A Method of Generating Changeable Face Template for Statistical Appearance-Based Face Recognition |
Lee, Chul-Han
(Biometric Engineering Research Center, Yonsei University)
Jung, Min-Yi (Biometric Engineering Research Center, Yonsei University) Kim, Jong-Sun (Biometric Engineering Research Center, Yonsei University) Choi, Jeung-Yoon (Biometric Engineering Research Center, Yonsei University) Kim, Jai-Hie (Biometric Engineering Research Center, Yonsei University) |
1 | A.B.J. Teoh, and D.C.L. Ngo, 'Cancellable biometrics featuring with tokenized random number,' Pattern Recognition Letter, vol. 26, no. 10, pp. 14541460, 2005 DOI ScienceOn |
2 | M. Y. Jung, C. H. Lee, J. S. Kim, J. Y. Chol, and J. H. Kim, 'A Changeable Biometric System for Appearance-Based Face Recognition,' Biometric Consortium Conference (BCC 2006), Baltimore, USA, 2006 |
3 | M. S. Bartlett, J. R. Movellan, and T. J. Sejnowski, 'Face Recognition by Independent Component Analysis,' IEEE Trans. Neural Networks, vol. 13, no. 6, pp. 1450-1464, 2002 DOI ScienceOn |
4 | A.M. Martinez and R. Benavente, 'The AR Face Database,' CVC Tech, 1998 |
5 | A. Kong, K. H. Cheung, D. Zhang, M. Kamel and J. You, 'An analysis of BioHashing and its variants,' Pattern Recognition, In Press, Corrected Proof, Available online, 27 December 2005 |
6 | N. K. Ratha, J. H. Connell, and R. M. Bolle, 'Enhancing security and privacy in biometrics-based authentication systems,' IBM Systems Journal, vol. 40, no. 3, 2001 |
7 | M.A. Turk and A.P. Pentland, 'Eigenfaces for Recognition,' Cognitive Neuroscience, vol. 3, no. 1, pp. 71-86, 1991 DOI ScienceOn |
8 | M. Savvides, B. V. K. Vijaya Kumar, and P. K. Khosla, 'Cancelable Biometric Filters for Face Recognition,' Proceedings of the 17th International Conference on Pattern Recognition, 3, pp. 922-925, Cambridge, UK, 2004 |
9 | C. S. Chin, A.B.J. Teoh, and D.C.L. Ngo, 'High security Iris verificationsystem based on random secret integration,' Computer Vision and Image Understanding, vol. 102, Iss. 2, pp. 169-177, 2006 DOI ScienceOn |
10 | D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, Springer, New York, 2003v |
11 | A.B.J. Teoh, D.C.L. Ngo, and A. Goh, 'BioHashing: two factor authentication featuring fingerprint data and tokenised random number,' Pattern Recognition, vol. 37, pp. 22452255, November, 2004 DOI ScienceOn |
12 | J. N. Kang, D. H. Nyang and K. H. Lee, 'Two Factor Face Authentication Scheme with Cancelable Feature,' Lecture notes in Computer Science 3781, pp.67-76, Oct. 2005 |
13 | Y.H. Pang, A.B. J Teoh, and D.C.L. Ngo, 'Palmprint based cancelable biometric authentication system,' International Journal of Signal Processing, vol. 1, no. 2, pp. 98-104, 2004 |
14 | R. M. Bolle, J.H. Connel, and N.K. Ratha, 'Biometrics Perils and Patches,' Pattern Recognition, vol. 35, pp. 2727-2738, 2002 DOI ScienceOn |
15 | A.B.J. Teoh, D.C.L. Ngo, and A. Goh, 'Personalised cryptographic key generation based on FaceHashing,' Computers and Security, vol. 23, no. 7, pp. 606-614, 2004 DOI ScienceOn |
16 | T. Connie, A. Teoh, M. Goh, and D. Ngo, 'PalmHashing: a novel approach for dual-factor authentication,' Pattern Analysis and Applications, vol. 7, no. 3, pp. 255 268, 2004 DOI |
17 | A. Hyvarinen and E. Oja, 'Independent component analysis: a tutorial,' http://www.cis.hut.fi/~aapo/papers/IJCNN99_tutori alweb/, 1999 |
18 | R. Ang. R.Safavi-Naini, and L.McAven, 'Cancelable Key-Based Fingerprint Templates,' Information Security and Privacy: 10th Australasian Conference, ACISP, pp. 242-252, Brisbane, Australia, 2005 |
19 | D. D. Lee and H. S. Seung, 'Learning the parts of objects by non-negative matrix factorization,' Nature, vol. 401, pp. 788-791, 1999 DOI ScienceOn |