1 |
M. Sandstrom, "Liveness Detection in Fingerprint Recognition Systems," Master's Thesis, Linkoping University, Linkoping, Sweden,June 2004
|
2 |
S,A.C. Schuckers, and A. Abhyankar, "Detecting Liveness in Fingerprint Scanners Using Wavelets: Results of the Test Dataset", Lecture Notes in Computer Science, Vol. 3087pp. 100-110,2004
|
3 |
T. Matsumoto, "Artificial Fingers and Irises: Importance of Vulnerability Analysis" , 7th International
|
4 |
Athos Antonelli, Raffaele Cappelli, Dario Mario, and Davide Maltoni, "Fake Finger Detection by Skin Distortion Analysis" , IEEE Trans. Information forensics And Security, VOL. 1, NO.3, Sep 2006
|
5 |
http://ppw,kuleuven. be/labexppsy/purkinje. htm, (accessed on 2007.04.10)
|
6 |
M. Yeung and S. Pankanti, "Verification Watermarks on Fingerprint Recognition and Retrieval", Journal of Electronic Imaging 9, No.4, 468-476 (2000)
DOI
ScienceOn
|
7 |
A.K. Jain and U. Uludag, "Hiding Fingerprint Minutiae in Images", Proc. of Third Workshop on Automatic Identification Advanced Technologies (AutoID), pp. 97-102, Tarrytown, New York, March 14-15, 2002
|
8 |
U. Uludag, S. Pankanti, S. Prabhakar and A. K. Jain, "Biometric Cryptosystems: Issues and Challenges" , Proc. IEEE, vol. 92, no. 6, pp. 948-960, 2004
DOI
ScienceOn
|
9 |
Eui Chul Lee, Kang Ryoung Park, Jaihie Kim, "Fake Iris Detection By Using the Purkinje Image" , Lecture Notes in Computer Science (ICBA' 06), January 5-7,2006
|
10 |
L. Thalheim, J. Krissler, "Body Check: Biometric Access Protection Devices and their Programs Put to the Test", c't magazine, November 2002
|
11 |
T. Matsumoto, "Artificial Fingers and Irises: Importance of Vulnerability Analysis", 7th International
|
12 |
J. Daugman, "Recognizing Persons by their Iris Patterns: Countermeasures against Subterfuge", Biometrics: Personal Identification in Networked Society, pp. 103-121
|
13 |
S. Lee et aI., "Robust Fake Iris Detection Based on Variation of the Reflectance Ratio between the Iris and the Sclera," Proc. of Biometrics Symposium 2006, Sept. 19 - 21, 2006
|
14 |
A. Juels and M. Sudan, "A fuzzy vault scheme," ACM Conference on Computer and Communications Security, CCS 2002
|
15 |
R.Reiand LukeMcAven, "Cancelable Key-Based Fingerprint Templates," Information Security and Privacy: 10th Australasian Conference, ACISP, pp. 242-252,2005
|
16 |
S, Schuckers, "Spoofmg and anti-spoofmg measures" , In Information Security Technical Report, volume 7, pages 56-62,2002
|
17 |
M. Jung, C. Lee,J. Kim,J. Choi,J. Kim, "A Changeable Biometric System for Appearance-based Face Recognition," Biometric Consortium Conference (BCC 2006), Baltimore,USA, Sept. 19-21,2006
|
18 |
N.K. Ratha, J.H. Cornell and RM, Bole, "Enhancing security and privacy in biometrics-based authentication systems", IBM Systems Journal, Vol 40, No 3, pp. 614-634,2001
DOI
|
19 |
US Patent 6,836,554
|
20 |
L. Thalheim,J. Krissler, "Body Check: Biometric Access Protection Devices and their Programs Put to the Test", c' t magazine, November 2002
|
21 |
WSQGray-Scale Fingerprint Image Compression Specification, IAFIS-IC-01l0v2, Federal Bureau of Investigation, Criminal Justice Information Services Division (1993)
|
22 |
T. Putte and J. Keuning, "Biometrical fingerprint recognition: don't get your fingers bumed' , In Smart Card Research and advanced Applications, pages 289-303, Kluwer Academic Publisher, 2000
|
23 |
A. Juels and M. Sudan,"A Fuzzy Vault Scheme", Proc. IEEE int'l. Symp. Information Theory, A. Lapidoth and E. Teletar, Eds., pp. 408,2002
|
24 |
G. Davida, B. Matt, Y. Frankel, R. Peralta," On the relation of error correction and cryptography to an offline biometric based identification scheme", Workshop on Coding and Cryptography, January, 1999, Paris, France
|
25 |
G. Davida, B. Matt and Y. Frankel, "On enabling secure application through off-line biometric identification" , IEEE 1998 Symposium on Research in Security and Privacy, April 1998, Oakland, Ca
|
26 |
이연주, 박강령, 김재희, "퍼지볼트 기반의 암호 키 생성을 위한 불변 홍채코드 추출, " 2006년 대한전자공학회 하계학술대회, 29권 1호, 2006
|
27 |
T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino, "Impact of Artificial Gummy Fingers on Fingerprint Systems" ,Proc. of SPIE, Optical Security and Counterfeit Deterrence techniques IV, VoL4677, pp. 275-289,2002
|
28 |
Y. S. Moon, J. S. Chen, K. C. Chan, K. So, K. c. Woo, "Wavelet Based Fingerprint Liveness Detection", lEE Electronics Letters, Vol. 41, No. 20, pp.1111-1112, Sept. 2005
|
29 |
Jaehyuck Lim, Hyobin Lee, Sangyoun Lee, Jaihie Kim, "Invertible Watermarking Algorithmwith Detecting Locations of Malicious Manipulation for Biometric Image Authentication", LNCS on International Conference on Biometrics, Jan, 2006
|
30 |
Umut Uludag, Shrath Pankanti, and Anil K. Jain, "Fuzzy Vault for Fingerprints" , AVBPA 2005, LNCS 3546. pp. 310-319, 2005
|
31 |
Soutar, C., Roberge, D., Stoianov, A., Gilroy, R, Vijaya, B., "Biometric Encryption: enrollment and verication procedures" , Proc. SPIE Int. Soc. Opt. Eng., 3386 24-35 (1998)
|
32 |
Hyung Gu Lee, Seungin Noh, Kwanghyuk Bae, Kang Ryoung Park, Jaihie Kim" Invariant Biometric Code Extraction", 2004 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS' 04), November 18-19, 2004, Seoul, Korea
|
33 |
http://berc.yonsei.ac.kr (accessed on 2007.04.10)
|
34 |
US Patent 5,719,950
|
35 |
Sungjoo Lee, Kang Ryoung Park, Jaihie Kim, "A Study on Fake Iris Detection based on the Reflectance of the Iris to the Sclera for Iris Recognition", ITC-CSCC 2005, pp. 1555-1556, Jeju, Korea,July 4-7,2005
|
36 |
최경택, 박강령, 김재희, "Biometric system에서의 Privacy보호기술", 정보보호학회지, 2005년 12월호
|
37 |
ELFA. Faetsheet - PCB production, 2004. Available at http://www.elfa.se/en/fakta. pdf(accessed on 2007.04.10)
|
38 |
Youn Joo Lee, Kwanghyuk Bae, Sung Joo Lee, Kang Ryoung Park, Jaihie Kim, "A New Method for Generating Invariant Iris Cryptographic Key Based on Fuzzy Vault Scheme", IEEE Transactions on Systems, Man and Cybernetics -Part B, submitted
|
39 |
G, Wolberg, ''Image Morphing: A Survey," The Visual Computer 14, pp. 360-372, 1998
DOI
ScienceOn
|
40 |
http://www.cl.cam.ac.uk/users/jgd1000/countermeasures. pdf, (accessed on 2007.04.10)
|
41 |
R Derakhshani, S.A. C. Schuckers, L,A. Hornak, and L,O. Gorman, "Determination of vitality from a noninvasive biomedical measurement for use in fingerprint scanners" , Pattern Recognition, Vol. 36, pp. 383-396, 2003
DOI
ScienceOn
|
42 |
이연주, 이형구, 박강령, 김재희, "홍채 코드 기반 생체 고유키 추출에 관한 연구", 2005년 대한전자공학회 추계 학술대회, 서울대학교, 2005. 11. 26
|
43 |
A. K. Jain, U. Uludag and R.-L. Hsu, "Hiding a Face in a Fingerprint Image",Proc. of ICPR, Quebec City, Canada, Aug., 2002
|
44 |
Tee Connie, Andrew Teoh, Michael Goh, and David Ngo, "PalmHashing : A novel approach for cancelable biometrics" , Information processing letters, Vol.93, pp 1-5,2005
DOI
ScienceOn
|
45 |
Michael Arnold, Martin Schmucker and Stephen D. Wolthusen,"Techniques and Applications of Digital Watermarking and Content Protection" , Artech House, 2003
|
46 |
K. H. Bae, S. I. Noh and J. H. Kim, "Iris Feature Extraction Using Independent Component Analysis," LNCS on Audio-and Video-Based Biometric Person Authentication, Vol. 2688, pp. 838-844, 2003
DOI
ScienceOn
|
47 |
Chulhan Lee, Jeung-Yoon Choi, Kar-Ann Toh, Sangyoun Lee, and Jaihie Kim, "Alignment-Free Cancelable Fingerprint Templates Based on Local Minutiae Information," IEEE Transactions on Systems, Man and Cybernetics -Part B, Special Issue on Recent Advances in Biometrics Systems, October, 2007
|
48 |
이연주, 이형구, 박강령, 김재희, "홍채 코드 기반 생체 고유키 추출에 관한 연구", 2005년 대한전자공학회 추계 학술대회, 서울대학교, 2005. 11. 26
|
49 |
J. Daugman, "Iris Recognition and Anti-Spoofing Countermeasures", 7th International Biometrics Conference, 2004, London
|
50 |
임재혁, 이효빈, 이상윤, "생체정보 저작권 보호 및 유출 방지 알고리즘", 제 5 회 BERC 생체인식워크삽 2007년 2 월 1 일-2일
|
51 |
S.A. C. Schuckers, S.T.V. Parthasaradhi, R. Derakshani, and L. A. Hornak, "Comparison of Classification Methods for Time-Series Detection of Perspiration as a Liveness Test in Fingerprint Devices" , Lecture Notes in Computer Science, VoL 3072, pp. 256-263, 2004.
|
52 |
F. Hartung and M. Kutter, ..,Multimedia watermarking techniques"", Proc. IEEE, vol. 87, no. 7, July 1999, pp.1079-1107
|