1. Trang chủ
  2. » Luận Văn - Báo Cáo

Combination of physiological biometrics in cryptography for smart mobile devies

71 19 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 71
Dung lượng 1,32 MB

Nội dung

Ngày đăng: 22/01/2021, 20:30

Nguồn tham khảo

Tài liệu tham khảo Loại Chi tiết
[1] Joseph N. Pato and Lynette I. Millett, Biometric Recognition Challenges and Opportunities,National Research Council of the National Academes Press, 2010 Sách, tạp chí
Tiêu đề: Biometric Recognition Challenges and Opportunities
[2] Anil K. Jain, Arun Ross, and Salil Prabhakar, An introduction to biometric recognition, IEEE Trans. Circuits Syst. Video Techn., 14(1), pp. 4-20, 2004 Sách, tạp chí
Tiêu đề: An introduction to biometric recognition
[3] Tsutomu Matsumoto, Hiroyuki Matsumoto, Koji Yamada, and Satoshi Hoshino, Impact of artificial "gummy" fingers on fingerprint systems, Proceedings of the SPIE 4677: Optical Security and Counterfeit Deterrence Techniques IV, 2002 Sách, tạp chí
Tiêu đề: gummy
[4] Marie Sandstrửm, Liveness detection in fingerprint recognition system, http://www.diva- portal.org/liu/abstract.xsql?dbid=2397, 2004 Sách, tạp chí
Tiêu đề: Liveness detection in fingerprint recognition system
[5] Myth busters - episode 59, Crimes and myth-demeanors 2, http://dsc.discovery.com/fansites/mythbusters/mythbusters.html, 2006 Sách, tạp chí
Tiêu đề: Crimes and myth-demeanors 2
[6] Einar Jónsson, Co-Authentication: A Probabilistic Approach to Authentication, Master Thesis, Technical University of Denmark, 2007 Sách, tạp chí
Tiêu đề: Co-Authentication: A Probabilistic Approach to Authentication
[7] Astrid Albrecht, Understanding the issues behind user acceptance, Biometric Technology Today, 9(1), pp. 7-8, 2001 Sách, tạp chí
Tiêu đề: Understanding the issues behind user acceptance
[40] Libor Spacek’s Faces94 database, http://cswww.essex.ac.uk/mv/allfaces/faces94.html [41] Audio database AN4, http://www.speech.cs.cmu.edu/databases/an4/ Link
[8] D. Maltoni, D. Maio, A. K. Jain and S. Prabhakar, Handbook of Fingerprint Recognition, Springer-Verlag, 2003 Khác
[9] A. K. Jain, K. Nandakumar and A. Nagar, Biometric template security. EURASIP Journal on Advances in Signal Processing, vol. 2008, Article No. 113, 2008 Khác
[10] A. B. J. Teoh, A. Goh and D. C. L. Ngo, Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs, IEEE Transactions on Patt. Ana. and Mac. Intel. vol. 28, no. 12, 2006, pp. 1892-1901 Khác
[11] A. Goh and D. N. C. Ling, Computation of cryptographic keys from face biometrics, In A. Lioy and D. Mazzocchi, editors. Communications and Multi-media Security, Lecture Notes in Computer Science, Springer-Verlag, New York, vol. 2828, 2003, pp. 1-13 Khác
[12] C. S. Chin, A. T. B. Jin, and D. N. C. Ling, High security iris verification system based on random secret integration, Computer Vision and Image Understanding, vol. 102, no.2, 2006, pp. 169-177 Khác
[16] K. Nandakumar, A. Nagar and A. K. Jain, Hardening fingerprint fuzzy vault using password, In Proc. of 2nd Int. Conf. on Biometrics, Seoul, South Korea, 2007, pp. 927-937 [17] A. Juels and M. Wattenberg, A Fuzzy Commitment Scheme, 6th ACM Conf. onComputer and Communications Security, New York, 1999, pp. 28-36 Khác
[18] A. Juels and M. Sudan, A Fuzzy Vault Scheme, Journal Designs, Codes and Cryptography, vol. 38, no. 2, 2006, pp. 237-257 Khác
[19] Y. Dodis, R. Ostrovsky, L. Reyzin and A. Smith, Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. SIAMJ, Comp. vol. 38, no. 1, 2008, pp. 97-139 Khác
[20] T. T. Dang, Q. C. Truong, and T. K. Dang, Practical Construction of Face-based Authentication Systems with Template Protection Using Secure Sketch, Information &Communication Technology. Lecture Notes in Computer Science, vol. 7804, 2013, pp.121-130 Khác
[21] Q. Li, Y. Sutcu and N. Memon, Secure Sketch for biometric templates, Proc. of the 12th Int. Conf. on Theory and Application of Cryptology and Information Security, 2006, pp.99-113 Khác
[22] Y. Sutcu, Q. Li and N. Memon, How to Protect Biometric Templates, SPIE Proc. vol Khác
[26] C. Rathgeb and A. Uhl, Systematic construction of iris-based fuzzy commitment schemes, In Proc. of the 3rd Int. Conf. on Biometrics 2009 (ICB’09) LNCS: 5558, 2009, pp. 947-956 Khác

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN

w