-
1
-
-
85006528157
-
-
http://en.wikipedia.org/wiki/Usability, 2013.
-
(2013)
-
-
-
2
-
-
85006516467
-
-
http://iris.nist/gov/ice/, 2013.
-
(2013)
-
-
-
3
-
-
34547965365
-
A new biometrie technology based on mouse dynamics
-
DOI 10.1109/TDSC.2007.70207
-
A. Ahmed and I. Traore, "A New Biometric Technology Based on Mouse Dynamics, " IEEE Trans. Dependable and Secure Computing, vol. 4, no. 3, pp. 165-179, July/Sept. 2007. (Pubitemid 47274809)
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.3
, pp. 165-179
-
-
Ahmed, A.A.E.1
Traore, I.2
-
4
-
-
33750799305
-
Robust distance measures for face-recognition supporting revocable biometric tokens
-
Apr.
-
T. Boult, "Robust Distance Measures for Face-Recognition Supporting Revocable Biometric Tokens, " Proc. Seventh Int'l Conf. Automatic Face and Gesture Recognition, pp. 560-566, Apr. 2006.
-
(2006)
Proc. Seventh Int'l Conf. Automatic Face and Gesture Recognition
, pp. 560-566
-
-
Boult, T.1
-
5
-
-
34948865766
-
Revocable fingerprint biotokens: Accuracy and security analysis
-
June
-
T. Boult, W. Scheirer, and R. Woodworth, "Revocable Fingerprint Biotokens: Accuracy and Security Analysis, " Proc. IEEE Conf. Computer Vision and Pattern Recognition, pp. 1-8, June 2007.
-
(2007)
Proc. IEEE Conf. Computer Vision and Pattern Recognition
, pp. 1-8
-
-
Boult, T.1
Scheirer, W.2
Woodworth, R.3
-
7
-
-
56749174787
-
Theoretical and practical boundaries of binary secure sketches
-
Dec.
-
J. Bringer, H. Chabanne, G. Cohen, B. Kindarji, and G. Zemor, "Theoretical and Practical Boundaries of Binary Secure Sketches, " IEEE Trans. Information Forensics and Security, vol. 3, no. 4, pp. 673-683, Dec. 2008.
-
(2008)
IEEE Trans. Information Forensics and Security
, vol.3
, Issue.4
, pp. 673-683
-
-
Bringer, J.1
Chabanne, H.2
Cohen, G.3
Kindarji, B.4
Zemor, G.5
-
8
-
-
77951523125
-
A quantitative analysis of indistinguishability for a continuous domain biometric cryptosystem
-
I. Buhan, J. Breebaart, J. Guajardo, K. de Groot, E. Kelkboom, and T. Akkermans, "A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem, " Proc. 4th Int'l Workshop, and Second Int'l Conf. Data Privacy Management and Autonomous Spontaneous Security, pp. 78-92, 2010.
-
(2010)
Proc. 4th Int'l Workshop, and Second Int'l Conf. Data Privacy Management and Autonomous Spontaneous Security
, pp. 78-92
-
-
Buhan, I.1
Breebaart, J.2
Guajardo, J.3
De Groot, K.4
Kelkboom, E.5
Akkermans, T.6
-
10
-
-
34548118752
-
Fingerprint image reconstruction from standard templates
-
DOI 10.1109/TPAMI.2007.1087
-
R. Cappelli, A. Lumini, D. Maio, and D. Maltoni, "Fingerprint Image Reconstruction from Standard Templates, " IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 29, no. 9, pp. 1489-1503, Sept. 2007. (Pubitemid 47299906)
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.9
, pp. 1489-1503
-
-
Cappelli, R.1
Lumini, A.2
Maio, D.3
Maltoni, D.4
-
11
-
-
84897125375
-
-
CASIA-IrisV1
-
CASIA-IrisV1. http://biometrics.idealtest.org/, 2013.
-
(2013)
-
-
-
13
-
-
34247366845
-
Finding the original point set hidden among chaff
-
DOI 10.1145/1128817.1128845, Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
-
E. Chang, R. Shen, and F. Teo, "Finding the Original Point set Hidden Among Chaff, " Proc. ACM Symp. Information, Computer and Comm Security (ASIACCS '06), pp. 182-188, 2006. (Pubitemid 46644737)
-
(2006)
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
, vol.2006
, pp. 182-188
-
-
Chang, E.-C.1
Shen, R.2
Teo, F.W.3
-
14
-
-
33744964477
-
Revealing the secret of FaceHashing
-
Advances in Biometrics - International Conference, ICB 2006, Proceedings
-
K. Cheung, A. Kong, D. Zhang, M. Kamel, and J. You, "Revealing the Secret of Facehashing, " Proc. Int'l Conf. Advances in Biometrics, pp. 106-112, 2006. (Pubitemid 43856359)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 106-112
-
-
Cheung, K.-H.1
Kong, A.2
Zhang, D.3
Kamel, M.4
You, J.5
-
15
-
-
33745315642
-
An analysis on accuracy of cancelable biometrics based on BioHashing
-
Knowledge-Based Intelligent Information and Engineering Systems - 9th International Conference, KES 2005, Proceedings
-
K. Cheung, A. Kong, D. Zhang, M. Kamel, J. You, and H. Lam, "An Analysis on Accuracy of Cancellable Biometrics Based on Biohashing, " Proc. Ninth Int'l Conf. Knowledge-Based Intelligent Information and Eng. Systems (KES '05), pp. 1168-1172, 2005. (Pubitemid 43936218)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 1168-1172
-
-
Cheung, K.-H.1
Kong, A.2
Zhang, D.3
Kamel, M.4
You, J.5
Toby6
Lam, H.-W.7
-
16
-
-
33645837429
-
High security iris verification system based on random secret integration
-
May
-
C. Chin, A. Jin, and D. Ling, "High Security Iris Verification System Based on Random Secret Integration, " Computer Vision and Image Understanding, vol. 102, no. 2, pp. 169-177, May 2006.
-
(2006)
Computer Vision and Image Understanding
, vol.102
, Issue.2
, pp. 169-177
-
-
Chin, C.1
Jin, A.2
Ling, D.3
-
17
-
-
33751535762
-
Neural network techniques for proactive password checking
-
DOI 10.1109/TDSC.2006.53
-
A. Ciaramella, P. D'Arco, A. De Santis, C. Galdi, and R. Tagliaferri, "Neural Network Techniques for Proactive Password Checking, " IEEE Trans. Dependable and Secure Computing, vol. 3, no. 4, pp. 327-339, Oct./Dec. 2006. (Pubitemid 44837035)
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.4
, pp. 327-339
-
-
Ciaramella, A.1
D'Arco, P.2
De Santis, A.3
Galdi, C.4
Tagliaferri, R.5
-
18
-
-
84862702301
-
Robust and efficient ridge-based palmprint matching
-
Aug.
-
J. Dai, J. Feng, and J. Zhou, "Robust and Efficient Ridge-Based Palmprint Matching, " IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 34, no. 8, pp. 1618-1632, Aug. 2012.
-
(2012)
IEEE Trans. Pattern Analysis and Machine Intelligence
, vol.34
, Issue.8
, pp. 1618-1632
-
-
Dai, J.1
Feng, J.2
Zhou, J.3
-
19
-
-
79957590172
-
On ultralightweight rfid authentication protocols
-
July/Aug.
-
P. D'Arco and A. De Santis, "On Ultralightweight RFID Authentication Protocols, " IEEE Trans. Dependable and Secure Computing, vol. 8, no. 4, pp. 548-563, July/Aug. 2011.
-
(2011)
IEEE Trans. Dependable and Secure Computing
, vol.8
, Issue.4
, pp. 548-563
-
-
D'Arco, P.1
De Santis, A.2
-
20
-
-
0742290132
-
How iris recognition works
-
Jan.
-
J. Daugman, "How Iris Recognition Works, " IEEE Trans. Circuits and Systems for Video Technology, vol. 14, no. 1, pp. 21-30, Jan. 2004.
-
(2004)
IEEE Trans. Circuits and Systems for Video Technology
, vol.14
, Issue.1
, pp. 21-30
-
-
Daugman, J.1
-
21
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, " Proc. Advances in Cryptology (Eurocrypt), vol. 3027, pp. 523-540, 2004.
-
(2004)
Proc. Advances in Cryptology (Eurocrypt)
, vol.3027
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
22
-
-
33748591067
-
Use of one-dimensional iris signatures to rank iris pattern similarities
-
Y. Du, R. Ives, D. Etter, and T. Welch, "Use of One-Dimensional Iris Signatures to Rank Iris Pattern Similarities, " Optical Eng., vol. 45, no. 3, 2006.
-
(2006)
Optical Eng.
, vol.45
, Issue.3
-
-
Du, Y.1
Ives, R.2
Etter, D.3
Welch, T.4
-
23
-
-
84858182438
-
Rational security: Modelling everyday password use
-
G. Duggan, H. Johnson, and B. Grawemeyer, "Rational Security: Modelling Everyday Password Use, " Int'l J. Human-Computer Studies, vol. 70, no. 6, pp. 415-431, 2012.
-
(2012)
Int'l J. Human-Computer Studies
, vol.70
, Issue.6
, pp. 415-431
-
-
Duggan, G.1
Johnson, H.2
Grawemeyer, B.3
-
24
-
-
80052472037
-
Multimodal cognitive biometrics
-
June
-
L. Faria, V. Sa, and S. de Magalhaes, "Multimodal Cognitive Biometrics, " Proc. Sixth Iberian Conf. Information Systems and Technologies (CISTI), pp. 1-6, June 2011.
-
(2011)
Proc. Sixth Iberian Conf. Information Systems and Technologies (CISTI)
, pp. 1-6
-
-
Faria, L.1
Sa, V.2
De Magalhaes, S.3
-
26
-
-
70350406514
-
Cancelable iris biometrics using block re-mapping and image warping
-
J. Hammerle Uhl, E. Pschernig, and A. Uhl, "Cancelable Iris Biometrics Using Block Re-Mapping and Image Warping, " Proc. 12th Int'l Conf. Information Security, pp. 135-142, 2009.
-
(2009)
Proc. 12th Int'l Conf. Information Security
, pp. 135-142
-
-
Hammerle Uhl, J.1
Pschernig, E.2
Uhl, A.3
-
27
-
-
33747624401
-
Combining crypto with biometrics effectively
-
DOI 10.1109/TC.2006.138
-
F. Hao, R. Anderson, and J. Daugman, "Combining Crypto with Biometrics Effectively, " IEEE Trans. Computers, vol. 55, no. 9, pp. 1081-1088, Sept. 2006. (Pubitemid 44263808)
-
(2006)
IEEE Transactions on Computers
, vol.55
, Issue.9
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
28
-
-
77952661812
-
Information leakage in fuzzy commitment schemes
-
June.
-
T. Ignatenko and F.M.J. Willems, "Information Leakage in Fuzzy Commitment Schemes, " IEEE Trans. Information Forensics and Security, vol. 5, no. 2, pp. 337-348, June. 2010.
-
(2010)
IEEE Trans. Information Forensics and Security
, vol.5
, Issue.2
, pp. 337-348
-
-
Ignatenko, T.1
Willems, F.M.J.2
-
29
-
-
43949116287
-
Biometric template security
-
A. Jain, K. Nandakumar, and A. Nagar, "Biometric Template Security, " EURASIP J. Advances in Signal Processing, vol. 2008, no. 113, pp. 1-17, 2008.
-
(2008)
EURASIP J. Advances in Signal Processing
, vol.2008
, Issue.113
, pp. 1-17
-
-
Jain, A.1
Nandakumar, K.2
Nagar, A.3
-
30
-
-
0742290133
-
An introduction to biometric recognition
-
Jan.
-
A. Jain, A. Ross, and S. Prabhakar, "An Introduction to Biometric Recognition, " IEEE Trans. Circuits and Systems for Video Technology, vol. 1, no. 1, pp. 4-20, Jan. 2004.
-
(2004)
IEEE Trans. Circuits and Systems for Video Technology
, vol.1
, Issue.1
, pp. 4-20
-
-
Jain, A.1
Ross, A.2
Prabhakar, S.3
-
31
-
-
12344259813
-
Biohashing: Two factor authentication featuring fingerprint data and tokenised random number
-
DOI 10.1016/j.patcog.2004.04.011, PII S0031320304001876
-
A. Jin, D Ling, and A. Goh, "Biohashing: Two Factor Authentication Featuring Fingerprint Data and Tokenized Random Number, " Elsevier Pattern Recognition, vol. 37, pp. 2245-2255, 2004. (Pubitemid 40134555)
-
(2004)
Pattern Recognition
, vol.37
, Issue.11
, pp. 2245-2255
-
-
Jin, A.T.B.1
Ling, D.N.C.2
Goh, A.3
-
32
-
-
30844458593
-
A fuzzy vault scheme
-
DOI 10.1007/s10623-005-6343-z
-
A. Juels and M. Sudan, "A Fuzzy Vault Scheme, " Designs, Codes and Cryptography, vol. 38, pp. 237-257, 2006. (Pubitemid 43102559)
-
(2006)
Designs, Codes, and Cryptography
, vol.38
, Issue.2
, pp. 237-257
-
-
Juels, A.1
Sudan, M.2
-
34
-
-
81355153773
-
Depth of capture volume extension by constrained least square-based image restoration, quantitative evaluation
-
H. Jung, K. Park, and J. Kim, "Depth of Capture Volume Extension by Constrained Least Square-Based Image Restoration, Quantitative Evaluation, " Optical Engineering, vol. 49, no. 4, pp. 047004-047004-13, 2010.
-
(2010)
Optical Engineering
, vol.49
, Issue.4
, pp. 047004-04700413
-
-
Jung, H.1
Park, K.2
Kim, J.3
-
37
-
-
79951844995
-
Preventing the decodability attack based cross-matching in a fuzzy commitment scheme
-
Mar.
-
E. Kelkboom, J. Breebaart, T. Kevenaar, I. Buhan, and R. Veldhuis, "Preventing the Decodability Attack Based Cross-Matching in a Fuzzy Commitment Scheme, " IEEE Trans. Information Forensics and Security, vol. 6, no. 1, pp. 107-121, Mar. 2011.
-
(2011)
IEEE Trans. Information Forensics and Security
, vol.6
, Issue.1
, pp. 107-121
-
-
Kelkboom, E.1
Breebaart, J.2
Kevenaar, T.3
Buhan, I.4
Veldhuis, R.5
-
38
-
-
33646095185
-
An analysis of biohashing and its variants
-
July
-
A. Kong, K. Cheung, D. Zhang, M. Kamel, and J. You, "An Analysis of Biohashing and Its Variants, " Pattern Recognition, vol. 39, no. 7, pp. 1359-1368, July 2006.
-
(2006)
Pattern Recognition
, vol.39
, Issue.7
, pp. 1359-1368
-
-
Kong, A.1
Cheung, K.2
Zhang, D.3
Kamel, M.4
You, J.5
-
40
-
-
77249172684
-
Requiring strong credentials: What's taking so long?
-
Jan./Feb.
-
H.G. Miller and J.L. Fisher, "Requiring Strong Credentials: What's Taking So Long?" IT Professional, vol. 12, no. 1, pp. 57-60, Jan./Feb. 2010.
-
(2010)
IT Professional
, vol.12
, Issue.1
, pp. 57-60
-
-
Miller, H.G.1
Fisher, J.L.2
-
42
-
-
77950367675
-
A hybrid biometric cryptosystem for securing fingerprint minutiae templates
-
June
-
A. Nagar, K. Nandakumar, and A. Jain, "A Hybrid Biometric Cryptosystem for Securing Fingerprint Minutiae Templates, " Pattern Recognition Letters, vol. 31, no. 8, pp. 733-741, June 2010.
-
(2010)
Pattern Recognition Letters
, vol.31
, Issue.8
, pp. 733-741
-
-
Nagar, A.1
Nandakumar, K.2
Jain, A.3
-
43
-
-
36348986198
-
Fingerprint-based fuzzy vault: Implementation and performance
-
Dec.
-
K. Nandakumar, A. Jain, and S. Pankanti, "Fingerprint-Based Fuzzy Vault: Implementation and Performance, " IEEE Trans. Information Forensics and Security, vol. 2, no. 4, pp. 744-757, Dec. 2005.
-
(2005)
IEEE Trans. Information Forensics and Security
, vol.2
, Issue.4
, pp. 744-757
-
-
Nandakumar, K.1
Jain, A.2
Pankanti, S.3
-
44
-
-
37849009414
-
Hardening fingerprint fuzzy vault using password
-
Aug.
-
K. Nandakumar, A. Nagar, and A. Jain, "Hardening Fingerprint Fuzzy Vault Using Password, " Proc. Second Int'l Conf. Biometrics, pp. 927-937, Aug. 2007.
-
(2007)
Proc. Second Int'l Conf. Biometrics
, pp. 927-937
-
-
Nandakumar, K.1
Nagar, A.2
Jain, A.3
-
45
-
-
77956055373
-
BioEncoding: A reliable tokenless cancelable biometrics scheme for protecting iriscodes
-
July
-
O. Ouda, N. Tsumura, and T. Nakaguchi, "BioEncoding: A Reliable Tokenless Cancelable Biometrics Scheme for Protecting Iriscodes, " IEICE Trans. Information and Systems, vol. E93-D, no. 7, pp. 1878-1888, July 2010.
-
(2010)
IEICE Trans. Information and Systems, Vol. E93-D
, Issue.7
, pp. 1878-1888
-
-
Ouda, O.1
Tsumura, N.2
Nakaguchi, T.3
-
46
-
-
78149473341
-
Tokenless cancelable biometrics scheme for protecting iris codes
-
Aug.
-
O. Ouda, N. Tsumura, and T. Nakaguchi, "Tokenless Cancelable Biometrics Scheme for Protecting Iris Codes, " Proc. 20th Int'l Conf. Pattern Recognition (ICPR), pp. 882-885, Aug. 2010.
-
(2010)
Proc. 20th Int'l Conf. Pattern Recognition (ICPR)
, pp. 882-885
-
-
Ouda, O.1
Tsumura, N.2
Nakaguchi, T.3
-
47
-
-
67549085131
-
The iris challenge evaluation 2005
-
IEEE Int'l Conf. Biometrics: Theory, Applications and Systems (BTAS '08) Oct.
-
P. Phillips, K. Bowyer, P. Flynn, X. Liu, and W. Scruggs, "The Iris Challenge Evaluation 2005, " Proc. Second IEEE Int'l Conf. Biometrics: Theory, Applications and Systems (BTAS '08), pp. 1-8, Oct. 2008.
-
(2008)
Proc. Second
, pp. 1-8
-
-
Phillips, P.1
Bowyer, K.2
Flynn, P.3
Liu, X.4
Scruggs, W.5
-
48
-
-
80054910703
-
Secure and robust iris recognition using random projections and sparse representations
-
Sept.
-
J. Pillai, V. Patel, R. Chellappa, and N. Ratha, "Secure and Robust Iris Recognition Using Random Projections and Sparse Representations, " IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 33, no. 9, pp. 1877-1893, Sept. 2011.
-
(2011)
IEEE Trans. Pattern Analysis and Machine Intelligence
, vol.33
, Issue.9
, pp. 1877-1893
-
-
Pillai, J.1
Patel, V.2
Chellappa, R.3
Ratha, N.4
-
50
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
N. Ratha, J. Connell, and R. Bolle, "Enhancing Security and Privacy in Biometrics-Based Authentication Systems, " IBM Systems J., vol. 40, pp. 614-634, 2001. (Pubitemid 32933421)
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connell, J.H.2
Bolle, R.M.3
-
55
-
-
84879085385
-
A survey on biometric cryptosystems and cancelable biometrics
-
C. Rathgeb and A. Uhl, "A Survey on Biometric Cryptosystems and Cancelable Biometrics, " EURASIP J. Information Security, vol. 2011, no. 3, pp. 1-25, 2011.
-
(2011)
EURASIP J. Information Security
, vol.2011
, Issue.3
, pp. 1-25
-
-
Rathgeb, C.1
Uhl, A.2
-
56
-
-
77956989600
-
Cognitive biometrics: Challenges for the future
-
K. Revett and S. Tenreiro de Magalhes, "Cognitive Biometrics: Challenges for the Future, " Proc. Sixth Int'l Conf. Global Security, Safety, and Sustainability, pp. 79-86, 2010.
-
(2010)
Proc. Sixth Int'l Conf. Global Security, Safety, and Sustainability
, pp. 79-86
-
-
Revett, K.1
Magalhes De Tenreiro, S.2
-
57
-
-
67649116016
-
Introduction to multi-biometrics
-
Springer
-
A. Ross, K. Nandakumar, and A. Jain, "Introduction to Multi-biometrics, " Handbook of Biometrics, pp. 271-292, Springer, 2008.
-
(2008)
Handbook of Biometrics
, pp. 271-292
-
-
Ross, A.1
Nandakumar, K.2
Jain, A.3
-
58
-
-
33947492044
-
From template to image: Reconstructing fingerprints from minutiae points
-
DOI 10.1109/TPAMI.2007.1018, Special issue on Biometrics: Progress and Directions
-
A. Ross, J. Shah, and A. Jain, "From Template to Image: Reconstructing Fingerprints from Minutiae Points, " IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 544-560, Apr. 2007. (Pubitemid 46464396)
-
(2007)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.29
, Issue.4
, pp. 544-560
-
-
Ross, A.1
Shah, J.2
Jain, A.K.3
-
59
-
-
50249107013
-
Cracking fuzzy vaults and biometric encryption
-
Sept.
-
W. Scheirer and T. Boult, "Cracking Fuzzy Vaults and Biometric Encryption, " Proc. Biometrics Symp., pp. 1-6, Sept. 2007.
-
(2007)
Proc. Biometrics Symp.
, pp. 1-6
-
-
Scheirer, W.1
Boult, T.2
-
60
-
-
70449640064
-
Privacy weaknesses in bio-metric sketches
-
May
-
K. Simoens, P. Tuyls, and B. Preneel, "Privacy Weaknesses in Bio-metric Sketches, " Proc. 30th IEEE Symp. Security and Privacy, pp. 188-203, May 2009.
-
(2009)
Proc. 30th IEEE Symp. Security and Privacy
, pp. 188-203
-
-
Simoens, K.1
Tuyls, P.2
Preneel, B.3
-
61
-
-
80053018562
-
Biometrics-based authentication: A new approach
-
Aug.
-
Y. Sui, X. Zou, and E. Du, "Biometrics-Based Authentication: A New Approach, " Proc. 20th Int'l Conf. Computer Comm. and Networks (ICCCN), pp. 1-6, Aug. 2011.
-
(2011)
Proc. 20th Int'l Conf. Computer Comm. and Networks (ICCCN)
, pp. 1-6
-
-
Sui, Y.1
Zou, X.2
Du, E.3
-
63
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
June
-
U. Uludag, S. Pankanti, S. Prabhakar, and A. Jain, "Biometric Cryptosystems: Issues and Challenges, " Proc. IEEE, vol. 92, no. 6, pp. 948-960, June 2004.
-
(2004)
Proc. IEEE
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.4
-
64
-
-
77952599296
-
Key extraction from general nondiscrete signals
-
June
-
E. Verbitskiy, P. Tuyls, C. Obi, B. Schoenmakers, and B. Skoric, "Key Extraction from General Nondiscrete Signals, " IEEE Trans. Information Forensics and Security, vol. 5, no. 2, pp. 269-279, June 2010.
-
(2010)
IEEE Trans. Information Forensics and Security
, vol.5
, Issue.2
, pp. 269-279
-
-
Verbitskiy, E.1
Tuyls, P.2
Obi, C.3
Schoenmakers, B.4
Skoric, B.5
-
65
-
-
33751585800
-
Biometric hash based on statistical features of online signatures
-
C. Vielhauer, R. Steinmetz, and A. Mayerhoefer, "Biometric Hash Based on Statistical Features of Online Signatures, " Proc. 16th Int'l Conf. Pattern Recognition (ICPR '02), vol. 1, pp. 123-126, 2002. (Pubitemid 44844957)
-
(2002)
Proceedings - International Conference on Pattern Recognition
, vol.16
, Issue.1
, pp. 123-126
-
-
Vielhauer, C.1
Steinmetz, R.2
Mayerhofer, A.3
-
66
-
-
57649126466
-
A novel cryptosystem based on iris key generation
-
Oct.
-
X. Wu, N. Qi, K. Wang, and D. Zhang, "A Novel Cryptosystem Based on Iris Key Generation, " Proc. Fourth Int'l Conf. Natural Computation, vol. 4, pp. 53-56, Oct. 2008.
-
(2008)
Proc. Fourth Int'l Conf. Natural Computation
, vol.4
, pp. 53-56
-
-
Wu, X.1
Qi, N.2
Wang, K.3
Zhang, D.4
-
67
-
-
77954762857
-
Low-resolution gait recognition
-
Aug.
-
J. Zhang, J. Pu, C. Chen, and R. Fleischer, "Low-Resolution Gait Recognition, " IEEE Trans. Systems, Man, and Cybernetics, Part B: Cybernetics, vol. 40, no. 4, pp. 986-996, Aug. 2010.
-
(2010)
IEEE Trans. Systems, Man, and Cybernetics, Part B: Cybernetics
, vol.40
, Issue.4
, pp. 986-996
-
-
Zhang, J.1
Pu, J.2
Chen, C.3
Fleischer, R.4
-
68
-
-
69949142920
-
Robust biometric key extraction based on iris cryptosystem
-
L. Zhang, Z. Sun, T. Tan, and S. Hu, "Robust Biometric Key Extraction Based on Iris Cryptosystem, " Proc. Third Int'l Conf. Advances in Biometrics (ICB '09), pp. 1060-1069, 2009.
-
(2009)
Proc. Third Int'l Conf. Advances in Biometrics (ICB '09)
, pp. 1060-1069
-
-
Zhang, L.1
Sun, Z.2
Tan, T.3
Hu, S.4
-
69
-
-
84860201842
-
A new human identification method: Sclera recognition
-
May
-
Z. Zhou, E. Du, N. Thomas, and E. Delp, "A New Human Identification Method: Sclera Recognition, " IEEE Trans. Systems, Man, and Cybernetics, Part A: Systems and Humans, vol. 42, no. 3, pp. 571-583, May 2012.
-
(2012)
IEEE Trans. Systems, Man, and Cybernetics, Part A: Systems and Humans
, vol.42
, Issue.3
, pp. 571-583
-
-
Zhou, Z.1
Du, E.2
Thomas, N.3
Delp, E.4
|