Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection
IEEE Transactions on Pattern Analysis and Machine Intelligence
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Password hardening based on keystroke dynamics
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Handbook of Applied Cryptography
Handbook of Applied Cryptography
High Confidence Visual Recognition of Persons by a Test of Statistical Independence
IEEE Transactions on Pattern Analysis and Machine Intelligence
An Algorithmic Theory of Learning: Robust Concepts and Random Projection
FOCS '99 Proceedings of the 40th Annual Symposium on Foundations of Computer Science
Cryptographic Key Generation from Voice
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Secure smartcardbased fingerprint authentication
WBMA '03 Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications
Cancelable Biometric Filters for Face Recognition
ICPR '04 Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04) Volume 3 - Volume 03
AUTOID '05 Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies
Symmetric hash functions for fingerprint minutiae
ICAPR'05 Proceedings of the Third international conference on Pattern Recognition and Image Analysis - Volume Part II
Cancelable key-based fingerprint templates
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Automatic alignment of fingerprint features for fuzzy fingerprint vault
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Three measures for secure palmprint identification
Pattern Recognition
Cancellable biometrics and annotations on BioHash
Pattern Recognition
Pattern Recognition Letters
EURASIP Journal on Advances in Signal Processing
Template Protection for On-Line Signature-Based Recognition Systems
Biometrics and Identity Management
Geometric-Aligned Cancelable Fingerprint Templates
ICIAP '09 Proceedings of the 15th International Conference on Image Analysis and Processing
Secure speech template protection in speaker verification system
Speech Communication
Biometric cryptosystem using function based on-line signature recognition
Expert Systems with Applications: An International Journal
Biometric quantization through detection rate optimized bit allocation
EURASIP Journal on Advances in Signal Processing
Secure Minutiae-Based Fingerprint Templates Using Random Triangle Hashing
IVIC '09 Proceedings of the 1st International Visual Informatics Conference on Visual Informatics: Bridging Research and Practice
Expert Systems with Applications: An International Journal
Template protection for dynamic time warping based biometric signature authentication
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
Biometric systems: privacy and secrecy aspects
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Parameterized geometric alignment for minutiae-based fingerprint template protection
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
A performance driven methodology for cancelable face templates generation
Pattern Recognition
A hybrid approach for generating secure and discriminating face template
IEEE Transactions on Information Forensics and Security
Biometric recognition: overview and recent advances
CIARP'07 Proceedings of the Congress on pattern recognition 12th Iberoamerican conference on Progress in pattern recognition, image analysis and applications
Individual identification using personality traits
Journal of Network and Computer Applications
Cancelable fingerprint templates using minutiae-based bit-strings
Journal of Network and Computer Applications
Classification based revocable biometric identity code generation
BioID_MultiComm'09 Proceedings of the 2009 joint COST 2101 and 2102 international conference on Biometric ID management and multimodal communication
Cancelable templates for sequence-based biometrics with application to on-line signature recognition
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans - Special issue on recent advances in biometrics
Information Sciences: an International Journal
Reverse-engineer methods on a biometric hash algorithm for dynamic handwriting
Proceedings of the 12th ACM workshop on Multimedia and security
Face liveness detection from a single image with sparse low rank bilinear discriminative model
ECCV'10 Proceedings of the 11th European conference on Computer vision: Part VI
Template protection for security enhancement of a biometric face authentication system
Proceedings of the 2011 conference on Neural Nets WIRN10: Proceedings of the 20th Italian Workshop on Neural Nets
Privacy preserving facial and fingerprint multi-biometric authentication
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
Pair-polar coordinate-based cancelable fingerprint templates
Pattern Recognition
Fuzzy cyclic random mapping for face recognition based on MD-RiuLBP feature
CCBR'11 Proceedings of the 6th Chinese conference on Biometric recognition
Fingerprint template protection with minutiae-based bit-string for security and privacy preserving
Expert Systems with Applications: An International Journal
Biometric Security from an Information-Theoretical Perspective
Foundations and Trends in Communications and Information Theory
A secure biometric discretization scheme for face template protection
Future Generation Computer Systems
Orthogonal discriminant vector for face recognition across pose
Pattern Recognition
Proceedings of the CUBE International Information Technology Conference
2^N discretisation of biophasor in cancellable biometrics
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Probabilistic random projections and speaker verification
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Hardening fingerprint Fuzzy vault using password
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Biometric hashing based on genetic selection and its application to on-line signatures
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
On the realization of fuzzy identity-based identification scheme using fingerprint biometrics
Security and Communication Networks
Distance entropy as an information measure for binary biometric representation
CCBR'12 Proceedings of the 7th Chinese conference on Biometric Recognition
Chaotic random projection for cancelable biometric key generation
IScIDE'12 Proceedings of the third Sino-foreign-interchange conference on Intelligent Science and Intelligent Data Engineering
A Hybrid Approach for Biometric Template Security
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
POSTER: Secure authentication from facial attributeswith no privacy loss
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Towards standardizing trusted evidence of identity
Proceedings of the 2013 ACM workshop on Digital identity management
Two-factor face authentication using matrix permutation transformation and a user password
Information Sciences: an International Journal
Hi-index | 0.15 |
Biometric analysis for identity verification is becoming a widespread reality. Such implementations necessitate large-scale capture and storage of biometric data, which raises serious issues in terms of data privacy and (if such data is compromised) identity theft. These problems stem from the essential permanence of biometric data, which (unlike secret passwords or physical tokens) cannot be refreshed or reissued if compromised. Our previously presented biometric-hash framework prescribes the integration of external (password or token-derived) randomness with user-specific biometrics, resulting in bitstring outputs with security characteristics (i.e., noninvertibility) comparable to cryptographic ciphers or hashes. The resultant BioHashes are hence cancellable, i.e., straightforwardly revoked and reissued (via refreshed password or reissued token) if compromised. BioHashing furthermore enhances recognition effectiveness, which is explained in this paper as arising from the Random Multispace Quantization (RMQ) of biometric and external random inputs.