참고문헌
- N.K. Ratha, J.H. Cornell and R.M. Bole, 'Enhancing security and privacy in biometrics-based authentication systems', IBM Systems Journal, Vol 40. No 3, pp. 614-634, 2001 https://doi.org/10.1147/sj.403.0614
- G. Wolberg. 'Image Morphing: A Survey.' The Visual Computer 14, pp. 360 - 372, 1998 https://doi.org/10.1007/s003710050148
- US Patent 6,836.554
- Tee Connie, Andrew Teoh, Michael Goh, and David Ngo,'PalmHashing : A novel approach for cancelable biometrics', Information processing letters, Vol. 93. pp 1-5, 2005 https://doi.org/10.1016/j.ipl.2004.09.014
- S. Schuckers. 'Spoofing and anti-spoofing measures', In Information Security Technical Report, volume 7, pages 56-62, 2002
- T. Putte and J. Keuning, 'Biometrical fingerprint recognition: don't get your fingers burned', In Smart Card Research and advanced Applications, pages 289-303, Kluwer Academic Publisher, 2000
- T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino, 'Impact of Artificial Gummy Fingers on Fingerprint Systems', Proc. of SPIE, Optical Security and Counterfeit Deterrence techniques IV, Vol. 4677, pp. 275-289, 2002
- M. Sandstrom, 'Liveness Detection in Fingerprint Recognition Systems,' Master's Thesis, Linkoping University, Linkoping, Sweden, June 2004
- ELFA. Factsheet - PCB production. 2004. Available at http://www.elfa.se/ en/fakta.pdf(accessed on Dec. 5. 2004)
- US Patent 5,719,950
- R. Derakhshani, S.A.C. Schuckers. L.A. Hornak, and L.a. Gorman, 'Determination of vitality from a non-invasive biomedical measurement for use in fingerprint scanners'. Pattern Recognition, Vol. 36, pp. 383-396, 2003 https://doi.org/10.1016/S0031-3203(02)00038-9
- S.A.C. Schuckers, S.T.V. Parthasaradhi, R. Derakshani, and L. A. Hornak. 'Comparison of Classification Methods for Time-Series Detection of Perspiration as a Liveness Test in Fingerprint Devices', Lecture Notes in Computer Science, Vol. 3072, pp. 256-263, 2004
- S.A.C. Schuckers, and A. Abhyankar, 'Detecting Liveness in Fingerprint Scanners Using Wavelets: Results of the Test Dataset', Lecture Notes in Computer Science, Vol. 3087pp. 100110, 2004
- L. Thalheim, J. Krissler, 'Body Check:Biometric Access Protection Devices and their Programs Put to the Test', ct magazine, November 2002
- T. Matsumoto, 'Artificial Fingers and Irises: Importance of Vulnerability Analysis', 7th International
- J. Daugman, 'Recognizing Persons by their Iris Patterns: Countermeasures against Subterfuge', Biometrics: Personal Identification in Networked Society, pp. 103-121
- J. Daugman, 'Iris Recognition and AntiSpoofing Countermeasures', 7th International Biometrics Conference, 2004, London
- http://www.cl.cam.ac. uk/usershgd1000/ countermeasures. pdf, (accessed on June 9, 2005)
- http://ppw,kuleuven. be/labexppsy/purkinje. htm, (accessed on November 3, 2005)
- Michael Arnold, Martin Schmucker and Stephen D. Wolthusen,'Techniques and Applications of Digital Watermarking and Content Protection', Artech House, 2003
- F. Hartung and M. Kutter, 'Multimedia watermarking techniques', Proc. IEEE, vol. 87, no. 7, July 1999, pp.1079-1107
- WSQGray-Scale Fingerprint Image Compression Specification, IAFIS-IC-0110 v2, Federal Bureau of Investigation, Criminal Justice Information Services Division (1993)
- M. Yeung and S. Pankanti, 'Verification Watermarks on Fingerprint Recognition and Retrieval' , Journal of Electronic Imaging 9, No.4, 468--476 (2000) https://doi.org/10.1117/1.1287795
- A.K. Jain and U. Uludag, 'Hiding Fingerprint Minutiae in Images', Proc. of Third Workshop on Automatic Identification Advanced Technologies (AutoID), pp. 97-102, Tarrytown, New York, 11arch 14-15, 2002
- A. K. Jain, U. Uludag and R.-L. Hsu, 'Hiding a Face in a Fingerprint Image', Proc. of ICPR. Quebec City, Canada, Aug., 2002
- Jaehyuck Lim, Hyobin Lee, Sangyoun Lee, Jaihie Kim, 'Invertible Watermarking Algorithmwith Detecting Locations of 11alicious Manipulation for Biometric Image Authentication', LNCS on International Conference on Biometrics, Jan, 2006
- A. Juels and M. Sudan, 'A Fuzzy Vault Scheme', Proc. IEEE int'J. Symp. Information Theory, A. Lapidoth and E. Teletar, Eds., pp. 408, 2002
- Umut Uludag, Shrath Pankanti, and Anil K. Jain, 'Fuzzy Vault for Fingerprints', AVBPA 2005, LNCS 3546. pp. 310-319, 2005
- U. Uludag, S. Pankanti. S. Prabhakar and A. K. Jain, 'Biometric Cryptosysterns: Issues and Challenges', Proc. IEEE, vol. 92, no. 6, pp. 948-960, 2004
- Soutar, C., Roberge, D.. Stoianov, A., Gilroy, R., Vijaya, B., 'Biometric Encryption: enrollment and verication procedures', Proc. SPIE Int. Soc. Opt. Eng., 3386 24-35 (1998)
- G. Davida, B. Matt, Y. Frankel, R. Peralta,'On the relation of error correction and cryptography to an offline biometric based identification scheme', Workshop on Coding and Cryptography, January, 1999, Paris, France
- G. Davida, B. Matt and Y. Frankel, 'On enabling secure application through off-line biometric identification', IEEE 1998 Symposium on Research in Security and Privacy, April 1998, Oakland, Ca
- http://berc.yonsei.ac.kr (accessed on Nov. 14, 2005)
- Sungjoo Lee, Kang Ryoung Park, Jaihie Kim, 'A Study on Fake Iris Detection based on the Reflectance of the Iris to the Sclera for Iris Recognition', ITC-CSCC 2005, pp. 1555-1556, Jeju, Korea, July 4-7, 2005
- Eui Chul Lee, Kang Ryoung Park, Jaihie Kim, 'Fake Iris Detection By Using the Purkinje Image', Lecture Notes in Computer Science (ICBA'06), J anuary 5-7, 2006
- 이연주 이형구 박강령 김재희 '홍채코드 기반 생체 고유키 추출에 관한 연구' 2005년 대한전자공학회 추계학술대회, 서울대학교 2005.11.26
- Hyung Gu Lee, Seungin Noh, Kwanghyuk Bae, Kang Ryoung Park, Jaihie Kim'Invariant Biometric Code Extraction', 2004 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS'04), November 18-19, 2004, Seoul, Korea