References
- M. K. Muhammad, N. Marsono, Rabia Bakhteri. "Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm," Future Generation Computer Systems, Vol. 29, No. 3, pp. 800-810, 2013. https://doi.org/10.1016/j.future.2012.02.002
- A. Marinoa, F. H. Alvarezb, L. H. Encinasb, "A crypto-biometric scheme based on iris-templates with fuzzy extractors," Information Sciences, Vol. 195, 15, pp. 91-102, 2012. https://doi.org/10.1016/j.ins.2012.01.042
- E. C. Chang and S. Roy, "Robust Extraction of Secret Bits From Minutiae," Proceedings of Second International Conference on Biometrics, pp. 750-759, 2007,
- A. B. J. Teoh, Y. W. Kuan, S. LEE, "Cancellable Biometrics and Annotations on BioHash," Pattern Recognition, Vol. 41, No. 6, pp.2034-2044, 2008. https://doi.org/10.1016/j.patcog.2007.12.002
- Dae Jong Lee, Yong-Nyuo Shin, Seon-Hong Park, Myung-Geun Chun, "RN-ECC Based Fuzzy Vault for Protecting Fingerprint Templates," International Journal of Fuzzy Logic and Intelligent Systems, vol. 11. no. 4, pp. 286-292, 2011. https://doi.org/10.5391/IJFIS.2011.11.4.286
- Juels A and Sudan M, "A fuzzy vault scheme," Proceeding of IEEE Int. Symposium on Information Theory, pp. 408, 2002.
- P. Li, X. Yang, K. Cao, X. Tao, R. Wang, and J. Tian, "An alignment-free fingerprint cryptosystem based on fuzzy vault scheme," Journal of Network and Computer Applications, Vol. 33, No. 3, pp. 207-220, 2010. https://doi.org/10.1016/j.jnca.2009.12.003
- Y. Wang and K. N. Plataniotis, "fuzzy vault for face based cryptographic key generation," Proceedings of Biometrics Symposium, pp. 1-6, 2007.
- F. Thomas, Z. Xuebing, and B. Christoph, "Fuzzy Vault for 3D face recognition systems," Int. Conf. on Intelligent information hiding and multimedia signal processing, pp. 1069-1074, 2008.
- L. Yiun Joo, P. Kang Ryong, L. Sung Joo, B. Kwanghyuk, K. Jaihie, "A new method for generating an invariant iris private key based on the fuzzy vault system," IEEE Trans. on System, Man, Cybernetics, Vol. 38, No. 5, pp.1302-1313, 2008. https://doi.org/10.1109/TSMCB.2008.927261
- K. Moon, Error Correcting Code: Mathematical Methods and Algorithm, Wiley-Interscience, 2005
- T. Marshall, "Coding of real-number sequences for error correction: a digital signal processing problem," IEEE Journal of Selected Areas in Communication, Vol. 2, No. 2, pp. 381-392, 1984. https://doi.org/10.1109/JSAC.1984.1146063
- A. Kumar and A. Makur, "Improved coding-theoretic and subspace-based decoding algorithms for a wider class of DCT and DST codes", IEEE Trans. on Signal Processing, Vol. 58, No. 2, pp. 695-708, 2010. https://doi.org/10.1109/TSP.2009.2031727
- M. Turk, A. Pentland, "Face recognition using eigenfaces", Proc. IEEE Conf. On Computer Vision and Pattern Recognition, pp. 586-591, 1991.
- ORL face database, http://www.uk.research.att.com/facedatabase.html
Cited by
- Multimodal Biometric Recognition System using Real Fuzzy Vault vol.23, pp.4, 2013, https://doi.org/10.5391/JKIIS.2013.23.4.310