Information Technology Reference
In-Depth Information
15. Wu, Y., Qiu, B.: Transforming a pattern identifier into biometric key generators. In: IEEE
International Conference on Multimedia and Expo (ICME), pp. 78-82 (2010)
16. Scheirer, W.J., Boult, T.E.: Cracking fuzzy vaults and biometric encryption. In: Proceedings
of the Biometrics Symposium, Baltimore, Md, USA (September 2007)
17. Nguyen, M.T., Truong, Q.H., Dang, T.K.: Enhance Fuzzy Vault Security using Nonran-
dom Chaff Point Generator. In: Dang, T.K., Wagner, R., Neuhold, E., Takizawa, M.,
Küng, J., Thoai, N. (eds.) FDSE 2014. LNCS, vol. 8860, pp. 204-219. Springer,
Heidelberg (2014)
18. Jin, A.T.B., Ling, D.N.C., Goh, A.: Bio hashing: two factor authentication featuring finger-
print data and tokenised random number. Pattern Recognition 37 (11), 2245-2255 (2004)
19. Kanade, S., et al.: Three factor scheme for biometric-based cryptographic key regeneration
using iris. In: Biometrics Symposium 2008 (BSYM 2008), pp. 59-64. IEEE (2008)
20. Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating cancelable fingerprint
templates. IEEE Transactions on Pattern Analysis and Machine Intelligence 29 (4),
561-572 (2007)
21. Sutcu, Y., Sencar, H.T., Memon, N.: A secure biometric authentication scheme based on
robust hashing. In: Proceedings of the 7th Workshop on Multimedia and Security, pp.
111-116. ACM (2005)
22. Baek, K., Draper, B.A., Beveridge, J.R., She, K.: PCA vs. ICA: A Comparison on the
FERET Data Set. In: Proc. of the 4th International Conference on Computer Vision (ICCV
2002), pp. 824-827 (2002)
23. Nguyen, V.N., Nguyen, V.Q., Nguyen, M.N.B., Dang, T.K.: Fuzzy Logic Weight Estima-
tion in Biometric-Enabled Co-authentication System. In: Linawati, Mahendra, M.S.,
Neuhold, E.J., Tjoa, A.M., You, I. (eds.) CT-EurAsia 2014. LNCS, vol. 8407, pp.
365-374. Springer, Heidelberg (2014)
Search WWH ::




Custom Search