-
2
-
-
84857356722
-
Security evaluation of biometric keys
-
H. Al-Assam, and S. Jassim Security evaluation of biometric keys Comput. Secur. 31 2012 151 163
-
(2012)
Comput. Secur.
, vol.31
, pp. 151-163
-
-
Al-Assam, H.1
Jassim, S.2
-
5
-
-
84866671111
-
Security evaluation of biometric authentication systems under real spoofing attacks
-
B. Biggio, Z. Akhtar, G. Fumera, G. Marcialis, and F. Roli Security evaluation of biometric authentication systems under real spoofing attacks Biometrics IET 1 2012 11 24
-
(2012)
Biometrics IET
, vol.1
, pp. 11-24
-
-
Biggio, B.1
Akhtar, Z.2
Fumera, G.3
Marcialis, G.4
Roli, F.5
-
7
-
-
33646813118
-
Application-specific biometric templates
-
M. Braithwaite, U.C. von Seeln, J. Cambier, J. Daugman, R. Glass, R. Moore, I. Scott, Application-specific biometric templates, in: IEEE Workshop on Automatic Identification Advanced Technologies, 2002, pp. 167-171.
-
(2002)
IEEE Workshop on Automatic Identification Advanced Technologies
, pp. 167-171
-
-
Braithwaite, M.1
Von Seeln, U.C.2
Cambier, J.3
Daugman, J.4
Glass, R.5
Moore, R.6
Scott, I.7
-
8
-
-
0034300875
-
A new lda-based face recognition system which can solve the small sample size problem
-
L.-F. Chen, H.-Y.M. Liao, M.-T. Ko, J.-C. Lin, and G.-J. Yu A new lda-based face recognition system which can solve the small sample size problem Pattern Recognit. 33 2000 1713 1726
-
(2000)
Pattern Recognit.
, vol.33
, pp. 1713-1726
-
-
Chen, L.-F.1
Liao, H.-Y.M.2
Ko, M.-T.3
Lin, J.-C.4
Yu, G.-J.5
-
10
-
-
77249120135
-
A hybrid approach for generating secure and discriminating face template
-
Y.C. Feng, P.C. Yuen, and A.K. Jain A hybrid approach for generating secure and discriminating face template IEEE Trans. Inform. Forensics Secur. 5 2010 103 117
-
(2010)
IEEE Trans. Inform. Forensics Secur.
, vol.5
, pp. 103-117
-
-
Feng, Y.C.1
Yuen, P.C.2
Jain, A.K.3
-
11
-
-
80055063556
-
Distance metrics for high dimensional nearest neighborhood recovery: Compression and normalization
-
S.L. France, J.D. Carroll, and H. Xiong Distance metrics for high dimensional nearest neighborhood recovery: compression and normalization Inform. Sci. 184 2012 92 110
-
(2012)
Inform. Sci.
, vol.184
, pp. 92-110
-
-
France, S.L.1
Carroll, J.D.2
Xiong, H.3
-
12
-
-
26444442431
-
Face recognition experiments with random projection
-
N. Goel, G. Bebis, A. Nefian, Face recognition experiments with random projection, in: Proc. SPIE 5779, Biometric Technology for Human Identification II, 2005, pp. 426-437.
-
(2005)
Proc. SPIE 5779, Biometric Technology for Human Identification II
, pp. 426-437
-
-
Goel, N.1
Bebis, G.2
Nefian, A.3
-
13
-
-
35248868841
-
Computation of cryptographic keys from face biometrics
-
A. Lioy, D. Mazzocchi, Lecture Notes in Computer Science Springer
-
A. Goh, and D.C. Ngo Computation of cryptographic keys from face biometrics A. Lioy, D. Mazzocchi, Communications and Multimedia Security Lecture Notes in Computer Science vol. 2828 2003 Springer 1 13
-
(2003)
Communications and Multimedia Security
, vol.2828 VOL.
, pp. 1-13
-
-
Goh, A.1
Ngo, D.C.2
-
14
-
-
79957481207
-
Nonlinear dimensionality reduction using a temporal coherence principle
-
Y. Huang, J. Zhao, Y. Liu, S. Luo, Q. Zou, and M. Tian Nonlinear dimensionality reduction using a temporal coherence principle Inform. Sci. 181 2011 3284 3307
-
(2011)
Inform. Sci.
, vol.181
, pp. 3284-3307
-
-
Huang, Y.1
Zhao, J.2
Liu, Y.3
Luo, S.4
Zou, Q.5
Tian, M.6
-
17
-
-
0035400784
-
Face recognition based on the uncorrelated discriminant transformation
-
Z. Jin, J.-Y. Yang, Z.-S. Hu, and Z. Lou Face recognition based on the uncorrelated discriminant transformation Pattern Recognit. 34 2001 1405 1416
-
(2001)
Pattern Recognit.
, vol.34
, pp. 1405-1416
-
-
Jin, Z.1
Yang, J.-Y.2
Hu, Z.-S.3
Lou, Z.4
-
18
-
-
0001654702
-
Extensions of Lipschitz mapping into Hilbert space
-
Contemporary Mathematics American Mathematical Society
-
W.B. Johnson, and J. Lindenstrauss Extensions of Lipschitz mapping into Hilbert space Conf. in Modern Analysis and Probability Contemporary Mathematics vol. 26 1984 American Mathematical Society 189 206
-
(1984)
Conf. in Modern Analysis and Probability
, vol.26 VOL.
, pp. 189-206
-
-
Johnson, W.B.1
Lindenstrauss, J.2
-
20
-
-
33646756574
-
Two factor face authentication scheme with cancelable feature
-
S.Z. Li, Z. Sun, T. Tan, S. Pankanti, G. Chollet, D. Zhang, Lecture Notes in Computer Science Springer
-
J. Kang, D. Nyang, and K. Lee Two factor face authentication scheme with cancelable feature S.Z. Li, Z. Sun, T. Tan, S. Pankanti, G. Chollet, D. Zhang, IWBRS Lecture Notes in Computer Science vol. 3781 2005 Springer 67 76
-
(2005)
IWBRS
, vol.3781 VOL.
, pp. 67-76
-
-
Kang, J.1
Nyang, D.2
Lee, K.3
-
21
-
-
33750954911
-
Face recognition with renewable and privacy preserving binary templates
-
October
-
T.A.M. Kevenaar, G.-J. Schrijen, M. van der Veen, A.H.M. Akkermans, F. Zuo, Face recognition with renewable and privacy preserving binary templates, in: Fourth IEEE Workshop on Automatic Identification Advanced Technologies, October 2005, pp. 21-26.
-
(2005)
Fourth IEEE Workshop on Automatic Identification Advanced Technologies
, pp. 21-26
-
-
Kevenaar, T.A.M.1
Schrijen, G.-J.2
Veen Der M.Van3
Akkermans, A.H.M.4
Zuo, F.5
-
22
-
-
77949488110
-
A performance driven methodology for cancelable face templates generation
-
Y. Kim, A.B.J. Teoh, and K.-A. Toh A performance driven methodology for cancelable face templates generation Pattern Recognit. 43 2010 2544 2559
-
(2010)
Pattern Recognit.
, vol.43
, pp. 2544-2559
-
-
Kim, Y.1
Teoh, A.B.J.2
Toh, K.-A.3
-
23
-
-
48649097707
-
A method to enhance face biometric security
-
Y. Kim, K.-A. Toh, A method to enhance face biometric security, in: First IEEE International Conference on Biometrics: Theory, Applications, and Systems (BTAS 2007), 2007a, pp. 1-6.
-
(2007)
First IEEE International Conference on Biometrics: Theory, Applications, and Systems (BTAS 2007)
, pp. 1-6
-
-
Kim, Y.1
Toh, K.-A.2
-
25
-
-
33646095185
-
An analysis of biohashing and its variants
-
A. Kong, K.-H. Cheung, D. Zhang, M. Kamel, and J. You An analysis of biohashing and its variants Pattern Recognit. 39 2006 1359 1368
-
(2006)
Pattern Recognit.
, vol.39
, pp. 1359-1368
-
-
Kong, A.1
Cheung, K.-H.2
Zhang, D.3
Kamel, M.4
You, J.5
-
26
-
-
33947370895
-
Correlation pattern recognition for face recognition
-
IEEE
-
B.V.K.V. Kumar, M. Savvides, and C. Xie Correlation pattern recognition for face recognition Proc. IEEE vol. 94 2006 IEEE 1963 1976
-
(2006)
Proc. IEEE
, vol.94 VOL.
, pp. 1963-1976
-
-
Kumar, B.V.K.V.1
Savvides, M.2
Xie, C.3
-
28
-
-
49049110474
-
One-time templates for face authentication
-
IEEE Computer Society Washington, DC, USA
-
Y. Lee, Y. Lee, Y. Chung, and K. Moon One-time templates for face authentication ICCIT '07: Proceedings of the 2007 International Conference on Convergence Information Technology 2007 IEEE Computer Society Washington, DC, USA 1818 1823
-
(2007)
ICCIT '07: Proceedings of the 2007 International Conference on Convergence Information Technology
, pp. 1818-1823
-
-
Lee, Y.1
Lee, Y.2
Chung, Y.3
Moon, K.4
-
30
-
-
84862817764
-
Feature extraction using a fast null space based linear discriminant analysis algorithm
-
G.-F. Lu, and Y. Wang Feature extraction using a fast null space based linear discriminant analysis algorithm Inform. Sci. 193 2012 72 80
-
(2012)
Inform. Sci.
, vol.193
, pp. 72-80
-
-
Lu, G.-F.1
Wang, Y.2
-
31
-
-
70449553184
-
Face recognition with biometric encryption for privacy-enhancing self-exclusion
-
July
-
H. Lu, K. Martin, F. Bui, K. Plataniotis, D. Hatzinakos, Face recognition with biometric encryption for privacy-enhancing self-exclusion, in: 2009 16th International Conference on Digital Signal Processing, July, pp. 1-8.
-
2009 16th International Conference on Digital Signal Processing
, pp. 1-8
-
-
Lu, H.1
Martin, K.2
Bui, F.3
Plataniotis, K.4
Hatzinakos, D.5
-
32
-
-
0142120484
-
Regularized discriminant analysis for the small sample size problem in face recognition
-
J. Lu, K.N. Plataniotis, and A.N. Venetsanopoulos Regularized discriminant analysis for the small sample size problem in face recognition Pattern Recognit. Lett. 24 2003 3079 3087
-
(2003)
Pattern Recognit. Lett.
, vol.24
, pp. 3079-3087
-
-
Lu, J.1
Plataniotis, K.N.2
Venetsanopoulos, A.N.3
-
33
-
-
33750533142
-
An improved biohashing for human authentication
-
A. Lumini, and L. Nanni An improved biohashing for human authentication Pattern Recognit. 40 2007 1057 1065
-
(2007)
Pattern Recognit.
, vol.40
, pp. 1057-1065
-
-
Lumini, A.1
Nanni, L.2
-
36
-
-
0000178613
-
On the reciprocal of the general algebraic matrix
-
E.H. Moore On the reciprocal of the general algebraic matrix Bull. Am. Math. Soc. 26 1920 394 395
-
(1920)
Bull. Am. Math. Soc.
, vol.26
, pp. 394-395
-
-
Moore, E.H.1
-
37
-
-
33748422480
-
Empirical tests on biohashing
-
L. Nanni, and A. Lumini Empirical tests on biohashing Neurocomputing 69 2006 2390 2395
-
(2006)
Neurocomputing
, vol.69
, pp. 2390-2395
-
-
Nanni, L.1
Lumini, A.2
-
38
-
-
48149110492
-
Local binary patterns for a hybrid fingerprint matcher
-
L. Nanni, and A. Lumini Local binary patterns for a hybrid fingerprint matcher Pattern Recognit. 41 2008 3461 3466
-
(2008)
Pattern Recognit.
, vol.41
, pp. 3461-3466
-
-
Nanni, L.1
Lumini, A.2
-
40
-
-
0029669420
-
A comparative study of texture measures with classification based on featured distributions
-
T. Ojala, M. Pietikainen, and D. Harwood A comparative study of texture measures with classification based on featured distributions Pattern Recognit. 29 1996 51 59
-
(1996)
Pattern Recognit.
, vol.29
, pp. 51-59
-
-
Ojala, T.1
Pietikainen, M.2
Harwood, D.3
-
41
-
-
84947145047
-
A generalized inverse for matrices
-
R. Penrose A generalized inverse for matrices Proc. Cambridge Philos. Soc. 51 1955 406 413
-
(1955)
Proc. Cambridge Philos. Soc.
, vol.51
, pp. 406-413
-
-
Penrose, R.1
-
42
-
-
1842809903
-
Distance measures for pca-based face recognition
-
V. Perlibakas Distance measures for pca-based face recognition Pattern Recognit. Lett. 25 2004 711 724
-
(2004)
Pattern Recognit. Lett.
, vol.25
, pp. 711-724
-
-
Perlibakas, V.1
-
43
-
-
0030689145
-
The feret evaluation methodology for face-recognition algorithms
-
IEEE Computer Society Washington, DC, USA
-
P.J. Phillips, H. Moon, P. Rauss, and S.A. Rizvi The feret evaluation methodology for face-recognition algorithms Proceedings of the 1997 Conference on Computer Vision and Pattern Recognition (CVPR '97) 1997 IEEE Computer Society Washington, DC, USA 137
-
(1997)
Proceedings of the 1997 Conference on Computer Vision and Pattern Recognition (CVPR '97)
, pp. 137
-
-
Phillips, P.J.1
Moon, H.2
Rauss, P.3
Rizvi, S.A.4
-
44
-
-
0032045780
-
The feret database and evaluation procedure for face-recognition algorithms
-
P.J. Phillips, H. Wechsler, J. Huang, and P.J. Rauss The feret database and evaluation procedure for face-recognition algorithms Image Vision Comput. 16 1998 295 306
-
(1998)
Image Vision Comput.
, vol.16
, pp. 295-306
-
-
Phillips, P.J.1
Wechsler, H.2
Huang, J.3
Rauss, P.J.4
-
45
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
N.K. Ratha, J.H. Connell, and R.M. Bolle Enhancing security and privacy in biometrics-based authentication systems IBM Syst. J. 40 2001 614 634
-
(2001)
IBM Syst. J.
, vol.40
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
46
-
-
74549177065
-
Optics based biohashing using joint transform correlator
-
N. Saini, and A. Sinha Optics based biohashing using joint transform correlator Opt. Commun. 283 2010 894 902
-
(2010)
Opt. Commun.
, vol.283
, pp. 894-902
-
-
Saini, N.1
Sinha, A.2
-
47
-
-
10044284550
-
Cancelable biometric filters for face recognition
-
IEEE Computer Society Washington, DC, USA
-
M. Savvides, B.V.K.V. Kumar, and P.K. Khosla Cancelable biometric filters for face recognition 17th International Conference on the Pattern Recognition (ICPR'04), vol. 3 2004 IEEE Computer Society Washington, DC, USA 922 925
-
(2004)
17th International Conference on the Pattern Recognition (ICPR'04), Vol. 3
, pp. 922-925
-
-
Savvides, M.1
Kumar, B.V.K.V.2
Khosla, P.K.3
-
48
-
-
84872378745
-
Video-based face spoofing detection through visual rhythm analysis
-
A. da Silva Pinto, H. Pedrini, W. Schwartz, A. Rocha, Video-based face spoofing detection through visual rhythm analysis, in: 2012 25th SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI), 2012, pp. 221-228.
-
(2012)
2012 25th SIBGRAPI Conference on Graphics, Patterns and Images (SIBGRAPI)
, pp. 221-228
-
-
Da Silva Pinto, A.1
Pedrini, H.2
Schwartz, W.3
Rocha, A.4
-
49
-
-
0032224440
-
Biometric encryption using image processing
-
R.L. van Renesse, Proceedings of SPIE SPIE
-
C. Soutar, D. Roberge, A. Stoianov, R. Gilroy, and B.V. Kumar Biometric encryption using image processing R.L. van Renesse, Optical Security and Counterfeit Deterrence Techniques II Proceedings of SPIE vol. 3314 1998 SPIE 178 188
-
(1998)
Optical Security and Counterfeit Deterrence Techniques II
, vol.3314 VOL.
, pp. 178-188
-
-
Soutar, C.1
Roberge, D.2
Stoianov, A.3
Gilroy, R.4
Kumar, B.V.5
-
50
-
-
0003725910
-
Secure private key generation using a fingerprint
-
CardTech/SecurTech, Inc
-
C. Soutar, G.J. Tomko, Secure private key generation using a fingerprint, in: CardTech/SecurTech Conference, Applications in Action, vol. 1, CardTech/SecurTech, Inc, 1996, pp. 245-252.
-
(1996)
CardTech/SecurTech Conference, Applications in Action
, vol.1
, pp. 245-252
-
-
Soutar, C.1
Tomko, G.J.2
-
51
-
-
34548074162
-
Protecting biometric templates with sketch: Theory and practice
-
Y. Sutcu, Q. Li, and N. Memon Protecting biometric templates with sketch: Theory and practice IEEE Trans. Inform. Forensics Secur. 2 2007 503 512
-
(2007)
IEEE Trans. Inform. Forensics Secur.
, vol.2
, pp. 503-512
-
-
Sutcu, Y.1
Li, Q.2
Memon, N.3
-
52
-
-
33947177191
-
Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs
-
A.B. Teoh, A. Goh, and D.C. Ngo Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs IEEE Trans. Pattern Anal. Mach. Intell. 28 2006 1892 1901
-
(2006)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.28
, pp. 1892-1901
-
-
Teoh, A.B.1
Goh, A.2
Ngo, D.C.3
-
53
-
-
38949203738
-
Cancellable biometrics and annotations on biohash
-
A.B. Teoh, Y.W. Kuan, and S. Lee Cancellable biometrics and annotations on biohash Pattern Recognit. 41 2008 2034 2044
-
(2008)
Pattern Recognit.
, vol.41
, pp. 2034-2044
-
-
Teoh, A.B.1
Kuan, Y.W.2
Lee, S.3
-
55
-
-
26444525625
-
Fuzzy vault for fingerprints
-
T. Kanade, A.K. Jain, N.K. Ratha, Springer
-
U. Uludag, S. Pankanti, and A.K. Jain Fuzzy vault for fingerprints T. Kanade, A.K. Jain, N.K. Ratha, AVBPA, vol. 3546 2005 Springer 310 319
-
(2005)
AVBPA, Vol. 3546
, pp. 310-319
-
-
Uludag, U.1
Pankanti, S.2
Jain, A.K.3
-
58
-
-
21644442033
-
Secure fuzzy vault based fingerprint verification system
-
IEEE Signal Processing Society
-
S. Yang, I.M. Verbauwhede, Secure fuzzy vault based fingerprint verification system, in: The Thirty-Eighth Asilomar Conference on Signals, Systems, and Computers, vol. 1, IEEE Signal Processing Society, 2004, pp. 577-581.
-
(2004)
The Thirty-Eighth Asilomar Conference on Signals, Systems, and Computers
, vol.1
, pp. 577-581
-
-
Yang, S.1
Verbauwhede, I.M.2
-
59
-
-
77958151658
-
Adaptive nonlinear manifolds and their applications to pattern recognition
-
H. Yin, and W. Huang Adaptive nonlinear manifolds and their applications to pattern recognition Inform. Sci. 180 2010 2649 2662
-
(2010)
Inform. Sci.
, vol.180
, pp. 2649-2662
-
-
Yin, H.1
Huang, W.2
-
60
-
-
0001765951
-
A direct lda algorithm for high-dimensional data - With application to face recognition
-
H. Yu, and J. Yang A direct lda algorithm for high-dimensional data - with application to face recognition Pattern Recognit. 34 2001 2067 2070
-
(2001)
Pattern Recognit.
, vol.34
, pp. 2067-2070
-
-
Yu, H.1
Yang, J.2
|