Browse > Article

Biometric System에서의 Privacy 보호 기술  

최경택 (연세대학교 전기전자공학부)
박강령 (상명대학교 미디어학부)
김재희 (연세대학교 전기전자공학부)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 Tee Connie, Andrew Teoh, Michael Goh, and David Ngo,'PalmHashing : A novel approach for cancelable biometrics', Information processing letters, Vol. 93. pp 1-5, 2005   DOI   ScienceOn
2 T. Putte and J. Keuning, 'Biometrical fingerprint recognition: don't get your fingers burned', In Smart Card Research and advanced Applications, pages 289-303, Kluwer Academic Publisher, 2000
3 J. Daugman, 'Iris Recognition and AntiSpoofing Countermeasures', 7th International Biometrics Conference, 2004, London
4 Michael Arnold, Martin Schmucker and Stephen D. Wolthusen,'Techniques and Applications of Digital Watermarking and Content Protection', Artech House, 2003
5 Umut Uludag, Shrath Pankanti, and Anil K. Jain, 'Fuzzy Vault for Fingerprints', AVBPA 2005, LNCS 3546. pp. 310-319, 2005
6 G. Davida, B. Matt, Y. Frankel, R. Peralta,'On the relation of error correction and cryptography to an offline biometric based identification scheme', Workshop on Coding and Cryptography, January, 1999, Paris, France
7 이연주 이형구 박강령 김재희 '홍채코드 기반 생체 고유키 추출에 관한 연구' 2005년 대한전자공학회 추계학술대회, 서울대학교 2005.11.26
8 Hyung Gu Lee, Seungin Noh, Kwanghyuk Bae, Kang Ryoung Park, Jaihie Kim'Invariant Biometric Code Extraction', 2004 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS'04), November 18-19, 2004, Seoul, Korea
9 N.K. Ratha, J.H. Cornell and R.M. Bole, 'Enhancing security and privacy in biometrics-based authentication systems', IBM Systems Journal, Vol 40. No 3, pp. 614-634, 2001   DOI   ScienceOn
10 US Patent 6,836.554
11 WSQGray-Scale Fingerprint Image Compression Specification, IAFIS-IC-0110 v2, Federal Bureau of Investigation, Criminal Justice Information Services Division (1993)
12 T. Matsumoto, 'Artificial Fingers and Irises: Importance of Vulnerability Analysis', 7th International
13 http://ppw,kuleuven. be/labexppsy/purkinje. htm, (accessed on November 3, 2005)
14 Eui Chul Lee, Kang Ryoung Park, Jaihie Kim, 'Fake Iris Detection By Using the Purkinje Image', Lecture Notes in Computer Science (ICBA'06), J anuary 5-7, 2006
15 S.A.C. Schuckers, S.T.V. Parthasaradhi, R. Derakshani, and L. A. Hornak. 'Comparison of Classification Methods for Time-Series Detection of Perspiration as a Liveness Test in Fingerprint Devices', Lecture Notes in Computer Science, Vol. 3072, pp. 256-263, 2004
16 Soutar, C., Roberge, D.. Stoianov, A., Gilroy, R., Vijaya, B., 'Biometric Encryption: enrollment and verication procedures', Proc. SPIE Int. Soc. Opt. Eng., 3386 24-35 (1998)
17 M. Yeung and S. Pankanti, 'Verification Watermarks on Fingerprint Recognition and Retrieval' , Journal of Electronic Imaging 9, No.4, 468--476 (2000)   DOI   ScienceOn
18 G. Davida, B. Matt and Y. Frankel, 'On enabling secure application through off-line biometric identification', IEEE 1998 Symposium on Research in Security and Privacy, April 1998, Oakland, Ca
19 M. Sandstrom, 'Liveness Detection in Fingerprint Recognition Systems,' Master's Thesis, Linkoping University, Linkoping, Sweden, June 2004
20 http://berc.yonsei.ac.kr (accessed on Nov. 14, 2005)
21 A.K. Jain and U. Uludag, 'Hiding Fingerprint Minutiae in Images', Proc. of Third Workshop on Automatic Identification Advanced Technologies (AutoID), pp. 97-102, Tarrytown, New York, 11arch 14-15, 2002
22 A. K. Jain, U. Uludag and R.-L. Hsu, 'Hiding a Face in a Fingerprint Image', Proc. of ICPR. Quebec City, Canada, Aug., 2002
23 U. Uludag, S. Pankanti. S. Prabhakar and A. K. Jain, 'Biometric Cryptosysterns: Issues and Challenges', Proc. IEEE, vol. 92, no. 6, pp. 948-960, 2004
24 T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino, 'Impact of Artificial Gummy Fingers on Fingerprint Systems', Proc. of SPIE, Optical Security and Counterfeit Deterrence techniques IV, Vol. 4677, pp. 275-289, 2002
25 ELFA. Factsheet - PCB production. 2004. Available at http://www.elfa.se/ en/fakta.pdf(accessed on Dec. 5. 2004)
26 US Patent 5,719,950
27 R. Derakhshani, S.A.C. Schuckers. L.A. Hornak, and L.a. Gorman, 'Determination of vitality from a non-invasive biomedical measurement for use in fingerprint scanners'. Pattern Recognition, Vol. 36, pp. 383-396, 2003   DOI   ScienceOn
28 Sungjoo Lee, Kang Ryoung Park, Jaihie Kim, 'A Study on Fake Iris Detection based on the Reflectance of the Iris to the Sclera for Iris Recognition', ITC-CSCC 2005, pp. 1555-1556, Jeju, Korea, July 4-7, 2005
29 S. Schuckers. 'Spoofing and anti-spoofing measures', In Information Security Technical Report, volume 7, pages 56-62, 2002
30 L. Thalheim, J. Krissler, 'Body Check:Biometric Access Protection Devices and their Programs Put to the Test', ct magazine, November 2002
31 F. Hartung and M. Kutter, 'Multimedia watermarking techniques', Proc. IEEE, vol. 87, no. 7, July 1999, pp.1079-1107
32 Jaehyuck Lim, Hyobin Lee, Sangyoun Lee, Jaihie Kim, 'Invertible Watermarking Algorithmwith Detecting Locations of 11alicious Manipulation for Biometric Image Authentication', LNCS on International Conference on Biometrics, Jan, 2006
33 A. Juels and M. Sudan, 'A Fuzzy Vault Scheme', Proc. IEEE int'J. Symp. Information Theory, A. Lapidoth and E. Teletar, Eds., pp. 408, 2002
34 G. Wolberg. 'Image Morphing: A Survey.' The Visual Computer 14, pp. 360 - 372, 1998   DOI   ScienceOn
35 S.A.C. Schuckers, and A. Abhyankar, 'Detecting Liveness in Fingerprint Scanners Using Wavelets: Results of the Test Dataset', Lecture Notes in Computer Science, Vol. 3087pp. 100110, 2004
36 http://www.cl.cam.ac. uk/usershgd1000/ countermeasures. pdf, (accessed on June 9, 2005)
37 J. Daugman, 'Recognizing Persons by their Iris Patterns: Countermeasures against Subterfuge', Biometrics: Personal Identification in Networked Society, pp. 103-121