The nature of statistical learning theory
The nature of statistical learning theory
Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection
IEEE Transactions on Pattern Analysis and Machine Intelligence
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Fractional-Step Dimensionality Reduction
IEEE Transactions on Pattern Analysis and Machine Intelligence
IEEE Transactions on Pattern Analysis and Machine Intelligence
Random projection in dimensionality reduction: applications to image and text data
Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining
The FERET Evaluation Methodology for Face-Recognition Algorithms
CVPR '97 Proceedings of the 1997 Conference on Computer Vision and Pattern Recognition (CVPR '97)
Regularized discriminant analysis for the small sample size problem in face recognition
Pattern Recognition Letters
Distance measures for PCA-based face recognition
Pattern Recognition Letters
Enhancing security and privacy in biometrics-based authentication systems
IBM Systems Journal - End-to-end security
Cancelable Biometric Filters for Face Recognition
ICPR '04 Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04) Volume 3 - Volume 03
Face Recognition with Renewable and Privacy Preserving Binary Templates
AUTOID '05 Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies
IEEE Transactions on Pattern Analysis and Machine Intelligence
An improved BioHashing for human authentication
Pattern Recognition
An analysis of BioHashing and its variants
Pattern Recognition
2D and 3D face recognition: A survey
Pattern Recognition Letters
One-Time Templates for Face Authentication
ICCIT '07 Proceedings of the 2007 International Conference on Convergence Information Technology
Cancellable biometrics and annotations on BioHash
Pattern Recognition
EURASIP Journal on Advances in Signal Processing
Local binary patterns for a hybrid fingerprint matcher
Pattern Recognition
Face recognition with biometric encryption for privacy-enhancing self-exclusion
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
A performance driven methodology for cancelable face templates generation
Pattern Recognition
A hybrid approach for generating secure and discriminating face template
IEEE Transactions on Information Forensics and Security
Adaptive nonlinear manifolds and their applications to pattern recognition
Information Sciences: an International Journal
Information leakage in fuzzy commitment schemes
IEEE Transactions on Information Forensics and Security
Reverse-engineer methods on a biometric hash algorithm for dynamic handwriting
Proceedings of the 12th ACM workshop on Multimedia and security
Nonlinear dimensionality reduction using a temporal coherence principle
Information Sciences: an International Journal
Distance metrics for high dimensional nearest neighborhood recovery: Compression and normalization
Information Sciences: an International Journal
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Feature extraction using a fast null space based linear discriminant analysis algorithm
Information Sciences: an International Journal
Two factor face authentication scheme with cancelable feature
IWBRS'05 Proceedings of the 2005 international conference on Advances in Biometric Person Authentication
Protecting Biometric Templates With Sketch: Theory and Practice
IEEE Transactions on Information Forensics and Security - Part 2
Biometric hash: high-confidence face recognition
IEEE Transactions on Circuits and Systems for Video Technology
Face recognition by independent component analysis
IEEE Transactions on Neural Networks
Video-Based Face Spoofing Detection through Visual Rhythm Analysis
SIBGRAPI '12 Proceedings of the 2012 25th SIBGRAPI Conference on Graphics, Patterns and Images
Hi-index | 0.07 |
Although authentication using biometric techniques is convenient, security issues such as the loss of personal bio-information are serious problems. However, the development of a secure biometrics scheme poses considerable challenges because users' bio-information is not precisely the same for each authentication attempt. This uncertainty during the authentication process obstructs direct application of cryptographic one-way functions in the authentication system. In this paper, we suggest a two-factor face authentication scheme using matrix transformations and a user password. Our scheme is designed with a secure cancellation feature, in that templates composed of permutation and feature vectors can be freely changed. Through experimental scenarios and results, we introduce the notable features of our scheme. Furthermore, we consider possible attacks on the proposed scheme and suggest security enhancement methods.