1 |
Tee Connie, Andrew Teoh, Michael Goh, and David Ngo,'PalmHashing : A novel approach for cancelable biometrics', Information processing letters, Vol. 93. pp 1-5, 2005
DOI
ScienceOn
|
2 |
T. Putte and J. Keuning, 'Biometrical fingerprint recognition: don't get your fingers burned', In Smart Card Research and advanced Applications, pages 289-303, Kluwer Academic Publisher, 2000
|
3 |
J. Daugman, 'Iris Recognition and AntiSpoofing Countermeasures', 7th International Biometrics Conference, 2004, London
|
4 |
Michael Arnold, Martin Schmucker and Stephen D. Wolthusen,'Techniques and Applications of Digital Watermarking and Content Protection', Artech House, 2003
|
5 |
Umut Uludag, Shrath Pankanti, and Anil K. Jain, 'Fuzzy Vault for Fingerprints', AVBPA 2005, LNCS 3546. pp. 310-319, 2005
|
6 |
G. Davida, B. Matt, Y. Frankel, R. Peralta,'On the relation of error correction and cryptography to an offline biometric based identification scheme', Workshop on Coding and Cryptography, January, 1999, Paris, France
|
7 |
이연주 이형구 박강령 김재희 '홍채코드 기반 생체 고유키 추출에 관한 연구' 2005년 대한전자공학회 추계학술대회, 서울대학교 2005.11.26
|
8 |
Hyung Gu Lee, Seungin Noh, Kwanghyuk Bae, Kang Ryoung Park, Jaihie Kim'Invariant Biometric Code Extraction', 2004 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS'04), November 18-19, 2004, Seoul, Korea
|
9 |
N.K. Ratha, J.H. Cornell and R.M. Bole, 'Enhancing security and privacy in biometrics-based authentication systems', IBM Systems Journal, Vol 40. No 3, pp. 614-634, 2001
DOI
ScienceOn
|
10 |
US Patent 6,836.554
|
11 |
WSQGray-Scale Fingerprint Image Compression Specification, IAFIS-IC-0110 v2, Federal Bureau of Investigation, Criminal Justice Information Services Division (1993)
|
12 |
T. Matsumoto, 'Artificial Fingers and Irises: Importance of Vulnerability Analysis', 7th International
|
13 |
http://ppw,kuleuven. be/labexppsy/purkinje. htm, (accessed on November 3, 2005)
|
14 |
Eui Chul Lee, Kang Ryoung Park, Jaihie Kim, 'Fake Iris Detection By Using the Purkinje Image', Lecture Notes in Computer Science (ICBA'06), J anuary 5-7, 2006
|
15 |
S.A.C. Schuckers, S.T.V. Parthasaradhi, R. Derakshani, and L. A. Hornak. 'Comparison of Classification Methods for Time-Series Detection of Perspiration as a Liveness Test in Fingerprint Devices', Lecture Notes in Computer Science, Vol. 3072, pp. 256-263, 2004
|
16 |
Soutar, C., Roberge, D.. Stoianov, A., Gilroy, R., Vijaya, B., 'Biometric Encryption: enrollment and verication procedures', Proc. SPIE Int. Soc. Opt. Eng., 3386 24-35 (1998)
|
17 |
M. Yeung and S. Pankanti, 'Verification Watermarks on Fingerprint Recognition and Retrieval' , Journal of Electronic Imaging 9, No.4, 468--476 (2000)
DOI
ScienceOn
|
18 |
G. Davida, B. Matt and Y. Frankel, 'On enabling secure application through off-line biometric identification', IEEE 1998 Symposium on Research in Security and Privacy, April 1998, Oakland, Ca
|
19 |
M. Sandstrom, 'Liveness Detection in Fingerprint Recognition Systems,' Master's Thesis, Linkoping University, Linkoping, Sweden, June 2004
|
20 |
http://berc.yonsei.ac.kr (accessed on Nov. 14, 2005)
|
21 |
A.K. Jain and U. Uludag, 'Hiding Fingerprint Minutiae in Images', Proc. of Third Workshop on Automatic Identification Advanced Technologies (AutoID), pp. 97-102, Tarrytown, New York, 11arch 14-15, 2002
|
22 |
A. K. Jain, U. Uludag and R.-L. Hsu, 'Hiding a Face in a Fingerprint Image', Proc. of ICPR. Quebec City, Canada, Aug., 2002
|
23 |
U. Uludag, S. Pankanti. S. Prabhakar and A. K. Jain, 'Biometric Cryptosysterns: Issues and Challenges', Proc. IEEE, vol. 92, no. 6, pp. 948-960, 2004
|
24 |
T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino, 'Impact of Artificial Gummy Fingers on Fingerprint Systems', Proc. of SPIE, Optical Security and Counterfeit Deterrence techniques IV, Vol. 4677, pp. 275-289, 2002
|
25 |
ELFA. Factsheet - PCB production. 2004. Available at http://www.elfa.se/ en/fakta.pdf(accessed on Dec. 5. 2004)
|
26 |
US Patent 5,719,950
|
27 |
R. Derakhshani, S.A.C. Schuckers. L.A. Hornak, and L.a. Gorman, 'Determination of vitality from a non-invasive biomedical measurement for use in fingerprint scanners'. Pattern Recognition, Vol. 36, pp. 383-396, 2003
DOI
ScienceOn
|
28 |
Sungjoo Lee, Kang Ryoung Park, Jaihie Kim, 'A Study on Fake Iris Detection based on the Reflectance of the Iris to the Sclera for Iris Recognition', ITC-CSCC 2005, pp. 1555-1556, Jeju, Korea, July 4-7, 2005
|
29 |
S. Schuckers. 'Spoofing and anti-spoofing measures', In Information Security Technical Report, volume 7, pages 56-62, 2002
|
30 |
L. Thalheim, J. Krissler, 'Body Check:Biometric Access Protection Devices and their Programs Put to the Test', ct magazine, November 2002
|
31 |
F. Hartung and M. Kutter, 'Multimedia watermarking techniques', Proc. IEEE, vol. 87, no. 7, July 1999, pp.1079-1107
|
32 |
Jaehyuck Lim, Hyobin Lee, Sangyoun Lee, Jaihie Kim, 'Invertible Watermarking Algorithmwith Detecting Locations of 11alicious Manipulation for Biometric Image Authentication', LNCS on International Conference on Biometrics, Jan, 2006
|
33 |
A. Juels and M. Sudan, 'A Fuzzy Vault Scheme', Proc. IEEE int'J. Symp. Information Theory, A. Lapidoth and E. Teletar, Eds., pp. 408, 2002
|
34 |
G. Wolberg. 'Image Morphing: A Survey.' The Visual Computer 14, pp. 360 - 372, 1998
DOI
ScienceOn
|
35 |
S.A.C. Schuckers, and A. Abhyankar, 'Detecting Liveness in Fingerprint Scanners Using Wavelets: Results of the Test Dataset', Lecture Notes in Computer Science, Vol. 3087pp. 100110, 2004
|
36 |
http://www.cl.cam.ac. uk/usershgd1000/ countermeasures. pdf, (accessed on June 9, 2005)
|
37 |
J. Daugman, 'Recognizing Persons by their Iris Patterns: Countermeasures against Subterfuge', Biometrics: Personal Identification in Networked Society, pp. 103-121
|