1 |
N.K. Ratha, J.H. Connell, and R.M. Bolle, "Enhancing Security and Privacy in Biometrics-Based Authentication Systems," IBM Syst. J., vol. 40, no. 3, Jan. 2001, pp. 614-634.
|
2 |
T. Connie et al., "PalmHashing: A Novel Approach for Cancelable Biometrics," Inf. Process. Lett., vol. 93, no. 1, Jan. 2005, pp. 1-5.
DOI
ScienceOn
|
3 |
T. Kevenaar et al., "Face Recognition with Renewable and Privacy Preserving Binary Templates," IEEE Workshop Automatic Identification Advanced Technol., 2005, pp. 21-26.
|
4 |
Y. Sutcu, T. Sencar, and N. Memon, "A Secure Biometric Authentication Scheme Based on Robust Hashing," ACM Workshop on Multimedia and Security, 2005, pp. 111-116.
|
5 |
J.H. Ton and T. Kalker, "Robust Audio Hashing for Content Identification," Content-Based Multimedia Indexing, 2001.
|
6 |
Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data," Adv. Cryptology - EUROCRYPT, LNCS 3027, 2004, pp. 523-540.
|
7 |
A. Juels and M. Sudan, "A Fuzzy Vault Scheme," IEEE Int. Symp. Inf. Theory, 2002, p. 408.
|
8 |
A. Juels and M. Wattenberg, "A Fuzzy Commitment Scheme," ACM Conf. Computer Commun. Security, 1999, pp. 28-36.
|
9 |
G. Davida, Y. Frankel, and B.J. Matt, "On Enabling Secure Applications through Off-Line Biometric Identification," IEEE Symp. Security Privacy, 1998, pp. 148-157.
|
10 |
Y.K. Lee and I. Verbauwhede, "Secure and Low-Cost RFID Authentication Protocols," IEEE Int. Workshop Adaptive Wireless Networks, Nov. 2005.
|
11 |
K. Messer et al., "XM2VTSDB: The Extended M2VTS Database," Audio- and Video-Based Biometric Person Authentication, Mar. 1999, pp. 72-77.
|
12 |
Q. Li, Y. Sutcu, and N. Memon, "Secure Sketch for Biometric Templates," Adv. Cryptology - ASIACRYPT, LNCS 4284, 2006, pp. 99-113.
|
13 |
A.T.B. Jin, D.N.C. Ling, and A. Goh, "Biohashing: Two Factor Authentication Featuring Fingerprint Data and Tokenised Random Number," Patt. Recog., vol. 37, no. 11, Nov. 2004, pp. 2245-2255.
DOI
ScienceOn
|
14 |
A.B.J. Teoh, D.C.L. Ngo, and A. Goh, "An Integrated Dual Factor Authenticator Based on the Face Data and Tokenised Random Number," Int. Conf. Biometric Authentication, LNCS 3072, 2004, pp. 117-123.
|
15 |
A. Kong et al., "An Analysis of BioHashing and Its Variants," Pattern Recog., vol. 39, no. 7, July 2006, pp. 1359-1368.
DOI
ScienceOn
|
16 |
N. Ratha et al., "Cancelable Biometrics: A Case Study in Fingerprints," Int. Conf. Pattern Recog., vol. 4, 2006, pp. 370-373.
|
17 |
J.P. Linnartz and P. Tuyls, "New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates," Audioand Video-Based Biometric Person Authentication, LNCS 2688, 2003, pp. 393-402.
|
18 |
K. Simoens, P. Tuyls, and B. Preneel, "Privacy Weaknesses in Biometric Sketches," IEEE Symp. Security Privacy, 2009, pp. 188-203.
|
19 |
R. Ang, R. Safavi-Naini, and L. McAven, "Cancelable Key- Based Fingerprint Templates," Australasian Conf. Inf. Security Privacy, LNCS 3574, 2005, pp. 242-252.
|
20 |
N.K. Ratha et al., "Generating Cancelable Fingerprint Templates," IEEE Trans. Pattern Anal. Mach. Intell., vol. 29, no. 4, 2007, pp. 561-572.
|
21 |
Y.J. Lee et al., "One-Time Templates for Face Authentication," Int. Conf. Convergence Inf. Technol., Nov. 2007, pp. 1818-1823.
|
22 |
M. Turk and A. Pentland, "Eigenfaces for Recognition," J. Cognitive Neuroscience, vol. 3, no. 1, Jan. 1991, pp. 71-86.
DOI
ScienceOn
|
23 |
P.N. Belhumeur, J.P. Hespanha, and D.J. Kriegman, "Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection," IEEE Trans. Pattern Analysis Mach. Intell., vol. 19, no. 7, Oct. 1997, pp. 711-720.
DOI
ScienceOn
|
24 |
Y.J. Lee, Y.S. Chung, and K.Y. Moon, "Inverse Operation and Preimage Attack on Biohashing," IEEE Workshop Computational Intell. Biometrics: Theory, Algorithms, Appl., Mar. 2009, pp. 92-97.
|