Real Fuzzy Vault for Protecting Face Template |
Lee, Dae-Jong
(School of Electronics Engineering, Chugbuk National University)
Song, Chang-Kyu (School of Electronics Engineering, Chugbuk National University) Park, Sung-Moo (Department of Electricity, Hong Seong Campus, Korea Polytechnic College) Chun, Myung-Geun (School of Electronics Engineering, Chugbuk National University) |
1 | M. K. Muhammad, N. Marsono, Rabia Bakhteri. "Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm," Future Generation Computer Systems, Vol. 29, No. 3, pp. 800-810, 2013. DOI ScienceOn |
2 | A. Marinoa, F. H. Alvarezb, L. H. Encinasb, "A crypto-biometric scheme based on iris-templates with fuzzy extractors," Information Sciences, Vol. 195, 15, pp. 91-102, 2012. DOI ScienceOn |
3 | E. C. Chang and S. Roy, "Robust Extraction of Secret Bits From Minutiae," Proceedings of Second International Conference on Biometrics, pp. 750-759, 2007, |
4 | Dae Jong Lee, Yong-Nyuo Shin, Seon-Hong Park, Myung-Geun Chun, "RN-ECC Based Fuzzy Vault for Protecting Fingerprint Templates," International Journal of Fuzzy Logic and Intelligent Systems, vol. 11. no. 4, pp. 286-292, 2011. 과학기술학회마을 DOI ScienceOn |
5 | Juels A and Sudan M, "A fuzzy vault scheme," Proceeding of IEEE Int. Symposium on Information Theory, pp. 408, 2002. |
6 | P. Li, X. Yang, K. Cao, X. Tao, R. Wang, and J. Tian, "An alignment-free fingerprint cryptosystem based on fuzzy vault scheme," Journal of Network and Computer Applications, Vol. 33, No. 3, pp. 207-220, 2010. DOI ScienceOn |
7 | Y. Wang and K. N. Plataniotis, "fuzzy vault for face based cryptographic key generation," Proceedings of Biometrics Symposium, pp. 1-6, 2007. |
8 | F. Thomas, Z. Xuebing, and B. Christoph, "Fuzzy Vault for 3D face recognition systems," Int. Conf. on Intelligent information hiding and multimedia signal processing, pp. 1069-1074, 2008. |
9 | K. Moon, Error Correcting Code: Mathematical Methods and Algorithm, Wiley-Interscience, 2005 |
10 | T. Marshall, "Coding of real-number sequences for error correction: a digital signal processing problem," IEEE Journal of Selected Areas in Communication, Vol. 2, No. 2, pp. 381-392, 1984. DOI |
11 | A. Kumar and A. Makur, "Improved coding-theoretic and subspace-based decoding algorithms for a wider class of DCT and DST codes", IEEE Trans. on Signal Processing, Vol. 58, No. 2, pp. 695-708, 2010. DOI ScienceOn |
12 | M. Turk, A. Pentland, "Face recognition using eigenfaces", Proc. IEEE Conf. On Computer Vision and Pattern Recognition, pp. 586-591, 1991. |
13 | ORL face database, http://www.uk.research.att.com/facedatabase.html |
14 | L. Yiun Joo, P. Kang Ryong, L. Sung Joo, B. Kwanghyuk, K. Jaihie, "A new method for generating an invariant iris private key based on the fuzzy vault system," IEEE Trans. on System, Man, Cybernetics, Vol. 38, No. 5, pp.1302-1313, 2008. DOI ScienceOn |
15 | A. B. J. Teoh, Y. W. Kuan, S. LEE, "Cancellable Biometrics and Annotations on BioHash," Pattern Recognition, Vol. 41, No. 6, pp.2034-2044, 2008. DOI ScienceOn |