Tài liệu tham khảo |
Loại |
Chi tiết |
[2] A. Juels and M. Wattenberg, "A fuzzy commitment scheme," Proceedings of the 6th ACM conference on Computer and communications security, pp. 28-36 , 1999 |
Sách, tạp chí |
Tiêu đề: |
A fuzzy commitment scheme |
|
[3] A. Juels and M. Sudan, "A Fuzzy Vault Scheme," Designs, Codes and Cryptography, vol. 38, no. 2, pp. 237-257, 2003 |
Sách, tạp chí |
Tiêu đề: |
A Fuzzy Vault Scheme |
|
[4] Y. Dodis, R. Ostrovsky, L. Reyzin and A. Smith, “Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data,” SIAM Journal on Computing, vol. 38, no. 1, pp. 97-139, 2008 |
Sách, tạp chí |
Tiêu đề: |
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data |
|
[5] U. Martini and S. Beinlich, "Virtual PIN: Biometric Encryption Using Coding Theory," in BIOSIG, 2003 |
Sách, tạp chí |
Tiêu đề: |
Virtual PIN: Biometric Encryption Using Coding Theory |
|
[6] Y. Sutcu, S. Rane, J. Yedidia, S. Draper and A. Vetro, "Feature Transformation of Biometric Templates for Secure Biometric Systems Based on Error Correcting Codes," IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp. 1-6, 2008 |
Sách, tạp chí |
Tiêu đề: |
Feature Transformation of Biometric Templates for Secure Biometric Systems Based on Error Correcting Codes |
|
[7] Q. Li, Y. Sutcu and N. Memon, "Secure Sketch for Biometric Templates," Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security, pp. 99-113, 2006 |
Sách, tạp chí |
Tiêu đề: |
Secure Sketch for Biometric Templates |
|
[8] F. Hao, R. Anderson and J. Daugman, “Combining cryptography with biometrics effectively,” University of Cambridge, 2005 |
Sách, tạp chí |
Tiêu đề: |
Combining cryptography with biometrics effectively |
|
[9] F. Fontein, K. Marshall, J. Rosenthal, D. Schipani and A.-L. Trautmann, "On Burst Error Correction and Storage Security of Noisy Data," CoRR, 2012 |
Sách, tạp chí |
Tiêu đề: |
On Burst Error Correction and Storage Security of Noisy Data |
|
[10] C. Soutar, D. Roberge, A. Stoianov, R. Gilroy and V. Kumar, "BiometricEncryption," ICSA Guide to Cryptography, 1999 |
Sách, tạp chí |
Tiêu đề: |
BiometricEncryption |
|
[11] F. Monrose, M. K. Reiter and S. Wetzel, "Password Hardening Based on Keystroke Dynamics.," in ACM Conference on Computer and Communications Security, 1999 |
Sách, tạp chí |
Tiêu đề: |
Password Hardening Based on Keystroke Dynamics |
|
[12] F. Monrose, M. K. Reiter, Q. Li and S. Wetzel, "Cryptographic Key Generation from Voice," in IEEE Symposium on Security and Privacy, 2001 |
Sách, tạp chí |
Tiêu đề: |
Cryptographic Key Generation from Voice |
|
[13] L. I. Smith, A tutorial on Principal Components Analysis, 2002. [14] "Hadamard matrix," [Online]. Available:http://en.wikipedia.org/wiki/Hadamard_matrix. [Accessed 31 May 2013] |
Sách, tạp chí |
|
[15] M. Zhang, B. Yang, W. Zhang and T. Takagi, “Multibiometric Based Secure Encryption and Authentication Scheme with Fuzzy Extractor,” I.J. Network Security, vol. 12, no. 1, pp. 50-57, 2011 |
Sách, tạp chí |
Tiêu đề: |
Multibiometric Based Secure Encryption and Authentication Scheme with Fuzzy Extractor |
|
[16] U. Uludag, S. Pankanti, S. Prabhakar and A. K. Jain, "Biometric Cryptosystems: Issues and Challenges," Proceedings of the IEEE, vol. 92, no. 6, pp.948-960, 2004 |
Sách, tạp chí |
Tiêu đề: |
Biometric Cryptosystems: Issues and Challenges |
|
[18] M. Turk and A. Pentland, "Eigenfaces for recognition," J. Cognitive Neuroscience, vol. 3, no. 1, pp. 71-86, 1991 |
Sách, tạp chí |
Tiêu đề: |
Eigenfaces for recognition |
|
[19] D. Schipani and J. Rosenthal, "Coding Solutions for the Secure Biometric Storage Problem," Proc. IEEE Information Theory Workshop 2010, 2010 |
Sách, tạp chí |
Tiêu đề: |
Coding Solutions for the Secure Biometric Storage Problem |
|
[20] C. Rathgeb and A. Uhl, "A survey on biometric cryptosystems and cancelable biometrics," EURASIP J. Information Security, p. 3, 2011 |
Sách, tạp chí |
Tiêu đề: |
A survey on biometric cryptosystems and cancelable biometrics |
|
[21] J. Leech and N. Sloane, "Sphere Packings and Error-correcting Codes," Can.J.Math., vol. 23, no. 4, pp. 718-74, 1971 |
Sách, tạp chí |
Tiêu đề: |
Sphere Packings and Error-correcting Codes |
|
[23] I. Buhan, J. Doumen and P. H. Hartel, "Fuzzy extractors for continuousdistributions," IACR Cryptology ePrint Archive, p. 545, 2009 |
Sách, tạp chí |
Tiêu đề: |
Fuzzy extractors for continuousdistributions |
|
[30] ORL database Cambridge University Engineering Department: http://www.cl.cam.ac.uk/research/dtg/attarchive/facedatabase.html [31] Yale database http://vision.ucsd.edu/content/yale-face-database |
Link |
|