Browse > Article

바이오메트릭스 프라이버시 및 보안 기법에 대한 연구  

Kim, Hyejin (인하대학교 컴퓨터공학과)
Lee, KyungHee (수원대학교 전기공학과)
Nyang, DaeHun (인하대학교 컴퓨터공학과)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 V.M. Patel, N.K. Ratha, and R. Chellappa, "Cancelable biometrics :A review," IEEE Signal Processing Magazine, vol. 32(5), pp. 54-65, Sept. 2015   DOI
2 J.K. Pillai, V.M. Ptel, R. Chellappa, and N.K. Ratha, "Secure and robust iris recognition using random projections and sparse representations," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 33(9), pp. 1877-1893, 2011   DOI
3 J. Kang, D. Nyang, and K.Lee, "Two-factor face authentication using matrix permutation transformation and a user password," Information Sciences, 269, pp. 1-20, 2014   DOI
4 A.T.B. Jin, D.N.C. Ling, and A.Goh, "Biohashing: two factor authentication featuring fingerprint data and tokenised random number," Pattern recognition, vol. 37(11), pp. 2245-2255, 2014   DOI
5 J. Zuo, N.K. Ratha and, J.H. Connell, "Cancelable iris biometric" Pattern Recognition, 2008. ICPR 2008. 19th International Conference on, pp. 1-4, 2008
6 A. Juels and M. Wattenberg, "A fuzzy commitment scheme," Proc. ACM Conf. Compter and Communications Security, pp. 28-36, 1999
7 A. Juels and M. Sudan, "A fuzzy vault scheme," Information Theory, 2002. Proc. IEEE International Symposium, pp. 408, 2002
8 W.J. Scheirer and T.E. Boult, "Bio-cryptographic protocols with bipartite biotokens," Biometrics Symposium, BSYM'08, pp. 9-16, 2008
9 C. Rathgeb F. Breitinger and C. Busch, "Alignment-free cancelable iris biometric templates based on adaptive bloom filters," Biometrics (ICB) 2013 International Conference, pp. 1-8, 2013
10 김재성, 이새움, "생체신호를 이용한 텔레바이오 인식기술 동향 및 전망," 정보보호학회지, 26(4), pp. 41-46, 2016
11 A. Kong, K.H. Cheung, D. Zhang, M. Kamel, and J. You "An analysis of BioHashing and its variants," Pattern Recognition, 39(7), pp. 1359-1368, 2006   DOI
12 Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," Int. conference on the theory and applications of cryptographic techniques, pp. 523-540, 2004