-
1
-
-
0027700869
-
High confidence visual recognition of persons by a test of statistical independence
-
Daugman, J.: 'High confidence visual recognition of persons by a test of statistical independence', IEEE Trans. Pattern Anal. Mach. Intell, 1993, 15, (11), pp. 1148-1161
-
(1993)
IEEE Trans. Pattern Anal. Mach. Intell
, vol.15
, Issue.11
, pp. 1148-1161
-
-
Daugman, J.1
-
2
-
-
41949091158
-
Image understanding for iris biometrics: A survey
-
Bowyer, K., Hollingsworth, K., Flynn, P.: 'Image understanding for iris biometrics: a survey', Comput. Vis. Image Underst, 2007, 110, (2), pp. 281-307
-
(2007)
Comput. Vis. Image Underst
, vol.110
, Issue.2
, pp. 281-307
-
-
Bowyer, K.1
Hollingsworth, K.2
Flynn, P.3
-
4
-
-
84871378005
-
Iris recognition at airports and border-crossings
-
Li, S. Z. ed:, Springer
-
Daugman, J.: 'Iris recognition at airports and border-crossings'. In: Li, S. Z. (ed): 'Encyclopedia of biometrics' (Springer, 2009)
-
(2009)
Encyclopedia of Biometrics
-
-
Daugman, J.1
-
5
-
-
77149173781
-
Iris recognition: The path forward
-
Ross, A.: 'Iris recognition: the path forward', Computer, 2001, 43, pp. 30-35
-
(2001)
Computer
, vol.43
, pp. 30-35
-
-
Ross, A.1
-
6
-
-
0742290132
-
How iris recognition works
-
Daugman, J.: 'How iris recognition works', IEEE Trans. Circuits Syst. Video Technol., 2004, 14, (1), pp. 21-30
-
(2004)
IEEE Trans. Circuits Syst. Video Technol.
, vol.14
, Issue.1
, pp. 21-30
-
-
Daugman, J.1
-
8
-
-
84872077464
-
-
Wiley
-
Cimato, S., Gamassi, M., Piuri, V., Sassi, R., Scotti, F.: 'Privacy in biometrics' 'Biometrics: fundamentals, theory, and systems' (Wiley, 2009)
-
(2009)
Privacy in Biometrics' 'Biometrics: Fundamentals, Theory, and Systems
-
-
Cimato, S.1
Gamassi, M.2
Piuri, V.3
Sassi, R.4
Scotti, F.5
-
9
-
-
79957442949
-
How to generate spoofed irises from an iris code template
-
Venugopalan, S., Savvides, M.: 'How to generate spoofed irises from an iris code template', IEEE Trans. Inf. Forensics Sec., 2011, 6, (2), pp. 385-395
-
(2011)
IEEE Trans. Inf. Forensics Sec.
, vol.6
, Issue.2
, pp. 385-395
-
-
Venugopalan, S.1
Savvides, M.2
-
11
-
-
43949116287
-
Biometric template security
-
Jain, A. K., Nandakumar, K., Nagar, A.: 'Biometric template security', EURASIP J. Adv. Signal Process., 2008, 2008, pp. 1-17
-
(2008)
EURASIP J. Adv. Signal Process.
, vol.2008
, pp. 1-17
-
-
Jain, A.K.1
Nandakumar, K.2
Nagar, A.3
-
12
-
-
84879085385
-
A survey on biometric cryptosystems and cancelable biometrics'
-
Rathgeb, C, Uhl, A.: A survey on biometric cryptosystems and cancelable biometrics', EURASIP J. Inf. Sec, 2011, 2011, (3), pp. 1-25
-
(2011)
EURASIP J. Inf. Sec
, vol.2011
, Issue.3
, pp. 1-25
-
-
Rathgeb, C.1
Uhl, A.2
-
13
-
-
0034809453
-
Enhancing security and privacy in biometrics-based authentication systems
-
Ratha, N, Connell, J., Bolle, R.: 'Enhancing security and privacy in biometrics-based authentication systems', IBM Syst. J., 2001, 40, (3), pp. 614-634
-
(2001)
IBM Syst. J.
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.1
Connell, J.2
Bolle, R.3
-
14
-
-
0036487317
-
The importance of being random: Statistical principles of iris recognition
-
Daugman, J.: 'The importance of being random: statistical principles of iris recognition', Pattern Recognition, 2003, 36, (2), pp. 279-291
-
(2003)
Pattern Recognition
, vol.36
, Issue.2
, pp. 279-291
-
-
Daugman, J.1
-
15
-
-
65549084496
-
The best bits in an iris code
-
Hollingsworth, K. P., Bowyer, K. W., Flynn, P. J.: 'The best bits in an iris code', IEEE Trans. Pattern Anal. Mach. Intell, 2009, 31, (6), pp. 964-973
-
(2009)
IEEE Trans. Pattern Anal. Mach. Intell
, vol.31
, Issue.6
, pp. 964-973
-
-
Hollingsworth, K.P.1
Bowyer, K.W.2
Flynn, P.J.3
-
16
-
-
71749091227
-
SLIC: Short-length iris codes
-
Gentile, J. E., Ratha, N, Connell, J.: 'SLIC: short-length iris codes'. Proc. IEEE Third Int. Conf. on Biometrics: Theory, Applications, and Systems, 2009, pp. 1-5
-
(2009)
Proc. IEEE Third Int. Conf. on Biometrics: Theory, Applications, and Systems
, pp. 1-5
-
-
Gentile, J.E.1
Ratha, N.2
Connell, J.3
-
17
-
-
71749092694
-
An efficient, two-stage iris recognition system
-
Gentile, J. E., Ratha, N, Connell, J.: 'An efficient, two-stage iris recognition system'. Proc. IEEE Third Int. Conf. on Biometrics: Theory, Applications, and Systems, 2009, pp. 1-5
-
(2009)
Proc. IEEE Third Int. Conf. on Biometrics: Theory, Applications, and Systems
, pp. 1-5
-
-
Gentile, J.E.1
Ratha, N.2
Connell, J.3
-
18
-
-
77956315079
-
Computationally efficient serial combination of rotation-invariant and rotation compensating iris recognition algorithms
-
Konrad, M., Stögner, H., Uhl, A., Wild, P.: 'Computationally efficient serial combination of rotation-invariant and rotation compensating iris recognition algorithms'. Proc. Fifth Int. Conf. on Computer Vision Theory and Applications, 2010, vol. 1, pp. 85-90
-
(2010)
Proc. Fifth Int. Conf. on Computer Vision Theory and Applications
, vol.1
, pp. 85-90
-
-
Konrad, M.1
Stögner, H.2
Uhl, A.3
Wild, P.4
-
19
-
-
0014814325
-
Space/time tradeoffs in hash coding with allowable errors
-
Bloom, B.: 'Space/time tradeoffs in hash coding with allowable errors', Commun. ACM, 1970, 13, (7), pp. 422-426
-
(1970)
Commun. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
-
20
-
-
0025432881
-
Optimal semijoins for distributed database systems
-
Mullin, J.: 'Optimal semijoins for distributed database systems', IEEE Trans. Softw. Eng., 1990, 16, (5), pp. 558-560
-
(1990)
IEEE Trans. Softw. Eng.
, vol.16
, Issue.5
, pp. 558-560
-
-
Mullin, J.1
-
21
-
-
70450232823
-
Network applications of bloom filters: A survey
-
Broder, A., Mitzenmacher, M.: 'Network applications of bloom filters: a survey', Internet Math., 2005, 1, (4), pp. 485-509
-
(2005)
Internet Math.
, vol.1
, Issue.4
, pp. 485-509
-
-
Broder, A.1
Mitzenmacher, M.2
-
22
-
-
84887501178
-
Alignment-free cancelable Iris biometric templates based on adaptive bloom filters'
-
Rathgeb, C, Breitinger, F., Busch, C: Alignment-free cancelable Iris biometric templates based on adaptive bloom filters'. Proc. Sixth IAPR Int. Conf. on Biometrics (ICB'13), 2013, pp. 1-8
-
(2013)
Proc. Sixth IAPR Int. Conf. on Biometrics (ICB'13)
, pp. 1-8
-
-
Rathgeb, C.1
Breitinger, F.2
Busch, C.3
-
25
-
-
33747624401
-
Combining cryptography with biometrics effectively
-
Hao, F., Anderson, R., Daugman, J.: 'Combining cryptography with biometrics effectively', IEEE Trans. Comput, 2006, 55, (9), pp. 1081-1088
-
(2006)
IEEE Trans. Comput
, vol.55
, Issue.9
, pp. 1081-1088
-
-
Hao, F.1
Anderson, R.2
Daugman, J.3
-
26
-
-
56749174787
-
Theoretical and practical boundaries of binary secure sketches
-
Bringer, J., Chabanne, H., Cohen, G, Kindarji, B., Zemor, G: 'Theoretical and practical boundaries of binary secure sketches', IEEE Trans. Inf. Forensics Sec, 2008, 3, pp. 673-683
-
(2008)
IEEE Trans. Inf. Forensics Sec
, vol.3
, pp. 673-683
-
-
Bringer, J.1
Chabanne, H.2
Cohen, G.3
Kindarji, B.4
Zemor, G.5
-
27
-
-
34547103253
-
Alignment-free cancelable fingerprint templates based on local minutiae information'
-
Lee, C, Choi, J., Toh, K., Lee, S., Kim, J.: Alignment-free cancelable fingerprint templates based on local minutiae information', IEEE Trans. Syst. Man Cybern. B, Cybern., 2007, 37, (4), pp. 980-992
-
(2007)
IEEE Trans. Syst. Man Cybern. B, Cybern.
, vol.37
, Issue.4
, pp. 980-992
-
-
Lee, C.1
Choi, J.2
Toh, K.3
Lee, S.4
Kim, J.5
-
28
-
-
84866840126
-
Statistical attack against fuzzy commitment scheme
-
Rathgeb, C, Uhl, A.: 'Statistical attack against fuzzy commitment scheme', IETBiometrics, 2012, 1, (2), pp. 94-104
-
(2012)
IETBiometrics
, vol.1
, Issue.2
, pp. 94-104
-
-
Rathgeb, C.1
Uhl, A.2
-
29
-
-
50249107013
-
Cracking fuzzy vaults and biometric encryption
-
Scheirer, W., Boult, T.: 'Cracking fuzzy vaults and biometric encryption'. Proc. Biometrics Symp., 2007, pp. 1-6
-
(2007)
Proc. Biometrics Symp.
, pp. 1-6
-
-
Scheirer, W.1
Boult, T.2
-
30
-
-
77957968173
-
Cancelable iris biometric
-
Zuo, J., Ratha, N. K., Connel, J. H.: 'Cancelable iris biometric'. Proc. 19th Int. Conf. on Pattern Recognition, 2008, pp. 1-4
-
(2008)
Proc. 19th Int. Conf. on Pattern Recognition
, pp. 1-4
-
-
Zuo, J.1
Ratha, N.K.2
Connel, J.H.3
-
31
-
-
70350406514
-
Cancelable iris biometrics using block re-mapping and image warping
-
Samarati, P., Yung, M., Martinelli, F., Ardagna, C, Eds., LNCS
-
Hämmerle-Uhl, J., Pschernig, E., Uhl, A.: 'Cancelable iris biometrics using block re-mapping and image warping'. in: Samarati, P., Yung, M., Martinelli, F., Ardagna, C, (Eds.), Proc. 12th Int. Information Security Conf, 2009 (LNCS, 5735), pp. 135-142
-
(2009)
Proc. 12th Int. Information Security Conf
, vol.5735
, pp. 135-142
-
-
Hämmerle-Uhl, J.1
Pschernig, E.2
Uhl, A.3
-
32
-
-
78149473341
-
Tokenless cancelable biometrics scheme for protecting iris codes
-
Ouda, O., Tsumura, N, Nakaguchi, T.: 'Tokenless cancelable biometrics scheme for protecting iris codes'. Proc. 20th Int. Conf. on Pattern Recognition, 2010, pp. 882-885
-
(2010)
Proc. 20th Int. Conf. on Pattern Recognition
, pp. 882-885
-
-
Ouda, O.1
Tsumura, N.2
Nakaguchi, T.3
-
33
-
-
33646095185
-
An analysis of BioHashing and its variants
-
Kong, A., Cheunga, K.-H., Zhanga, D., Kamelb, M., Youa, J.: 'An analysis of BioHashing and its variants', Pattern Recognit, 2006, 39, (7), pp. 1359-1368
-
(2006)
Pattern Recognit
, vol.39
, Issue.7
, pp. 1359-1368
-
-
Kong, A.1
Cheunga, K.-H.2
Zhanga, D.3
Kamelb, M.4
Youa, J.5
-
34
-
-
80054910703
-
Secure and robust iris recognition using random projections and sparse representations
-
Pillai, J. K., Patel, V. M., Chellappa, R., Ratha, N. K.: 'Secure and robust iris recognition using random projections and sparse representations', IEEE Trans. Pattern Anal. Mach. Intell, 2011, 33, (9), pp. 1877-1893
-
(2011)
IEEE Trans. Pattern Anal. Mach. Intell
, vol.33
, Issue.9
, pp. 1877-1893
-
-
Pillai, J.K.1
Patel, V.M.2
Chellappa, R.3
Ratha, N.K.4
-
35
-
-
33645837429
-
High security iris verification system based on random secret integration
-
Chong, S. C., Jin, A. T. B., Ling, D. N. C.: 'High security iris verification system based on random secret integration', Comput. Vis. Image Underst, 2006, 102, (2), pp. 169-177
-
(2006)
Comput. Vis. Image Underst
, vol.102
, Issue.2
, pp. 169-177
-
-
Chong, S.C.1
Jin, A.T.B.2
Ling, D.N.C.3
-
36
-
-
33744951347
-
Iris authentication using privatized advanced correlation filter
-
Zhang, D., Jain, A. Eds., LNCS
-
Chong, S. C., Jin, A. T. B., Ling, D. N. C.: 'Iris authentication using privatized advanced correlation filter'. in: Zhang, D., Jain, A. (Eds.), Proc. First Int. Conf. on Biometrics, 2006, (LNCS, 3832), pp. 382-388
-
(2006)
Proc. First Int. Conf. on Biometrics
, vol.3832
, pp. 382-388
-
-
Chong, S.C.1
Jin, A.T.B.2
Ling, D.N.C.3
-
37
-
-
44049109285
-
A fast search algorithm for a large fuzzy database'
-
Hao, F., Daugman, J., Zielinski, P.: A fast search algorithm for a large fuzzy database', IEEE Trans. Inf. Forensics Sec, 2008, 3, (2), pp. 203-212
-
(2008)
IEEE Trans. Inf. Forensics Sec
, vol.3
, Issue.2
, pp. 203-212
-
-
Hao, F.1
Daugman, J.2
Zielinski, P.3
-
40
-
-
78650339305
-
Incremental iris recognition: A single-algorithm serial fusion strategy to optimize time complexity
-
Rathgeb, C, Uhl, A., Wild, P.: 'Incremental iris recognition: a single-algorithm serial fusion strategy to optimize time complexity'. Proc. IEEE Fourth Int. Conf. on Biometrics: Theory, Applications, and Systems, 2010, pp. 1-6
-
(2010)
Proc. IEEE Fourth Int. Conf. on Biometrics: Theory, Applications, and Systems
, pp. 1-6
-
-
Rathgeb, C.1
Uhl, A.2
Wild, P.3
-
43
-
-
84866793528
-
Weighted adaptive hough and ellipsopolar transforms for real-time iris segmentation
-
Uhl, A., Wild, P.: 'Weighted adaptive hough and ellipsopolar transforms for real-time iris segmentation'. Proc. Fifth Int. Conf. on Biometrics, 2012, pp. 1-8
-
(2012)
Proc. Fifth Int. Conf. on Biometrics
, pp. 1-8
-
-
Uhl, A.1
Wild, P.2
-
44
-
-
2942628075
-
Efficient iris recognition by characterizing key local variations
-
Ma, L., Tan, T., Wang, Y., Zhang, D.: 'Efficient iris recognition by characterizing key local variations', IEEE Trans. Image Process., 2004, 13, (6), pp. 739-750
-
(2004)
IEEE Trans. Image Process.
, vol.13
, Issue.6
, pp. 739-750
-
-
Ma, L.1
Tan, T.2
Wang, Y.3
Zhang, D.4
-
45
-
-
0000744902
-
Binomial and negative binomial analogues under correlated Bernoulli trials
-
Viveros, R., Balasubramanian, K., Balakrishnan, N: 'Binomial and negative binomial analogues under correlated Bernoulli trials', Am. Stat, 1984, 48, (3), pp. 243-247
-
(1984)
Am. Stat
, vol.48
, Issue.3
, pp. 243-247
-
-
Viveros, R.1
Balasubramanian, K.2
Balakrishnan, N.3
-
46
-
-
71349083432
-
Biometric cryptosystem using function based on-line signature recognition
-
Maiorana, E.: 'Biometric cryptosystem using function based on-line signature recognition', Expert Syst. Appl, 2010, 37, (4), pp. 3454-3461
-
(2010)
Expert Syst. Appl
, vol.37
, Issue.4
, pp. 3454-3461
-
-
Maiorana, E.1
-
47
-
-
33947411404
-
Probing the uniqueness and randomness of iriscodes: Results from 200 billion iris pair comparisons
-
Daugman, J.: 'Probing the uniqueness and randomness of iriscodes: results from 200 billion iris pair comparisons', Proc. IEEE, 2006, 94, (11), pp. 1927-1935
-
(2006)
Proc. IEEE
, vol.94
, Issue.11
, pp. 1927-1935
-
-
Daugman, J.1
|