-
1
-
-
79958822548
-
Pair-polar coordinate-based cancelable fingerprint templates
-
T. Ahmad, J. Hu, and S. Wang Pair-polar coordinate-based cancelable fingerprint templates Pattern Recognit. 44 2011 2555 2564
-
(2011)
Pattern Recognit.
, vol.44
, pp. 2555-2564
-
-
Ahmad, T.1
Hu, J.2
Wang, S.3
-
5
-
-
55649115527
-
A simple proof of the restricted isometry property for random matrices
-
R. Baraniuk, M. Davenport, R. DeVore, and M. Wakin A simple proof of the restricted isometry property for random matrices Construct. Approx. 28 2008 253 263
-
(2008)
Construct. Approx.
, vol.28
, pp. 253-263
-
-
Baraniuk, R.1
Davenport, M.2
Devore, R.3
Wakin, M.4
-
8
-
-
0037236821
-
An elementary proof of a theorem of Johnson and Lindenstrauss
-
S. Dasgupta, and A. Gupta An elementary proof of a theorem of Johnson and Lindenstrauss Random Struct. Algorithms 22 2002 60 65
-
(2002)
Random Struct. Algorithms
, vol.22
, pp. 60-65
-
-
Dasgupta, S.1
Gupta, A.2
-
9
-
-
33646365077
-
For most large underdetermined systems of linear equations the minimal 1-norm solution is also the sparsest solution
-
D. Donoho For most large underdetermined systems of linear equations the minimal 1-norm solution is also the sparsest solution Commun. Pure and Appl. Math. 59 2006 797 829
-
(2006)
Commun. Pure and Appl. Math.
, vol.59
, pp. 797-829
-
-
Donoho, D.1
-
10
-
-
84856938223
-
Sparse solution of underdetermined systems of linear equations by stagewise orthogonal matching pursuit
-
D. Donoho, Y. Tsaig, I. Drori, and J. Starck Sparse solution of underdetermined systems of linear equations by stagewise orthogonal matching pursuit IEEE Trans. Inf. Theory 58 2012 1094 1121
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, pp. 1094-1121
-
-
Donoho, D.1
Tsaig, Y.2
Drori, I.3
Starck, J.4
-
13
-
-
77249120135
-
A hybrid approach for generating secure and discriminating face template
-
Y. Feng, P. Yuen, and A. Jain A hybrid approach for generating secure and discriminating face template IEEE Trans. Inf. Forens. Secur. 5 2010 103 117
-
(2010)
IEEE Trans. Inf. Forens. Secur.
, vol.5
, pp. 103-117
-
-
Feng, Y.1
Yuen, P.2
Jain, A.3
-
16
-
-
38249031101
-
The Johnson-Lindenstrauss lemma and the sphericity of some graphs
-
P. Frankl, and H. Maehara The Johnson-Lindenstrauss lemma and the sphericity of some graphs J. Comb. Theory, Ser. B 44 1988 355 362
-
(1988)
J. Comb. Theory, Ser. B
, vol.44
, pp. 355-362
-
-
Frankl, P.1
Maehara, H.2
-
17
-
-
84910119797
-
-
Online (accessed 18.11.13)
-
S. Gina, 450k Yahoo Passwords Online Now: Is Yours?, 2013, 〈 http://www.techrepublic.com/blog/security/450k-yahoo-passwords-online-now-is-yours/8097 〉, Online (accessed 18.11.13).
-
(2013)
450k Yahoo Passwords Online Now: Is Yours?
-
-
Gina, S.1
-
18
-
-
77952053406
-
Handwritten signature on-card matching performance testing
-
Springer, Berlin Heidelberg
-
O. Henniger, S. Müller, Handwritten signature on-card matching performance testing, in: Biometric ID Management and Multimodal Communication, Springer, Berlin Heidelberg, 2009, pp. 268-275.
-
(2009)
Biometric ID Management and Multimodal Communication
, pp. 268-275
-
-
Henniger, O.1
-
19
-
-
84869455644
-
Biometric authentication system security and user privacy
-
A.K. Jain, and K. Nandakumar Biometric authentication system security and user privacy IEEE Comput. 45 2012 87 92
-
(2012)
IEEE Comput.
, vol.45
, pp. 87-92
-
-
Jain, A.K.1
Nandakumar, K.2
-
20
-
-
70450257716
-
Improving performance and security of biometrics using efficient and stable random projection techniques
-
IEEE, Salzburg, Austria
-
S. Jassim, H. Al-Assam, H. Sellahewa, Improving performance and security of biometrics using efficient and stable random projection techniques, in: Proceedings of 6th International Symposium on Image and Signal Processing and Analysis (ISPA 2009), IEEE, Salzburg, Austria, 2009, pp. 556-561.
-
(2009)
Proceedings of 6th International Symposium on Image and Signal Processing and Analysis (ISPA 2009)
, pp. 556-561
-
-
Jassim, S.1
Al-Assam, H.2
Sellahewa, H.3
-
21
-
-
84872230394
-
Linkedin password leak salt their hide
-
P. Kamp, P. Godefroid, M. Levin, D. Molnar, P. McKenzie, R. Stapleton-Gray, B. Woodcock, and G. Neville-Neil Linkedin password leak salt their hide Queue 10 2012 20
-
(2012)
Queue
, vol.10
, pp. 20
-
-
Kamp, P.1
Godefroid, P.2
Levin, M.3
Molnar, D.4
McKenzie, P.5
Stapleton-Gray, R.6
Woodcock, B.7
Neville-Neil, G.8
-
22
-
-
84889584826
-
Can signature biometrics address both identification and verification problems?
-
S. Khan, Z. Khan, F. Shafait, Can signature biometrics address both identification and verification problems?, in: 12th International Conference on Document Analysis and Recognition (ICDAR), 2013, pp. 981-985.
-
(2013)
12th International Conference on Document Analysis and Recognition (ICDAR)
, pp. 981-985
-
-
Khan, S.1
Khan, Z.2
Shafait, F.3
-
23
-
-
42949167255
-
Realization of correlation attack against the fuzzy vault scheme
-
San Jose (CA) United States
-
A. Kholmatov, B. Yanikoglu, Realization of correlation attack against the fuzzy vault scheme, in: Electronic Imaging 2008, International Society for Optics and Photonics, San Jose (CA) United States, 2008, pp. 68190O-68190O.
-
(2008)
Electronic Imaging 2008, International Society for Optics and Photonics
, pp. 68190O-68190O
-
-
Kholmatov, A.1
Yanikoglu, B.2
-
24
-
-
70349849847
-
Susig an on-line signature database, associated protocols and benchmark results
-
A. Kholmatov, and B. Yanikoglu Susig an on-line signature database, associated protocols and benchmark results Pattern Anal. Appl. 12 2009 227 236
-
(2009)
Pattern Anal. Appl.
, vol.12
, pp. 227-236
-
-
Kholmatov, A.1
Yanikoglu, B.2
-
25
-
-
77949488110
-
A performance driven methodology for cancelable face templates generation
-
Y. Kim, A.B.J. Teoh, and K.A. Toh A performance driven methodology for cancelable face templates generation Pattern Recognit. 43 2010 2544 2559
-
(2010)
Pattern Recognit.
, vol.43
, pp. 2544-2559
-
-
Kim, Y.1
Teoh, A.B.J.2
Toh, K.A.3
-
26
-
-
36849070972
-
Three measures for secure palmprint identification
-
A. Kong, D. Zhang, and M. Kamel Three measures for secure palmprint identification Pattern Recognit. 41 2008 1329 1337
-
(2008)
Pattern Recognit.
, vol.41
, pp. 1329-1337
-
-
Kong, A.1
Zhang, D.2
Kamel, M.3
-
27
-
-
79960436599
-
New and improved Johnson-Lindenstrauss embeddings via the restricted isometry property
-
F. Krahmer, and R. Ward New and improved Johnson-Lindenstrauss embeddings via the restricted isometry property SIAM J. Math. Anal. 43 2011 1269 1281
-
(2011)
SIAM J. Math. Anal.
, vol.43
, pp. 1269-1281
-
-
Krahmer, F.1
Ward, R.2
-
28
-
-
37849021056
-
Changeable face representations suitable for human recognition
-
H. Lee, C. Lee, J. Choi, J. Kim, and J. Kim Changeable face representations suitable for human recognition Adv. Biom. 2007 557 565
-
(2007)
Adv. Biom.
, pp. 557-565
-
-
Lee, H.1
Lee, C.2
Choi, J.3
Kim, J.4
Kim, J.5
-
29
-
-
79952856380
-
Cancelable palmcode generated from randomized Gabor filters for palmprint template protection
-
L. Leng, J. Zhang, M. Khan, X. Chen, M. Ji, and K. Alghathbar Cancelable palmcode generated from randomized Gabor filters for palmprint template protection J. Sci. Res. Essays 6 2011 784 792
-
(2011)
J. Sci. Res. Essays
, vol.6
, pp. 784-792
-
-
Leng, L.1
Zhang, J.2
Khan, M.3
Chen, X.4
Ji, M.5
Alghathbar, K.6
-
30
-
-
84855909777
-
An efficient dynamic reliability-dependent bit allocation for biometric discretization
-
M.H. Lim, A.B.J. Teoh, and K.A. Toh An efficient dynamic reliability-dependent bit allocation for biometric discretization Pattern Recognit. 45 2012 1960 1971
-
(2012)
Pattern Recognit.
, vol.45
, pp. 1960-1971
-
-
Lim, M.H.1
Teoh, A.B.J.2
Toh, K.A.3
-
31
-
-
31344447750
-
Random projection-based multiplicative data perturbation for privacy preserving distributed data mining
-
K. Liu, H. Kargupta, and J. Ryan Random projection-based multiplicative data perturbation for privacy preserving distributed data mining IEEE Trans. Knowl. Data Eng. 18 2006 92 106
-
(2006)
IEEE Trans. Knowl. Data Eng.
, vol.18
, pp. 92-106
-
-
Liu, K.1
Kargupta, H.2
Ryan, J.3
-
32
-
-
82355169293
-
Signature verification competition for online and offline skilled forgeries (sigcomp2011)
-
IEEE, Beijing, China
-
M. Liwicki, M.I. Malik, C.E. van den Heuvel, X. Chen, C. Berger, R. Stoel, M. Blumenstein, B. Found, Signature verification competition for online and offline skilled forgeries (sigcomp2011), in: International Conference on Document Analysis and Recognition (ICDAR), IEEE, Beijing, China, 2011, pp. 1480-1484.
-
(2011)
International Conference on Document Analysis and Recognition (ICDAR)
, pp. 1480-1484
-
-
Liwicki, M.1
Malik, M.I.2
Heuvel Den Van, C. E.3
Chen, X.4
Berger, C.5
Stoel, R.6
Blumenstein, M.7
Found, B.8
-
34
-
-
71349083432
-
Biometric cryptosystem using function based on-line signature recognition
-
E. Maiorana Biometric cryptosystem using function based on-line signature recognition Expert Syst. Appl. 37 2010 3454 3461
-
(2010)
Expert Syst. Appl.
, vol.37
, pp. 3454-3461
-
-
Maiorana, E.1
-
35
-
-
51849116466
-
Template protection for hmm-based on-line signature authentication
-
IEEE, Anchorage, Alaska, USA
-
E. Maiorana, M. Martinez-Diaz, P. Campisi, J. Ortega-Garcia, A. Neri, Template protection for hmm-based on-line signature authentication, in: IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPRW08), IEEE, Anchorage, Alaska, USA, 2008, pp. 1-6.
-
(2008)
IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (CVPRW08)
, pp. 1-6
-
-
Maiorana, E.1
Martinez-Diaz, M.2
Campisi, P.3
Ortega-Garcia, J.4
Neri, A.5
-
36
-
-
84862076976
-
A signature verification framework for digital pen applications
-
IEEE, Queensland, Australia
-
M.I. Malik, S. Ahmed, A. Dengel, M. Liwicki, A signature verification framework for digital pen applications, in: 10th IAPR International Workshop on Document Analysis Systems (DAS), IEEE, Queensland, Australia, 2012, pp. 419-423.
-
(2012)
10th IAPR International Workshop on Document Analysis Systems (DAS)
, pp. 419-423
-
-
Malik, M.I.1
Ahmed, S.2
Dengel, A.3
Liwicki, M.4
-
37
-
-
77951799602
-
Biometric template transformation: A security analysis
-
Media Forensics and Security
-
A. Nagar, K. Nandakumar, A. Jain, Biometric template transformation: a security analysis, in: Proceedings of the SPIE, Electronic Imaging, Media Forensics and Security, 2010.
-
(2010)
Proceedings of the SPIE, Electronic Imaging
-
-
Nagar, A.1
Nandakumar, K.2
Jain, A.3
-
39
-
-
84910132771
-
-
Online
-
Online, 2014a. Docusign, URL: 〈 https://www.docusign.com.au/ 〉.
-
(2014)
Docusign
-
-
-
41
-
-
84910124329
-
-
Online
-
Online, 2014c. Silanis e-Signatures, URL: 〈 http://www.silanis.com/ 〉.
-
(2014)
Silanis E-Signatures
-
-
-
45
-
-
79952375147
-
Sparse representations and random projections for robust and cancelable biometrics
-
V. Patel, R. Chellappa, M. Tistarelli, Sparse representations and random projections for robust and cancelable biometrics, in: 11th International Conference on Control Automation Robotics and Vision (ICARCV), IEEE, 2010, pp. 1-6.
-
(2010)
11th International Conference on Control Automation Robotics and Vision (ICARCV), IEEE
, pp. 1-6
-
-
Patel, V.1
Chellappa, R.2
Tistarelli, M.3
-
47
-
-
62349084871
-
Cracking cancelable fingerprint template of ratha
-
IEEE, Shanghai, China
-
F. Quan, S. Fei, C. Anni, Z. Feifei, Cracking cancelable fingerprint template of ratha, in: International Symposium on Computer Science and Computational Technology (ISCSCT08), IEEE, Shanghai, China, 2008, pp. 572-575.
-
(2008)
International Symposium on Computer Science and Computational Technology (ISCSCT08)
, pp. 572-575
-
-
Quan, F.1
Fei, S.2
Anni, C.3
Feifei, Z.4
-
48
-
-
64549094196
-
The secrecy of compressed sensing measurements
-
IEEE, Monticello, IL, USA
-
Y. Rachlin, D. Baron, The secrecy of compressed sensing measurements, in: 46th Annual Allerton Conference on Communication, Control, and Computing, IEEE, Monticello, IL, USA, 2008, pp. 813-817.
-
(2008)
46th Annual Allerton Conference on Communication, Control, and Computing
, pp. 813-817
-
-
Rachlin, Y.1
Baron, D.2
-
50
-
-
33947384964
-
Local and global feature selection for on-line signature verification
-
IEEE, Seoul, South Korea
-
J. Richiardi, H. Ketabdar, A. Drygajlo, Local and global feature selection for on-line signature verification, in: Proceedings of the Eighth International Conference on Document Analysis and Recognition, IEEE, Seoul, South Korea, 2005, pp. 625-629.
-
(2005)
Proceedings of the Eighth International Conference on Document Analysis and Recognition
, pp. 625-629
-
-
Richiardi, J.1
Ketabdar, H.2
Drygajlo, A.3
-
52
-
-
33947177191
-
Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs
-
A. Teoh, A. Goh, and D. Ngo Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs IEEE Trans. Pattern Anal. Mach. Intell. 28 2006 1892 1901
-
(2006)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.28
, pp. 1892-1901
-
-
Teoh, A.1
Goh, A.2
Ngo, D.3
-
53
-
-
85014808086
-
Fir signature verification system characterizing dynamics of handwriting features
-
P. Thumwarin, J. Pernwong, and T. Matsuura Fir signature verification system characterizing dynamics of handwriting features EURASIP J. Adv. Signal Process. 2013 2013 1 15
-
(2013)
EURASIP J. Adv. Signal Process.
, vol.2013
, pp. 1-15
-
-
Thumwarin, P.1
Pernwong, J.2
Matsuura, T.3
-
56
-
-
84888320881
-
Design of alignment-free cancelable fingerprint templates via curtailed circular convolution
-
S. Wang, and J. Hu Design of alignment-free cancelable fingerprint templates via curtailed circular convolution Pattern Recognit. 47 2014 1321 1329
-
(2014)
Pattern Recognit.
, vol.47
, pp. 1321-1329
-
-
Wang, S.1
Hu, J.2
-
57
-
-
21844443786
-
Svc2004 first international signature verification competition
-
D. Yeung, H. Chang, Y. Xiong, S. George, R. Kashi, T. Matsumoto, and G. Rigoll Svc2004 first international signature verification competition Biom. Authent. 5 2004 179 208
-
(2004)
Biom. Authent.
, vol.5
, pp. 179-208
-
-
Yeung, D.1
Chang, H.2
Xiong, Y.3
George, S.4
Kashi, R.5
Matsumoto, T.6
Rigoll, G.7
|