On-Line Fingerprint Verification
IEEE Transactions on Pattern Analysis and Machine Intelligence
IEEE Transactions on Pattern Analysis and Machine Intelligence
Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society
High Confidence Visual Recognition of Persons by a Test of Statistical Independence
IEEE Transactions on Pattern Analysis and Machine Intelligence
Fingerprint Indexing Based on Novel Features of Minutiae Triplets
IEEE Transactions on Pattern Analysis and Machine Intelligence
Online Palmprint Identification
IEEE Transactions on Pattern Analysis and Machine Intelligence
Journal of Cognitive Neuroscience
PalmHashing: a novel approach for cancelable biometrics
Information Processing Letters
Cancellable biometerics featuring with tokenised random number
Pattern Recognition Letters
An introduction to biometric recognition
IEEE Transactions on Circuits and Systems for Video Technology
Remarks on BioHash and its mathematical foundation
Information Processing Letters
Cancellable biometrics and annotations on BioHash
Pattern Recognition
Near Infrared Face Based Biometric Key Binding
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Multi-factor biometrics for authentication: a false sense of security
Proceedings of the 12th ACM workshop on Multimedia and security
Pair-polar coordinate-based cancelable fingerprint templates
Pattern Recognition
From features extraction to strong security in mobile environment: a new hybrid system
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Hi-index | 0.00 |
Biometric authentication has attracted substantial attention over the past few years. It has been reported recently that a new technique called FaceHashing, which is proposed for personal authentication using face images, has achieved perfect accuracy and zero equal error rates (EER). In this paper, we are going to reveal that the secret of FaceHashing in achieving zero EER is based on a false assumption. This is done through simulating the claimants’ experiments. Thus, we would like to alert the use of “safe” token.