Feature-based image metamorphosis
SIGGRAPH '92 Proceedings of the 19th annual conference on Computer graphics and interactive techniques
IEEE Spectrum
Wavelets and subband coding
IBM Systems Journal
Protecting digital media content
Communications of the ACM
Inside risks: the uses and abuses of biometrics
Communications of the ACM
Communications of the ACM
Fingerprint Matching Using Transformation Parameter Clustering
IEEE Computational Science & Engineering
Hidden digital watermarks in images
IEEE Transactions on Image Processing
Biometrics break-ins and band-aids
Pattern Recognition Letters - Special issue: Audio- and video-based biometric person authentication (AVBPA 2001)
Biometrics: past, present and future
Current security management & Ethical issues of information technology
PalmHashing: a novel approach for cancelable biometrics
Information Processing Letters
A secure biometric authentication scheme based on robust hashing
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
An improvement to a biometric.based multimedia content protection scheme
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Remarks on BioHash and its mathematical foundation
Information Processing Letters
Generating Cancelable Fingerprint Templates
IEEE Transactions on Pattern Analysis and Machine Intelligence
Perception and acceptance of fingerprint biometric technology
Proceedings of the 3rd symposium on Usable privacy and security
Biometric technologies and applications
AIAP'07 Proceedings of the 25th conference on Proceedings of the 25th IASTED International Multi-Conference: artificial intelligence and applications
Symmetric hash functions for secure fingerprint biometric systems
Pattern Recognition Letters
From Scores to Face Templates: A Model-Based Approach
IEEE Transactions on Pattern Analysis and Machine Intelligence
Modeling cryptographic properties of voice and voice-based entity authentication
Proceedings of the 2007 ACM workshop on Digital identity management
Hybrid architectures for efficient and secure face authentication in embedded systems
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Three measures for secure palmprint identification
Pattern Recognition
Cancellable biometrics and annotations on BioHash
Pattern Recognition
Privacy preserving multi-factor authentication with biometrics
Journal of Computer Security - The Second ACM Workshop on Digital Identity Management - DIM 2006
Multimodal authentication based on random projections and source coding
Proceedings of the 10th ACM workshop on Multimedia and security
Biometrics and information security
Proceedings of the 5th annual conference on Information security curriculum development
Gabor Filter-Based Fingerprint Anti-spoofing
ACIVS '08 Proceedings of the 10th International Conference on Advanced Concepts for Intelligent Vision Systems
The best of both worlds: Applying secure sketches to cancelable biometrics
Science of Computer Programming
Advances in fingerprint modeling
Image and Vision Computing
Non-intrusive liveness detection by face images
Image and Vision Computing
Privacy-Preserving Similarity Evaluation and Application to Remote Biometrics Authentication
MDAI '08 Sabadell Proceedings of the 5th International Conference on Modeling Decisions for Artificial Intelligence
Secure Computation for Privacy Preserving Biometric Data Retrieval and Authentication
EuroISI '08 Proceedings of the 1st European Conference on Intelligence and Security Informatics
The practical subtleties of biometric key generation
SS'08 Proceedings of the 17th conference on Security symposium
Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems
IEICE - Transactions on Information and Systems
Ridgelet-based fake fingerprint detection
Neurocomputing
Two-factor cancelable biometrics authenticator
Journal of Computer Science and Technology
An extended JADE-S based framework for developing secure Multi-Agent Systems
Computer Standards & Interfaces
Wavelet-based multiresolution analysis of ridges for fingerprint liveness detection
International Journal of Information and Computer Security
Theoretical Framework for Constructing Matching Algorithms in Biometric Authentication Systems
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Cancelable Biometrics with Perfect Secrecy for Correlation-Based Matching
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Efficient Biometric Verification in Encrypted Domain
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Systematic Construction of Iris-Based Fuzzy Commitment Schemes
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Feature fusion using Gabor filters and cooccurrence probabilities for fingerprint antispoofing
International Journal of Intelligent Systems Technologies and Applications
Empirical analysis of biometric technology adoption and acceptance in Botswana
Journal of Systems and Software
Cancelable Iris Biometrics Using Block Re-mapping and Image Warping
ISC '09 Proceedings of the 12th International Conference on Information Security
Secure speech template protection in speaker verification system
Speech Communication
A secure cryptosystem from palm vein biometrics
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
An efficient algorithm for the implementation of fingerprint authentication on smartcards
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
Chaos and NDFT-based spread spectrum concealing of fingerprint-biometric data into audio signals
Digital Signal Processing
Biometric cryptosystem using function based on-line signature recognition
Expert Systems with Applications: An International Journal
A Proposal of Efficient Remote Biometric Authentication Protocol
IWSEC '09 Proceedings of the 4th International Workshop on Security: Advances in Information and Computer Security
Secure Minutiae-Based Fingerprint Templates Using Random Triangle Hashing
IVIC '09 Proceedings of the 1st International Visual Informatics Conference on Visual Informatics: Bridging Research and Practice
An Intelligent Fingerprint-Biometric Image Scrambling Scheme
ICIC '07 Proceedings of the 3rd International Conference on Intelligent Computing: Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence
Expert Systems with Applications: An International Journal
Anonymous biometric access control based on homomorphic encryption
ICME'09 Proceedings of the 2009 IEEE international conference on Multimedia and Expo
Template protection for dynamic time warping based biometric signature authentication
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
PalmHashing: a novel approach for cancelable biometrics
Information Processing Letters
Biometric systems: privacy and secrecy aspects
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Development of a new cryptographic construct using palmprint-based fuzzy vault
EURASIP Journal on Advances in Signal Processing - Special issue on recent advances in biometric systems: a signal processing perspective
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
Multi-algorithm fusion with template protection
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
A performance driven methodology for cancelable face templates generation
Pattern Recognition
A secure digital camera based fingerprint verification system
Journal of Visual Communication and Image Representation
Privacy-enhancing fingerprint authentication using cancelable templates with passwords
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Text driven face-video synthesis using GMM and spatial correlation
SCIA'07 Proceedings of the 15th Scandinavian conference on Image analysis
Fingerprint hardening with randomly selected chaff minutiae
CAIP'07 Proceedings of the 12th international conference on Computer analysis of images and patterns
A hybrid approach for generating secure and discriminating face template
IEEE Transactions on Information Forensics and Security
Extended private information retrieval and its application in biometrics authentications
CANS'07 Proceedings of the 6th international conference on Cryptology and network security
Visual-based online signature verification using features extracted from video
Journal of Network and Computer Applications
Cancelable fingerprint templates using minutiae-based bit-strings
Journal of Network and Computer Applications
A formal study of the privacy concerns in biometric-based remote authentication schemes
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
Fingerprint template protection using fuzzy vault
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
Anonymous biometric access control
EURASIP Journal on Information Security - Special issue on enhancing privacy protection in multimedia systems
A matching algorithm secure against the wolf attack in biometric authentication systems
BioID_MultiComm'09 Proceedings of the 2009 joint COST 2101 and 2102 international conference on Biometric ID management and multimodal communication
A global-to-local scheme for imbalanced point matching
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Cancelable templates for sequence-based biometrics with application to on-line signature recognition
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans - Special issue on recent advances in biometrics
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans - Special issue on recent advances in biometrics
Blind authentication: a secure crypto-biometric verification protocol
IEEE Transactions on Information Forensics and Security
Information leakage in fuzzy commitment schemes
IEEE Transactions on Information Forensics and Security
Information Sciences: an International Journal
Privacy is essential for secure mobile devices
IBM Journal of Research and Development
Online signature verification with support vector machines based on LCSS kernel functions
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics - Special issue on gait analysis
Improving individual identification in security check with an EEG based biometric solution
BI'10 Proceedings of the 2010 international conference on Brain informatics
Journal of Network and Computer Applications
Challenge-response-based biometric image scrambling for secure personal identification
Future Generation Computer Systems
System accuracy estimation of SRAM-based device authentication
Proceedings of the 16th Asia and South Pacific Design Automation Conference
Attack against robust watermarking-based multimodal biometric recognition systems
BioID'11 Proceedings of the COST 2101 European conference on Biometrics and ID management
Eigen-model projections for protected on-line signature recognition
BioID'11 Proceedings of the COST 2101 European conference on Biometrics and ID management
Cancellable face biometrics system by combining independent component analysis coefficients
IWCF'10 Proceedings of the 4th international conference on Computational forensics
Pair-polar coordinate-based cancelable fingerprint templates
Pattern Recognition
A Proposal for a Privacy-preserving National Identity Card
Transactions on Data Privacy
Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security
Journal of Network and Computer Applications
Robust watermarking in iris recognition: application scenarios and impact on recognition performance
ACM SIGAPP Applied Computing Review
Using global knowledge of users' typing traits to attack keystroke biometrics templates
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
Wireless Personal Communications: An International Journal
Watermarking as a means to enhance biometric systems: a critical survey
IH'11 Proceedings of the 13th international conference on Information hiding
Two-factor biometric recognition with integrated tamper-protection watermarking
CMS'11 Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security
Identities, forgeries and disguises
International Journal of Information Technology and Management
Fingerprint authentication based on matching scores with other data
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
Cancelable key-based fingerprint templates
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
An integrated approach for head gesture based interface
Applied Soft Computing
Characterization, similarity score and uniqueness associated with perspiration pattern
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
A study of brute-force break-ins of a palmprint verification system
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Biometric recognition: how do i know who you are?
ICIAP'05 Proceedings of the 13th international conference on Image Analysis and Processing
Securing biometric templates for reliable identity authentication
ICIC'05 Proceedings of the 2005 international conference on Advances in Intelligent Computing - Volume Part II
An analysis on accuracy of cancelable biometrics based on biohashing
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
A lightweight secure mobile Payment protocol for vehicular ad-hoc networks (VANETs)
Electronic Commerce Research
Computer Standards & Interfaces
BioID: biometric-based identity management
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
Privacy protection in high security biometrics applications
ICEB'10 Proceedings of the Third international conference on Ethics and Policy of Biometrics and International Data Sharing
A crypto-biometric scheme based on iris-templates with fuzzy extractors
Information Sciences: an International Journal
Privacy preserving key generation for iris biometrics
CMS'10 Proceedings of the 11th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Secure iris recognition based on local intensity variations
ICIAR'10 Proceedings of the 7th international conference on Image Analysis and Recognition - Volume Part II
Transforming rectangular and polar iris images to enable cancelable biometrics
ICIAR'10 Proceedings of the 7th international conference on Image Analysis and Recognition - Volume Part II
ICIAR'10 Proceedings of the 7th international conference on Image Analysis and Recognition - Volume Part II
Two factor face authentication scheme with cancelable feature
IWBRS'05 Proceedings of the 2005 international conference on Advances in Biometric Person Authentication
The challenges raised by the privacy-preserving identity card
Cryptography and Security
Fooling a liveness-detecting capacitive fingerprint scanner
Cryptography and Security
Biometric Security from an Information-Theoretical Perspective
Foundations and Trends in Communications and Information Theory
Future Generation Computer Systems
Recursive hiding of biometrics-based secret sharing scheme using adversary structure
Information Processing Letters
Spiral cube for biometric template protection
ICISP'12 Proceedings of the 5th international conference on Image and Signal Processing
Biometrics inspired watermarking based on a fractional dual tree complex wavelet transform
Future Generation Computer Systems
SIRIS: secure IRIS authentication system
Proceedings of the Fifth International Conference on Security of Information and Networks
Wolf attack probability: a new security measure in biometric authentication systems
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
2^N discretisation of biophasor in cancellable biometrics
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Probabilistic random projections and speaker verification
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Changeable face representations suitable for human recognition
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
"3D Face": biometric template protection for 3d face recognition
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Robust hiding of fingerprint-biometric data into audio signals
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Optimum detection of multiplicative-multibit watermarking for fingerprint images
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Pyramid based interpolation for face-video playback in audio visual recognition
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Fake finger detection by finger color change analysis
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
An enhanced biometrics-based remote user authentication scheme using mobile devices
International Journal of Computational Intelligence Studies
Security performance evaluation for biometric template protection techniques
International Journal of Biometrics
M-Identity and its authentication protocol for secure mobile commerce applications
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
PalmHash Code vs. PalmPhasor Code
Neurocomputing
A Hybrid Approach for Biometric Template Security
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
Non-invertible and revocable iris templates using key-dependent wavelet transforms
Proceedings of the first ACM workshop on Information hiding and multimedia security
A bio-cryptographic system based on offline signature images
Information Sciences: an International Journal
Secure outsourced computation of iris matching
Journal of Computer Security
Journal of Intelligent Manufacturing
Two-factor face authentication using matrix permutation transformation and a user password
Information Sciences: an International Journal
Runtime adaptive multi-factor authentication for mobile devices
IBM Journal of Research and Development
Hi-index | 0.00 |
Because biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. It is important that such biometrics-based authentication systems be designed to withstand attacks when employed in security-critical applications, especially in unattended remote applications such as e-commerce. In this paper we outline the inherent strengths of biometrics-based authentication, identify the weak links in systems employing biometrics-based authentication, and present new solutions for eliminating some of these weak links. Although, for illustration purposes, fingerprint authentication is used throughout, our analysis extends to other biometrics-based methods.