共 26 条
[1]
Jain A.K., Nandakumar K., Nagar A., Biometric template security, EURASIP Journal on Advances in Signal Processing, 2008, (2008)
[2]
Ratha N.K., Connell J.H., Bolle R.M., Enhancing security and privacy in biometrics-based authentication systems, IBM Systems Journal, 40, 3, pp. 614-634, (2001)
[3]
Ratha N.K., Chikkerur S., Connell J.H., Bolle R.M., Generating cancelable fingerprint templates, IEEE Transactions on Pattern Analysis and Machine Intelligence, 29, 4, pp. 561-572, (2007)
[4]
Juels A., Sudan M., A fuzzy vault scheme, Designs, Codes, and Cryptography, 38, 2, pp. 237-257, (2006)
[5]
Nandakumar K., Jain A.K., Pankanti S., Fingerprint-based fuzzy vault: Implementation and performance, IEEE Transactions on Information Forensics and Security, 2, 4, pp. 744-757, (2007)
[6]
Juels A., Wattenberg M., Fuzzy commitment scheme, Proceedings of the 6th ACM Conference on Computer and Communications Security (ACM CCS '99), pp. 28-36
[7]
Dodis Y., Reyzin L., Smith A., Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, 3027, pp. 523-540
[8]
Chang E.C., Roy S., Robust extraction of secret bits from minutiae, Proceedings of the 2nd International Conference on Biometrics (ICB '07), 4642, pp. 750-759, (2007)
[9]
Linnartz J.-P., Tuyls P., New shielding functions to enhance privacy and prevent misuse of biometrie templates, Proceedings of Audio-and Video-Based Biometrie Person Authentication (AVBPA '03), 2688, pp. 393-402, (2003)
[10]
Tuyls P., Akkermans A.H.M., Kevenaar T.A.M., Schrijen G.-J., Bazen A.M., Veldhuis R.N.J., Practical biometric authentication with template protection, Proceedings of the 5th International Conference on Audio-and Video-Based Biometric Person Authentication (AVBPA '05), 3546, pp. 436-446