共 15 条
- [1] [Anonymous], P IEEE INT S INF THE
- [2] BOULT TE, 2007, P COMP VIS IN PRESS
- [3] Confusion/diffusion capabilities of some robust hash functions [J]. 2006 40TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1-4, 2006, : 1188 - 1193
- [4] On enabling secure applications through off-line biometric identification [J]. 1998 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1998, : 148 - 157
- [5] Juels A, 1999, 6TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P28, DOI 10.1145/319709.319714
- [6] NANDAKUMAR K, 2007, 2 INT C BIO IN PRESS
- [7] PURSER M, 1995, INTRO ERROR CORRECTI
- [8] SCHNEIER B, 1999, COMMUNICATION ACM, V42
- [9] COMMUNICATION THEORY OF SECRECY SYSTEMS [J]. BELL SYSTEM TECHNICAL JOURNAL, 1949, 28 (04): : 656 - 715
- [10] Biometric encryption™ using image processing [J]. OPTICAL SECURITY AND COUNTERFEIT DETERRENCE TECHNIQUES II, 1998, 3314 : 178 - 188