Knowledge and Data Eng.
, vol.18
, Issue.1
, pp. 92-106
-
-
Liu, K.1
Kargupta, H.2
Ryan, J.3
-
146
-
-
56349139535
-
The best of both worlds: applying secure sketches to cancelable biometrics
-
Luxembourg, September 20-21, 2007. Science of Computer Programming
-
J. Bringer, H. Chabanne, and B. Kindarji, The best of both worlds: applying secure sketches to cancelable biometrics, in 2nd Benelux Workshop on Information and System Security (WISSec'07), Luxembourg, September 20-21, 2007. Science of Computer Programming, 74(1-2):43-51, 2008.
-
(2008)
2nd Benelux Workshop on Information and System Security (WISSec'07)
, vol.74
, Issue.1-2
, pp. 43-51
-
-
Bringer, J.1
Chabanne, H.2
Kindarji, B.3
-
147
-
-
70350248997
-
Implications of Biometric Encryption on wide spread use of biometrics
-
Presentation at the EBF Biometric Encryption Seminar, Amsterdam, NL, 24 June
-
F. Carter and A. Stoianov, Implications of Biometric Encryption on wide spread use of biometrics. Presentation at the EBF Biometric Encryption Seminar, Amsterdam, NL, 24 June 2008. http://www.eubiometricsforum.com/pdfs/be/BE-Carter Stoianov.pdf.
-
(2008)
-
-
Carter, F.1
Stoianov, A.2
-
148
-
-
84889614524
-
-
The concept of anonymous database using BE was proposed by Tomko: Method and apparatus for securely handling data in a database of biometrics and associated data. U.S. Patent 5790668 to G. J. Tomko, August 4, 1998 (Priority date: December 19, 1995)
-
The concept of anonymous database using BE was proposed by Tomko: Method and apparatus for securely handling data in a database of biometrics and associated data. U.S. Patent 5790668 to G. J. Tomko, August 4, 1998 (Priority date: December 19, 1995).
-
-
-
-
149
-
-
45449114377
-
An authentication protocol with encrypted biometric data
-
June 11-14, 2008, Lecture Notes in Computer Science, Springer, Berlin
-
J. Bringer and H. Chabanne, An authentication protocol with encrypted biometric data, in AFRICACRYPT, Casablanca, Morocco, June 11-14, 2008, Lecture Notes in Computer Science, Vol. 5023, Springer, Berlin, 2008, pp. 109-124.
-
(2008)
AFRICACRYPT, Casablanca, Morocco
, vol.5023
, pp. 109-124
-
-
Bringer, J.1
Chabanne, H.2
-
150
-
-
84892356135
-
Computationally secure authentication with noisy data
-
P. Tuyls, B. Skoríc, and T. Kevenaar, editors, Secure Key Storage and Anti-Counterfeiting, Springer-Verlag, London
-
B. Schoenmakers and P Tuyls, Computationally secure authentication with noisy data, in P. Tuyls, B. Skoríc, and T. Kevenaar, editors, Security with Noisy Data: Private Biometrics, Secure Key Storage and Anti-Counterfeiting, Springer-Verlag, London, 2007, pp. 141-149.
-
(2007)
Security with Noisy Data: Private Biometrics
, pp. 141-149
-
-
Schoenmakers, B.1
Tuyls, P.2
-
151
-
-
84889613867
-
-
http://www.turbine-project.org/.
-
-
-
-
152
-
-
84889623580
-
TURBINE: background and status-ISO standardization initiative
-
Amsterdam, June 24
-
C. Busch, TURBINE: background and status-ISO standardization initiative, in EBF Biometric Encryption Seminar, Amsterdam, June 24, 2008. http://www.eubiometricsforum.com/pdfs/be/BEBusch.pdf.
-
(2008)
EBF Biometric Encryption Seminar
-
-
Busch, C.1
-
153
-
-
54049089250
-
Pseudo identities based on fingerprint characteristics
-
August 15-17, Harbin, China
-
N. Delvaux, J. Bringer, J. Grave,K. Kratsev, P. Lindeberg, J. Midgren, J. Breebaart, T. Akkermans, M. van der Veen, R. Veldhuis, E. Kindt, K. Simoens, C. Busch, P. Bours, D. Gafurov, B. Yang, J. Stern, C. Rust, B. Cucinelli, and D. Skepastianos, Pseudo identities based on fingerprint characteristics, in IEEE 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), August 15-17, Harbin, China, pp. 1063-1068, 2008.
-
(2008)
IEEE 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008)
, pp. 1063-1068
-
-
Delvaux, N.1
Bringer, J.2
Grave, J.3
Kratsev, K.4
Lindeberg, P.5
Midgren, J.6
Breebaart, J.7
Akkermans, T.8
Van Der Veen, M.9
Veldhuis, R.10
Kindt, E.11
Simoens, K.12
Busch, C.13
Bours, P.14
Gafurov, D.15
Yang, B.16
Stern, J.17
Rust, C.18
Cucinelli, B.19
Skepastianos, D.20
more..
-
154
-
-
84889613165
-
-
http://genkey.no/file.php?n=12&id=1.
-
-
-
-
155
-
-
0035394513
-
Improved fingerprint matching by distortion removal
-
A. Senior and R. Bolle, Improved fingerprint matching by distortion removal, IEICE Trans. Inf. Syst. E84-D(7):825-831, 2001.
-
(2001)
IEICE Trans. Inf. Syst.
, vol.E84-D
, Issue.7
, pp. 825-831
-
-
Senior, A.1
Bolle, R.2
-
156
-
-
33644829299
-
Fingerprint warping using ridge curve correspondences
-
A. Ross, S. C. Dass, and A. K. Jain, Fingerprint warping using ridge curve correspondences, IEEE Trans. Pattern Anal. Mach. Intell. 28(1):19-30, 2006.
-
(2006)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.28
, Issue.1
, pp. 19-30
-
-
Ross, A.1
Dass, S.C.2
Jain, A.K.3
-
157
-
-
67649791214
-
Practical Secure Biometrics Using Set Intersection as a Similarity Measure
-
July 2007, Barcelona, Spain
-
D. Socek, D. Ćulibrk and V. Bozović. Practical Secure Biometrics Using Set Intersection as a Similarity Measure. In International Conference on Security and Cryptography (SECRYPT 2007), July 2007, Barcelona, Spain, pp. 25-32, 2007.
-
(2007)
International Conference on Security and Cryptography (SECRYPT 2007)
, pp. 25-32
-
-
Socek, D.1
Ćulibrk, D.2
Bozović, V.3
-
158
-
-
84863769698
-
Controlling leakage of biometric information using dithering
-
Aug, Lausanne, Switzerland
-
I. R. Buhan, J. M. Doumen, and P. H. Hartel, Controlling leakage of biometric information using dithering, in 16th European Signal Processing Conference (EUSIPCO), Aug 2008, Lausanne, Switzerland.
-
(2008)
16th European Signal Processing Conference (EUSIPCO)
-
-
Buhan, I.R.1
Doumen, J.M.2
Hartel, P.H.3
-
159
-
-
56749107067
-
Practical considerations for secure minutiae based templates
-
September, Tampa, FL
-
A. Arakala, K. J. Horadam, and S. Boztas, Practical considerations for secure minutiae based templates, in Biometrics Symposium (BSYM), September, 2008, Tampa, FL.
-
(2008)
Biometrics Symposium (BSYM)
-
-
Arakala, A.1
Horadam, K.J.2
Boztas, S.3
-
160
-
-
77952703061
-
Security Issues of Biometric Encryption
-
Biometric Security and Business Continuity, September, Toronto, Canada
-
A. Stoianov, T. Kevenaar, and M. van derVeen, Security Issues of Biometric Encryption, in IEEE TICSTH Symposium on Information Assurance, Biometric Security and Business Continuity, September, 2009, Toronto, Canada.
-
(2009)
IEEE TICSTH Symposium on Information Assurance
-
-
Stoianov, A.1
Kevenaar, T.2
Van DerVeen, M.3
-
161
-
-
42949167255
-
Realization of correlation attack against fuzzy vault scheme
-
68190O-7
-
A. Kholmatov and B. Yanikoglu, Realization of correlation attack against fuzzy vault scheme, in Proc. of SPIE, Vol. 6819, 2008. pp. 68190O-1-68190O-7.
-
(2008)
Proc. of SPIE
, vol.6819
-
-
Kholmatov, A.1
Yanikoglu, B.2
-
162
-
-
77957941531
-
Securing Fingerprint Template: Fuzzy Vault with Minutiae Descriptors
-
Tampa, FL, December
-
A. Nagar, K. Nandakumar and A. K. Jain, Securing Fingerprint Template: Fuzzy Vault with Minutiae Descriptors, in Proc. of Int. Conf. on Pattern Recognition, Tampa, FL, December 2008.
-
(2008)
Proc. of Int. Conf. on Pattern Recognition
-
-
Nagar, A.1
Nandakumar, K.2
Jain, A.K.3
-
163
-
-
67549107384
-
Multibiometric Template Security Using Fuzzy Vault
-
on Biometrics: Theory, Applications and Systems, Washington DC, Sept
-
K. Nandakumar and A. K. Jain, Multibiometric Template Security Using Fuzzy Vault, in Proc. of IEEE Second Int. Conf. on Biometrics: Theory, Applications and Systems, Washington DC, Sept. 2008.
-
(2008)
Proc. of IEEE Second Int. Conf.
-
-
Nandakumar, K.1
Jain, A.K.2
|