1 |
S. Chen and Y. Zhu, "Subpattern-based Principle component analysis," Pattern Recognition, vol 37, no 5, pp 1081-1083, 2004
DOI
ScienceOn
|
2 |
J. Daugman, "The Importance of Being Random: Statistical Principles of Iris Recognition," Pattern Recognition, vol. 36, no. 2, pp. 279-291, 2003.
DOI
ScienceOn
|
3 |
Brian Chen and Gregory W. Wornell, " Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding," IEEE Trans. on Information Theory, vol. 47, no. 4, pp. 1423-1443, 2001.
DOI
ScienceOn
|
4 |
Anil K. Jain, Karthik Nandakumar, and Abhishek Nagar, "Biometric template security," EURASIP Journal on Advances in Signal Processing, vol. 2008, no. 113, 2008.
|
5 |
T. Sim, S. Baker, and M. Bsat, "The CMU Pose, Illumination, and Expression Database," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 25, no. 12, 2003.
|
6 |
Qi Han, Zhifang Wang, and Xiamu Niu, "A Non-uniform Quantizing Approach to Protect Biometric Templates," International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP '06., pp. 693-698, 2006.
|
7 |
Andrew Teoh, David Ngo and Alwyn Goh, "Biohashing: Two Factor Authentication Featuring Fingerprint Data And Tokenised Random Number," Pattern Recognition, Vol. 37, Issue 11, pp. 2245-2255, 2004.
DOI
ScienceOn
|
8 |
Andrew B. J. Teoh, Yip Wai Kuan, and Sangyoun Lee, "Cancellable biometrics and annotations on BioHash," Pattern Recognition, Vol. 41 , Issue 6, pp. 2034-2044, 2008.
DOI
ScienceOn
|
9 |
Andrew B.J. Teoh, Alwyn Goh, and David C.L. Ngo, "Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs," IEEE transactions on a Pattern Analysis and Machine Intelligence, vol. 28, no. 12, 2006.
|
10 |
Pim Tuyls, Anton H. M. Akkermans, Tom A. M. Kevenaar, Geert Jan Schrijen, Asker M. Bazen, and Raymond N. J. Veldhuis, "Practical Biometric Authentication with Template Protection," International conference on: Audio- and Video-Based Biometric Person Authentication. AVBPA, Vol. 3546, pp. 436-446, 2005.
|
11 |
Chen C., Veldhuis R.N.J., Kevenaar T.A.M., and Akkermans A.H.M., "Multi-Bits Biometric String Generation based on the Likelihood Ratio," First IEEE International Conference on Biometrics: Theory, Applications, and Systems, 2007. BTAS 2007., 2007.
|
12 |
N. K. Ratha, J. H. Connell, and R. M. Bolle, "Enhancing security and privacy in biometricsbased authentication systems," IBM systems Journal, vol. 40, pp. 614-634, 2001.
DOI
|
13 |
Chen C., Veldhuis R.N.J., Kevenaar T.A.M., and Akkermans A.H.M., "Biometric Quantization through Detection Rate Optimized Bit Allocation," EURASIP Journal on Advances in Signal Processing, vol. 2009, 2009.
|
14 |
Jean-paul Linnartz and Pim Tuyls, "New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates," AVBPA, pp. 393-402, 2003.
|
15 |
C. Vielhauer and R. Steinmetz, "Handwriting: feature correlation analysis for biometric hashes," EURASIP Journal on Applied Signal Processing, vol. 2004, no. 4, pp. 542-558, special issue on Biometric Signal Processing, 2004.
DOI
ScienceOn
|