-
1
-
-
78650336968
-
Privacy protection in high security biometrics applications
-
A. Kumar and D. Zhang, Eds. Berlin, Germany: Springer
-
N. K. Ratha, "Privacy protection in high security biometrics applications," in Ethics and Policy of Biometrics, (Lecture Notes in Computer Science, vol. 6005), A. Kumar and D. Zhang, Eds. Berlin, Germany: Springer, 2010, pp. 62-69.
-
(2010)
Ethics and Policy of Biometrics, (Lecture Notes in Computer Science( 6005)
, pp. 62-69
-
-
Ratha, N.K.1
-
2
-
-
0031651014
-
On enabling secure applications through off-line biometric identification
-
G. I. Davida, Y. Frankel, and B. J. Matt, "On enabling secure applications through off-line biometric identification," in IEEE Symp. Security and Privacy, May 1998, pp. 148-157.
-
(1998)
Symp. Security and Privacy, May
, pp. 148-157
-
-
Davida, G.I.1
Frankel, Y.2
Matt, B.J.3
-
3
-
-
0034809453
-
Enhancing security and privacy in biometrics- based authentication systems
-
N. K. Ratha, J. H. Connel, and R. Bolle, "Enhancing security and privacy in biometrics- based authentication systems," IBM Syst. J., vol. 40, no. 3, pp. 614-634, 2001.
-
(2001)
IBM Syst. J.
, vol.40
, Issue.3
, pp. 614-634
-
-
Ratha, N.K.1
Connel, J.H.2
Bolle, R.3
-
4
-
-
33947530278
-
Generating cancelable fingerprint templates
-
Apr.
-
N. Ratha, S. Chikkerur, J. Connell, and R. Bolle, "Generating cancelable fingerprint templates," IEEE Trans. Pattern Anal. Mach. Intell., vol. 29, no. 4, pp. 561-572, Apr. 2007.
-
(2007)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.29
, Issue.4
, pp. 561-572
-
-
Ratha, N.1
Chikkerur, S.2
Connell, J.3
Bolle, R.4
-
5
-
-
0036887662
-
Biometrics perils and patches
-
R. M. Bolle, J. H. Connel, and N. K. Ratha, "Biometrics perils and patches," Pattern Recogn., vol. 35, no. 12, pp. 2727-2738, 2002.
-
(2002)
Pattern Recogn.
, vol.35
, Issue.12
, pp. 2727-2738
-
-
Bolle, R.M.1
Connel, J.H.2
Ratha, N.K.3
-
6
-
-
30844458593
-
A fuzzy vault scheme
-
Feb.
-
A. Juels and M. Sudan, "A fuzzy vault scheme," Designs, Codes Cryptogr., vol. 38, no. 2, pp. 237-257, Feb. 2006.
-
(2006)
Designs, Codes Cryptogr.
, vol.38
, Issue.2
, pp. 237-257
-
-
Juels, A.1
Sudan, M.2
-
7
-
-
34548074162
-
Protecting biometric templates with sketch: Theory and practice
-
Sept.
-
Y. Sutcu, Q. Li, and N. Memon, "Protecting biometric templates with sketch: Theory and practice," IEEE Trans. Inform. Forensics Security, vol. 2, no. 3, pp. 503-512, Sept. 2007.
-
(2007)
IEEE Trans. Inform. Forensics Security
, vol.2
, Issue.3
, pp. 503-512
-
-
Sutcu, Y.1
Li, Q.2
Memon, N.3
-
8
-
-
43949116287
-
Biometric template security
-
Jan.2008
-
A. K. Jain, K. Nandakumar, and A. Nagar, "Biometric template security," EURASIP J. Adv. Signal Process., vol. 2008, pp. 113:1-113:17, Jan. 2008.
-
(2008)
EURASIP J. Adv. Signal Process.
, vol.113
, Issue.1-113
, pp. 17
-
-
Jain, A.K.1
Nandakumar, K.2
Nagar, A.3
-
9
-
-
33947177191
-
Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs
-
Dec.
-
A. Teoh, A. Goh, and D. Ngo, "Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs," IEEE Trans. Pattern Anal. Mach. Intell., vol. 28, no. 12, pp. 1892-1901, Dec. 2006.
-
(2006)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.28
, Issue.12
, pp. 1892-1901
-
-
Teoh, A.1
Goh, A.2
Ngo, D.3
-
10
-
-
10044222391
-
Biometric cryptosystems: Issues and challenges
-
June
-
U. Uludag, S. Pankanti, S. Prabhakar, and A. Jain, "Biometric cryptosystems: issues and challenges," Proc. IEEE, vol. 92, no. 6, pp. 948-960, June 2004.
-
(2004)
Proc. IEEE
, vol.92
, Issue.6
, pp. 948-960
-
-
Uludag, U.1
Pankanti, S.2
Prabhakar, S.3
Jain, A.4
-
11
-
-
0033281339
-
A fuzzy commitment scheme
-
New York, NY
-
A. Juels and M. Wattenberg, "A fuzzy commitment scheme," in Proc. ACM Conf. Computer and Communications Security, New York, NY, 1999, pp. 28-36.
-
(1999)
Proc. IEEE ACM Conf. Computer and Communications Security
, pp. 28-36
-
-
Juels, A.1
Wattenberg, M.2
-
12
-
-
34547512147
-
Using distributed source coding to secure fingerprint biometrics
-
S. Draper, A. Khisti, E. Martinian, A. Vetro, and J. S. Yedidia, "Using distributed source coding to secure fingerprint biometrics," in Proc. IEEE Int. Conf. Acoustics, Speech, Signal Processing, Apr. 2007, vol. 2, pp. II-129-II-132.
-
(2007)
Proc. Int. Conf. Acoustics, Speech, Signal Processing, Apr.
, vol.2
, pp. 2129-2132
-
-
Draper, S.1
Khisti, A.2
Martinian, E.3
Vetro, A.4
Yedidia, J.S.5
-
13
-
-
35048865463
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Berlin, Germany: Springer
-
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Advances in Cryptology-Eurocrypt 2004. Berlin, Germany: Springer, 2004, pp. 523-540.
-
(2004)
Advances in Cryptology-Eurocrypt
, vol.2004
, pp. 523-540
-
-
Dodis, Y.1
Reyzin, L.2
Smith, A.3
-
14
-
-
84879085385
-
A survey on biometric cryptosystems and cancelable biometrics
-
C. Rathgeb and A. Uhl, "A survey on biometric cryptosystems and cancelable biometrics," EURASIP J. Inform. Security, vol. 2011, no. 3, pp. 1-25, 2011.
-
(2011)
EURASIP J. Inform. Security
, vol.2011
, Issue.3
, pp. 1-25
-
-
Rathgeb, C.1
Uhl, A.2
-
15
-
-
67549112548
-
Generating registration-free cancelable fingerprint templates
-
S. Chikkerur, N. Ratha, J. Connell, and R. Bolle, "Generating registration-free cancelable fingerprint templates," in Proc. IEEE Int. Conf. Biometrics: Theory, Applications and Systems, Sept. 2008, pp. 1-6.
-
(2008)
Proc. Int. Conf. Biometrics: Theory, Applications and Systems, Sept.
, pp. 1-6
-
-
Chikkerur, S.1
Ratha, N.2
Connell, J.3
Bolle, R.4
-
16
-
-
70350406514
-
Cancelable iris biometrics using block re-mapping and image warping
-
P. Samarati, M. Yung, F. Martinelli, and C. Ardagna, Eds. Berlin, Germany: Springer
-
J. Hmmerle-Uhl, E. Pschernig, and A. Uhl, "Cancelable iris biometrics using block re-mapping and image warping," in Information Security (Lecture Notes in Computer Science, vol. 5735), P. Samarati, M. Yung, F. Martinelli, and C. Ardagna, Eds. Berlin, Germany: Springer, 2009, pp. 135-142.
-
(2009)
Information Security (Lecture Notes in Computer Science, 5735)
, pp. 135-142
-
-
Hmmerle-Uhl, J.1
Pschernig, E.2
Uhl, A.3
-
17
-
-
78049410649
-
Sectored random projections for cancelable iris biometrics
-
Mar.
-
J. K. Pillai, V. M. Patel, R. Chellappa, and N. K. Ratha, "Sectored random projections for cancelable iris biometrics," in Proc. IEEE Int. Conf. Acoustics, Speech, Signal Processing, Mar. 2010, pp. 1838-1841.
-
(2010)
Proc. IEEE Int. Conf. Acoustics, Speech, Signal Processing
, pp. 1838-1841
-
-
Pillai, J.K.1
Patel, V.M.2
Chellappa, R.3
Ratha, N.K.4
-
18
-
-
80054910703
-
Secure and robust iris recognition using random projections and sparse representations
-
Sept.
-
J. K. Pillai, V. M. Patel, R. Chellappa, and N. K. Ratha, "Secure and robust iris recognition using random projections and sparse representations," IEEE Trans. Pattern Anal. Mach. Intell., vol. 30, no. 9, pp. 1877-1893, Sept. 2011.
-
(2011)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.30
, Issue.9
, pp. 1877-1893
-
-
Pillai, J.K.1
Patel, V.M.2
Chellappa, R.3
Ratha, N.K.4
-
20
-
-
0037236821
-
An elementary proof of a theorem of Johnson and Lindenstrauss
-
Jan.
-
S. Dasgupta and A. Gupta, "An elementary proof of a theorem of Johnson and Lindenstrauss," Random Struct. Algorithms, vol. 22, no. 1, pp. 60-65, Jan. 2003.
-
(2003)
Random Struct. Algorithms
, vol.22
, Issue.1
, pp. 60-65
-
-
Dasgupta, S.1
Gupta, A.2
-
21
-
-
0038166193
-
Database-friendly
-
random projections: Johnson-Lindenstrauss with binary coins June
-
D. Achlioptas, "Database-friendly random projections: Johnson-Lindenstrauss with binary coins," J. Comput. Syst. Sci., vol. 66, no. 4, pp. 671-687, June 2003.
-
(2003)
J. Comput. Syst. Sci.
, vol.66
, Issue.4
, pp. 671-687
-
-
Achlioptas, D.1
-
23
-
-
10044284550
-
Cancelable biometric filters for face recognition
-
Aug.
-
M. Savvides, B. Kumar, and P. Khosla, "Cancelable biometric filters for face recognition," in Proc. Int. Conf. Pattern Recognition, Aug. 2004, vol. 3, pp. 922-925.
-
(2004)
Proc. Int. Conf. Pattern Recognition
, vol.3
, pp. 922-925
-
-
Savvides, M.1
Kumar, B.2
Khosla, P.3
-
24
-
-
78650944179
-
Cancelable biometrics with provable security and its application to fingerprint verification
-
K. Takahashi and S. Hirata, "Cancelable biometrics with provable security and its application to fingerprint verification," IEICE Trans. Fundam. Electron. Commun. Comput. Sci., vol. 94-A, no. 1, pp. 233-244, 2011.
-
(2011)
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
, vol.94-A
, Issue.1
, pp. 233-244
-
-
Takahashi, K.1
Hirata, S.2
-
25
-
-
69949139028
-
Cancelable biometrics with perfect secrecy for correlation-based matching
-
M. Tistarelli and M. Nixon, Eds. Berlin, Germany: Springer
-
S. Hirata and K. Takahashi, " Cancelable biometrics with perfect secrecy for correlation-based matching," in Advances in Biometrics (Lecture Notes in Computer Science, vol. 5558), M. Tistarelli and M. Nixon, Eds. Berlin, Germany: Springer, 2009, pp. 868-878.
-
(2009)
Advances in Biometrics (Lecture Notes in Computer Science 5558)
, pp. 868-878
-
-
Hirata, S.1
Takahashi, K.2
-
26
-
-
77951209095
-
Cancelable templates for sequence-based biometrics with application to on-line signature recognition
-
May
-
E. Maiorana, P. Campisi, J. Fierrez, J. Ortega-Garcia, and A. Neri, "Cancelable templates for sequence-based biometrics with application to on-line signature recognition," IEEE Trans. Syst., Man Cybern. A, vol. 40, no. 3, pp. 525-538, May 2010.
-
(2010)
IEEE Trans. Syst., Man Cybern. A
, vol.40
, Issue.3
, pp. 525-538
-
-
Maiorana, E.1
Campisi, P.2
Fierrez, J.3
Ortega-Garcia, J.4
Neri, A.5
-
27
-
-
84910672204
-
On the application of bloom filters to iris biometrics
-
C. Rathgeb, F. Breitinger, C. Busch, and H. Baier, "On the application of bloom filters to iris biometrics," IET J. Biometrics, vol. 3, no. 4, pp. 207-218, 2014.
-
(2014)
IET J. Biometrics
, vol.3
, Issue.4
, pp. 207-218
-
-
Rathgeb, C.1
Breitinger, F.2
Busch, C.3
Baier, H.4
-
28
-
-
84893172355
-
Cancelable multi-biometrics: Mixing iris-codes based on adaptive bloom filters
-
C. Rathgeb and C. Busch, "Cancelable multi-biometrics: Mixing iris-codes based on adaptive bloom filters," Comput. Security, vol. 42, pp. 1-12, 2014.
-
(2014)
Comput. Security
, vol.42
, pp. 1-12
-
-
Rathgeb, C.1
Busch, C.2
-
29
-
-
84887501178
-
Alignment-free cancelable iris biometric templates based on adaptive bloom filters
-
June
-
C. Rathgeb, F. Breitinger, and C. Busch, "Alignment-free cancelable iris biometric templates based on adaptive bloom filters," in Proc. IAPR Int. Conf. Biometrics, June 2013, pp. 1-8.
-
(2013)
Proc. IAPR Int. Conf. Biometrics
, pp. 1-8
-
-
Rathgeb, C.1
Breitinger, F.2
Busch, C.3
-
30
-
-
54049133294
-
Cancelable voiceprint templates based on knowledge signatures
-
Aug.
-
W. Xu, Q. He, Y. Li, and T. Li, "Cancelable voiceprint templates based on knowledge signatures," in Proc. Int. Symp. Electronic Commerce and Security, Aug. 2008, pp. 412-415.
-
(2008)
Proc. Int. Symp. Electronic Commerce and Security
, pp. 412-415
-
-
Xu, W.1
He, Q.2
Li, Y.3
Li, T.4
-
32
-
-
35148885090
-
Cancelable biometrics realization with multispace
-
random projections
-
A. B. J. Teoh and C. T. Yuang, "Cancelable biometrics realization with multispace random projections," IEEE Trans. Syst., Man, Cybern. B, vol. 37, no. 5, pp. 1096-1106, 2007.
-
(2007)
IEEE Trans. Syst., Man, Cybern. B
, vol.37
, Issue.5
, pp. 1096-1106
-
-
Teoh, A.B.J.1
Yuang, C.T.2
-
33
-
-
38949203738
-
Cancellable biometrics and annotations on biohash
-
A. B. Teoh, Y. W. Kuan, and S. Lee, "Cancellable biometrics and annotations on biohash," Pattern Recogn., vol. 41, no. 6, pp. 2034-2044, 2008.
-
(2008)
Pattern Recogn.
, vol.41
, Issue.6
, pp. 2034-2044
-
-
Teoh, A.B.1
Kuan, Y.W.2
Lee, S.3
-
34
-
-
9944223229
-
Palmhashing: A novel approach for cancelable biometrics
-
T. Connie, A. Teoh, M. Goh, and D. Ngo, "Palmhashing: a novel approach for cancelable biometrics," Inform. Process. Lett., vol. 93, no. 1, pp. 1-5, 2005.
-
(2005)
Inform. Process. Lett.
, vol.93
, Issue.1
, pp. 1-5
-
-
Connie, T.1
Teoh, A.2
Goh, M.3
Ngo, D.4
-
35
-
-
12344259813
-
Biohashing: Two factor authentication featuring fingerprint data and tokenised
-
random number
-
A. Teoh, D. N. C. Ling, and A. Goh, "Biohashing: Two factor authentication featuring fingerprint data and tokenised random number," Pattern Recogn., vol. 37, no. 11, pp. 2245-2255, 2004.
-
(2004)
Pattern Recogn.
, vol.37
, Issue.11
, pp. 2245-2255
-
-
Teoh, A.1
Ling, D.N.C.2
Goh, A.3
-
36
-
-
33646095185
-
An analysis of biohashing and its variants
-
A. Kong, K.-H. Cheung, D. Zhang, M. Kamel, and J. You, "An analysis of biohashing and its variants," Pattern Recogn., vol. 39, no. 7, pp. 1359-1368, 2006.
-
(2006)
Pattern Recogn.
, vol.39
, Issue.7
, pp. 1359-1368
-
-
Kong, A.1
Cheung, K.-H.2
Zhang, D.3
Kamel, M.4
You, J.5
-
37
-
-
84875104858
-
Palmhash code vs. Palmphasor code
-
L. Leng and J. Zhang, "Palmhash code vs. palmphasor code," Neurocomputing, vol. 108, pp. 1-12, 2013.
-
(2013)
Neurocomputing
, vol.108
, pp. 1-12
-
-
Leng, L.1
Zhang, J.2
-
38
-
-
84894088356
-
Analysis of correlation of 2dPalmHash code and orientation range suitable for transposition
-
L. Leng, A. B. J. Teoh, M. Li, and M. K. Khan, "Analysis of correlation of 2dPalmHash code and orientation range suitable for transposition," Neurocomputing, vol. 131, pp. 377-387, 2014.
-
(2014)
Neurocomputing
, vol.131
, pp. 377-387
-
-
Leng, L.1
Teoh, A.B.J.2
Li, M.3
Khan, M.K.4
-
39
-
-
77957968173
-
Cancelable iris biometric
-
J. Zuo, N. Ratha, and J. Connell, "Cancelable iris biometric," in Proc. Int. Conf. Pattern Recognition, 2008, pp. 1-4.
-
(2008)
Proc. Int. Conf. Pattern Recognition
, pp. 1-4
-
-
Zuo, J.1
Ratha, N.2
Connell, J.3
-
40
-
-
35148889847
-
Anonymous and revocable fingerprint recognition
-
F. Farooq, R. Bolle, T.-Y. Jea, and N. Ratha, "Anonymous and revocable fingerprint recognition," in Proc. IEEE Conf. Computer Vision and Pattern Recognition, June 2007, pp. 1-7.
-
(2007)
Proc. Conf. Computer Vision and Pattern Recognition, June
, pp. 1-7
-
-
Farooq, F.1
Bolle, R.2
Jea, T.-Y.3
Ratha, N.4
-
41
-
-
33750799305
-
Robust distance measures for face-recognition supporting revocable biometric tokens
-
Apr.
-
T. Boult, "Robust distance measures for face-recognition supporting revocable biometric tokens," in Proc. Int. Conf. Automatic Face and Gesture Recognition, Apr. 2006, pp. 560-566.
-
(2006)
Proc. Int. Conf. Automatic Face and Gesture Recognition
, pp. 560-566
-
-
Boult, T.1
-
42
-
-
34948865766
-
Revocable fingerprint biotokens: Accuracy and security analysis
-
T. Boult, W. Scheirer, and R. Woodworth, "Revocable fingerprint biotokens: Accuracy and security analysis," in Proc. IEEE Conf. Computer Vision and Pattern Recognition, June 2007, pp. 1-8.
-
(2007)
Proc. Conf. Computer Vision and Pattern Recognition, June
, pp. 1-8
-
-
Boult, T.1
Scheirer, W.2
Woodworth, R.3
-
43
-
-
78650371034
-
Dynamic random projection for biometric template protection
-
Sept.
-
B. Yang, D. Hartung, K. Simoens, and C. Busch, "Dynamic random projection for biometric template protection," in Proc. IEEE Int. Conf. Biometrics: Theory Applications and Systems, Sept. 2010, pp. 1-7.
-
(2010)
Proc. IEEE Int. Conf. Biometrics: Theory Applications and Systems
, pp. 1-7
-
-
Yang, B.1
Hartung, D.2
Simoens, K.3
Busch, C.4
-
44
-
-
84861649329
-
A robust alignment-free fingerprint hashing algorithm based on minimum distance graphs
-
P. Das, K. Karthik, and B. C. Garai, "A robust alignment-free fingerprint hashing algorithm based on minimum distance graphs," Pattern Recogn., vol. 45, no. 9, pp. 3373-3388, 2012.
-
(2012)
Pattern Recogn.
, vol.45
, Issue.9
, pp. 3373-3388
-
-
Das, P.1
Karthik, K.2
Garai, B.C.3
-
45
-
-
84888320881
-
Design of alignment-free cancelable fingerprint templates via curtailed circular convolution
-
S. Wang and J. Hu, "Design of alignment-free cancelable fingerprint templates via curtailed circular convolution," Pattern Recogn., vol. 47, no. 3, pp. 1321-1329, 2014.
-
(2014)
Pattern Recogn.
, vol.47
, Issue.3
, pp. 1321-1329
-
-
Wang, S.1
Hu, J.2
-
46
-
-
82055208335
-
An analysis of minutiae matching strength
-
J. Bigun and F. Smeraldi, Eds. Berlin, Germany: Springer
-
N. Ratha, J. Connell, and R. Bolle, "An analysis of minutiae matching strength," in Audio- and Video-Based Biometric Person Authentication (Lecture Notes in Computer Science, vol. 2091), J. Bigun and F. Smeraldi, Eds. Berlin, Germany: Springer, 2001, pp. 223-228.
-
(2001)
Audio- And Video-Based Biometric Person Authentication (Lecture Notes in Computer Science 2091)
, pp. 223-228
-
-
Ratha, N.1
Connell, J.2
Bolle, R.3
-
47
-
-
84875621083
-
Reconstructing a fragmented face from a cryptographic identification protocol
-
Jan.
-
A. Luong, M. Gerbush, B. Waters, and K. Grauman, "Reconstructing a fragmented face from a cryptographic identification protocol," in Proc. IEEE Workshop on Applications of Computer Vision, Jan. 2013, pp. 238-245.
-
(2013)
Proc. Workshop on Applications of Computer Vision
, pp. 238-245
-
-
Luong, A.1
Gerbush, M.2
Waters, B.3
Grauman, K.4
-
48
-
-
0141539639
-
Sample images can be independently restored from face recognition templates
-
A. Adler, "Sample images can be independently restored from face recognition templates," in Proc. IEEE Canadian Conf. Electrical and Computer Engineering, May 2003, vol. 2, pp. 1163-1166.
-
(2003)
Proc. Canadian Conf. Electrical and Computer Engineering, May
, vol.2
, pp. 1163-1166
-
-
Adler, A.1
-
49
-
-
77951799602
-
Biometric template transformation: A security analysis
-
A. Nagar, K. Nandakumar, and A. K. Jain, "Biometric template transformation: A security analysis," in Proc. SPIE, Electronic Imaging, Media Forensics and Security XII, 2010, vol. 7541, pp. 75 410O-75 410O-15.
-
Proc. SPIE, Electronic Imaging, Media Forensics and Security XII, 2010
, vol.7541
, pp. 75410O-75410O15
-
-
Nagar, A.1
Nandakumar, K.2
Jain, A.K.3
-
50
-
-
62349084871
-
Cracking cancelable fingerprint template of ratha
-
Dec.
-
F. Quan, S. Fei, C. Anni, and Z. Feifei, "Cracking cancelable fingerprint template of ratha," in Proc. Int. Symp. Computer Science and Computational Technology, Dec. 2008, vol. 2, pp. 572-575.
-
(2008)
Proc. Int. Symp. Computer Science and Computational Technology
, vol.2
, pp. 572-575
-
-
Quan, F.1
Fei, S.2
Anni, C.3
Feifei, Z.4
-
51
-
-
70350173591
-
Dictionary attack on functional transform- based cancelable fingerprint templates
-
S. Shin, M.-K. Lee, D. Moon, and K. Moon, "Dictionary attack on functional transform- based cancelable fingerprint templates," ETRI J., vol. 31, no. 5, pp. 628-630, 2009.
-
(2009)
ETRI J.
, vol.31
, Issue.5
, pp. 628-630
-
-
Shin, S.1
Lee, M.-K.2
Moon, D.3
Moon, K.4
-
52
-
-
33750533142
-
An improved biohashing for human authentication
-
A. Lumini and L. Nanni, "An improved biohashing for human authentication," Pattern Recogn., vol. 40, no. 3, pp. 1057-1065, 2007.
-
(2007)
Pattern Recogn.
, vol.40
, Issue.3
, pp. 1057-1065
-
-
Lumini, A.1
Nanni, L.2
-
53
-
-
67650357914
-
Inverse operation and preimage attack on biohashing
-
Mar.
-
Y. Lee, Y. Chung, and K. Moon, "Inverse operation and preimage attack on biohashing," in Proc. IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications, Mar. 2009, pp. 92-97.
-
(2009)
Proc. Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications
, pp. 92-97
-
-
Lee, Y.1
Chung, Y.2
Moon, K.3
-
54
-
-
84961678523
-
Reconstruction attack on biohashing
-
P. Lacharme, E. Cherrier, and C. Rosenberger, "Reconstruction attack on biohashing," in Proc. Int. Conf. Security and Cryptography, 2013, pp. 1-8.
-
(2013)
Proc. Int. Conf. Security and Cryptography
, pp. 1-8
-
-
Lacharme, P.1
Cherrier, E.2
Rosenberger, C.3
-
55
-
-
84866793378
-
Texture based fingerprint biohashing: Attacks and robustness
-
R. Belguechi, E. Cherrier, and C. Rosenberger, "Texture based fingerprint biohashing: Attacks and robustness," in Proc. IAPR Int. Conf. Biometrics, Mar. 2012, pp. 196-201.
-
(2012)
Proc. IAPR Int. Conf. Biometrics, Mar.
, pp. 196-201
-
-
Belguechi, R.1
Cherrier, E.2
Rosenberger, C.3
-
56
-
-
77951867411
-
On the security of biohashing
-
X. Zhou and T. Kalker, "On the security of biohashing," in Proc. SPIE, Electronic Imaging, Media Forensics and Security II, 2010, vol. 7541, pp. 75 410Q-75 410Q-8.
-
Proc. SPIE, Electronic Imaging, Media Forensics and Security II, 2010
, vol.7541
, pp. 75410Q-75410Q8
-
-
Zhou, X.1
Kalker, T.2
-
57
-
-
84872326434
-
Fingerprint combination for privacy protection
-
Feb.
-
S. Li and A. Kot, "Fingerprint combination for privacy protection," IEEE Trans. Inform. Forensics Security, vol. 8, no. 2, pp. 350-360, Feb. 2013.
-
(2013)
IEEE Trans. Inform. Forensics Security
, vol.8
, Issue.2
, pp. 350-360
-
-
Li, S.1
Kot, A.2
-
58
-
-
79951846238
-
Visual cryptography for biometric privacy
-
Mar
-
A. Ross and A. Othman, "Visual cryptography for biometric privacy," IEEE Trans. Inform. Forensics Security, vol. 6, no. 1, pp. 70-81, Mar. 2011.
-
(2011)
IEEE Trans. Inform. Forensics Security
, vol.6
, Issue.1
, pp. 70-81
-
-
Ross, A.1
Othman, A.2
-
59
-
-
84872191788
-
On mixing fingerprints
-
Jan.
-
A. Othman and A. Ross, "On mixing fingerprints," IEEE Trans. Inform. Forensics Security, vol. 8, no. 1, pp. 260-267, Jan. 2013.
-
(2013)
IEEE Trans. Inform. Forensics Security
, vol.8
, Issue.1
, pp. 260-267
-
-
Othman, A.1
Ross, A.2
-
60
-
-
84928781423
-
Privacy of facial soft biometrics: Suppressing gender but retaining identity
-
A. Othman and A. Ross, "Privacy of facial soft biometrics: Suppressing gender but retaining identity," in Proc. European Conf. Computer Vision Workshops, 2015, vol. 8926, pp. 682-696.
-
(2015)
Proc. European Conf. Computer Vision Workshops
, vol.8926
, pp. 682-696
-
-
Othman, A.1
Ross, A.2
-
61
-
-
84866776956
-
Criteria towards metrics for benchmarking template protection algorithms
-
K. Simoens, B. Yang, X. Zhou, F. Beato, C. Busch, E. Newton, and B. Preneel, "Criteria towards metrics for benchmarking template protection algorithms," in Proc. IAPR Int. Conf. Biometrics, Mar. 2012, pp. 498-505.
-
(2012)
Proc. IAPR Int. Conf. Biometrics, Mar.
, pp. 498-505
-
-
Simoens, K.1
Yang, B.2
Zhou, X.3
Beato, F.4
Busch, C.5
Newton, E.6
Preneel, B.7
-
62
-
-
84893731157
-
Generating registration-free cancelable fingerprint templates based on minutia cylinder-code representation
-
Sept.
-
N. Zhang, X. Yang, Y. Zang, X. Jia, and J. Tian, "Generating registration-free cancelable fingerprint templates based on minutia cylinder-code representation," in Proc. IEEE Int. Conf. Biometrics: Theory, Applications and Systems, Sept. 2013, pp. 1-6.
-
(2013)
Proc. Int. Conf. Biometrics: Theory, Applications and Systems
, pp. 1-6
-
-
Zhang, N.1
Yang, X.2
Zang, Y.3
Jia, X.4
Tian, J.5
-
63
-
-
84925399477
-
Touch gesture-based active user authentication using dictionaries
-
H. Zhang, V. M. Patel, M. E. Fathy, and R. Chellappa, "Touch gesture-based active user authentication using dictionaries," in Proc. IEEE Winter Conf. Applications of Computer Vision, 2015, pp. 207-214.
-
(2015)
Proc. Winter Conf. Applications of Computer Vision
, pp. 207-214
-
-
Zhang, H.1
Patel, V.M.2
Fathy, M.E.3
Chellappa, R.4
-
64
-
-
78650503546
-
Unobtrusive user-authentication on mobile phones using biometric gait recognition
-
Oct.
-
M. Derawi, C. Nickel, P. Bours, and C. Busch, "Unobtrusive user-authentication on mobile phones using biometric gait recognition," in Proc. Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing, Oct. 2010, pp. 306-311.
-
(2010)
Proc. Int. Conf. Intelligent Information Hiding and Multimedia Signal Processing
, pp. 306-311
-
-
Derawi, M.1
Nickel, C.2
Bours, P.3
Busch, C.4
-
65
-
-
84908520922
-
Context-aware active authentication using smartphone accelerometer measurements
-
A. Primo, V. V. Phoha, R. Kumar, and A. Serwadda, "Context-aware active authentication using smartphone accelerometer measurements," in Proc. IEEE Conf. Computer Vision and Pattern Recognition Workshops, 2014, pp. 98-105.
-
(2014)
Proc. Conf. Computer Vision and Pattern Recognition Workshops
, pp. 98-105
-
-
Primo, A.1
Phoha, V.V.2
Kumar, R.3
Serwadda, A.4
-
66
-
-
84910038657
-
Standardization of biometric template protection
-
Oct.
-
S. Rane, "Standardization of biometric template protection," IEEE MultiMedia, vol. 21, no. 4, pp. 94-99, Oct. 2014.
-
(2014)
IEEE MultiMedia
, vol.21
, Issue.4
, pp. 94-99
-
-
Rane, S.1
|