Browse > Article

워터마킹 기법을 이용한 생체정보 보호  

김태해 (고려대학교 컴퓨터정보학과)
정승환 (고려대학교 컴퓨터정보학과)
정용화 (고려대학교 컴퓨터정보학과)
문대성 (한국전자통신연구원)
문기영 (한국전자통신연구원)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 N. Ratha, J. Connell, and R. Bolle, 'An Analysis of Minutiae Matching Strength', Proc. of AVBPA 2001(LNCS 2091), pp. 223-228, 2001
2 A. Jain and U. Uludag, 'Hiding Fingerprint Minutiae in Images', Proc. of AutoID, pp. 97-102, 2002
3 T. Matsumoto, et. al.. 'Impact of Artificial Gummy Fingers on Fingerprint Systems', Optical Security and Counterfeit Deterrence Technique, Vol. 4673, pp. 275-289, 2002
4 A. Jain, U. Uludag, and R. Hsu, 'Hiding a Face in a Fingerprint Image', Proc. of ICPR, pp. 756-759, 2002
5 S. Pan, et aI., 'A Memory-Efficient Fingerprint Verification Algorithm using . A Multi-Resolution Accumulator Array for Match-on-Card', ETRI Journal, Vol. 25, No.3, pp. 179-186, 2003   DOI   ScienceOn
6 N. Ratha, J. Connell, and R. Bolle, 'Secure Data Hiding in Wavelet Compressed Fingerprint Images', Proc. of Multimedia, PP. 127-130, 2000
7 J. Cox. et. aI., Digital Watermarking, Morgan Kaufmann, 2001
8 M. Turk and A. Pentland, 'Eigenfaces for Recognition', Journal of Cognitive Neuroscience. Vol. 3. pp. 71-86, 1991   DOI   ScienceOn
9 Y. Lee, et aI., 'Local and Global Feature Extraction for Face Recognition'. LNCS 3546-A VBPA, pp. 219-228, 2005
10 B. Gunsel, U. Uludag, and A. Tekalp, 'Robust Watermarking of Fingerprint Images', Pattern Recognition, Vol. 35, pp. 2739-2747, 2002   DOI   ScienceOn
11 R. Dugad, K. Ratakonda, and N. Ahuja, 'A New Wavelet-based Scheme for Watermarking Images', Proc. of the ICIP. 1998
12 B. Schneier, 'The Uses and Abuses of Biometrics', Communications of the ACM, Vol. 42, No, 8, pp. 136, 1999
13 M. Yeung and S. Pankanti, ' Verification Watermarks on Fingerprint Recognition and Retrieval', Journal of Electronic Imaging, Vol. 9, No.4, pp. 468-476, 2002   DOI   ScienceOn