TY - JOUR AU - Jain, A. K. AU - Ross, A. AU - Prabhakar, S. PY - 2004 DA - 2004// TI - An introduction to biometric recognition JO - IEEE Trans Circ Syst Video Technol VL - 14 ID - Jain2004 ER - TY - JOUR AU - Cappelli, R. AU - Lumini, A. AU - Maio, D. AU - Maltoni, D. PY - 2007 DA - 2007// TI - Fingerprint image reconstruction from standard templates JO - IEEE Trans Pattern Anal Mach Intell VL - 29 ID - Cappelli2007 ER - TY - JOUR AU - Ross, A. AU - Shah, J. AU - Jain, A. K. PY - 2007 DA - 2007// TI - From template to image: reconstructing fingerprints from minutiae points JO - IEEE Trans Pattern Anal Mach Intell VL - 29 ID - Ross2007 ER - TY - CHAP AU - Jain, A. K. AU - Nandakumar, K. AU - Nagar, A. PY - 2008 DA - 2008// TI - Biometric template security BT - EURASIP J Adv Signal Process ID - Jain2008 ER - TY - CHAP AU - Luo, Y. AU - Cheung, S. S. AU - Ye, S. PY - 2009 DA - 2009// TI - Anonymous biometric access control based on homomorphic encryption BT - ICME'09: Proc of the 2009 IEEE Int Conf on Multimedia and Expo ID - Luo2009 ER - TY - CHAP AU - Upmanyu, M. AU - Namboodiri, A. M. AU - Srinathan, K. AU - Jawahar, C. V. PY - 2009 DA - 2009// TI - Efficient biometric verification in encrypted domain BT - ICB '09: Proc of the Third Int Conf on Biometrics ID - Upmanyu2009 ER - TY - STD TI - SPEED: (Signal Processing in the Encrypted Domain) project.[http://www.speedproject.eu/] UR - http://www.speedproject.eu/ ID - ref7 ER - TY - JOUR AU - Uludag, U. AU - Pankanti, S. AU - Prabhakar, S. AU - Jain, A. K. PY - 2004 DA - 2004// TI - Biometric cryptosystems: issues and challenges JO - Proc IEEE VL - 92 ID - Uludag2004 ER - TY - CHAP AU - Cavoukian, A. AU - Stoianov, A. PY - 2009 DA - 2009// TI - Biometric encryption BT - Encyclopedia of Biometrics ID - Cavoukian2009 ER - TY - CHAP AU - Cavoukian, A. AU - Stoianov, A. PY - 2009 DA - 2009// TI - Biometric encryption: the new breed of untraceable biometrics BT - Biometrics: Fundamentals, Theory, and Systems PB - Wiley CY - London ID - Cavoukian2009 ER - TY - CHAP AU - Jain, A. K. AU - Ross, A. PY - 2005 DA - 2005// TI - U Uludag, Biometric template security: Challenges and solutions BT - Proc of European Signal Processing Conf (EUSIPCO) ID - Jain2005 ER - TY - JOUR AU - Ratha, N. K. AU - Connell, J. H. AU - Bolle, R. M. PY - 2001 DA - 2001// TI - Enhancing security and privacy in biometrics-based authentication systems JO - IBM Syst J VL - 40 ID - Ratha2001 ER - TY - JOUR AU - Dodis, Y. AU - Ostrovsky, R. AU - Reyzin, L. AU - Smith, A. PY - 2004 DA - 2004// TI - Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data JO - Proc Eurocrypt VL - 2004 ID - Dodis2004 ER - TY - JOUR AU - Verbitskiy, E. A. AU - Tuyls, P. AU - Obi, C. AU - Schoenmakers, B. AU - Ŝkorić, B. PY - 2010 DA - 2010// TI - Key extraction from general nondiscrete signals JO - IEEE Trans Inf Forensic Secur VL - 5 ID - Verbitskiy2010 ER - TY - CHAP AU - Juels, A. AU - Wattenberg, M. PY - 1999 DA - 1999// TI - A fuzzy commitment scheme BT - 6th ACM Conf on Computer and Communications Security ID - Juels1999 ER - TY - CHAP AU - Juels, A. AU - Sudan, M. PY - 2002 DA - 2002// TI - A fuzzy vault scheme BT - Proc 2002 IEEE Int Symp on Information Theory ID - Juels2002 ER - TY - JOUR AU - Nagar, A. AU - Nandakumar, K. AU - Jain, A. PY - 2010 DA - 2010// TI - A hybrid biometric cryptosystem for securing fingerprint minutiae templates JO - Pattern Recogn Lett VL - 31 ID - Nagar2010 ER - TY - CHAP AU - Monrose, F. AU - Reiter, M. K. AU - Li, Q. AU - Wetzel, S. PY - 2001 DA - 2001// TI - Cryptographic key generation from voice BT - SP '01: Proc of the 2001 IEEE Symp on Security and Privacy ID - Monrose2001 ER - TY - CHAP AU - Monrose, F. AU - Reiter, M. K. AU - Wetzel, S. PY - 1999 DA - 1999// TI - Password hardening based on keystroke dynamics BT - Proc of 6th ACM Conf on Computer and Communications Security, CCCS ID - Monrose1999 ER - TY - CHAP AU - Soutar, C. AU - Tomko, G. J. AU - Schmidt, G. J. PY - 1996 DA - 1996// TI - Fingerprint controlled public key cryptographic system BT - US Patent ID - Soutar1996 ER - TY - JOUR AU - Feng, H. AU - Wah, C. C. PY - 2002 DA - 2002// TI - Private key generation from on-line handwritten signatures JO - Inf Manag Comput Secur VL - 10 ID - Feng2002 ER - TY - JOUR AU - Vielhauer, C. AU - Steinmetz, R. AU - Mayerhöfer, A. PY - 2002 DA - 2002// TI - Biometric hash based on statistical features of online signatures JO - Proc of the 16 th Int Conf on Pattern Recognition (ICPR'02) VL - 1 ID - Vielhauer2002 ER - TY - CHAP AU - Monrose, F. AU - Reiter, M. K. AU - Li, Q. AU - Wetzel, S. PY - 2001 DA - 2001// TI - Using Voice to Generate Cryptographic Keys BT - Proc 2001: A Speaker Odyssey, The Speech Recognition Workshop ID - Monrose2001 ER - TY - CHAP AU - Vielhauer, C. PY - 2006 DA - 2006// TI - Biometric User Authentication for IT Security BT - Advances in Information Security ID - Vielhauer2006 ER - TY - CHAP AU - Ballard, L. AU - Kamara, S. AU - Monrose, F. AU - Reiter, M. PY - 2007 DA - 2007// TI - On the requirements of biometric key generators, Technical Report TR-JHU-SPARBKMR- 090707 BT - Submitted and available as JHU Department of Computer Science Technical Report ID - Ballard2007 ER - TY - CHAP AU - Ballard, L. AU - Kamara, S. AU - Reiter, M. K. PY - 2008 DA - 2008// TI - The practical subtleties of biometric key generation BT - SS'08: Proc of the 17th Conf on Security symposium ID - Ballard2008 ER - TY - CHAP AU - Jain, A. K. AU - Flynn, P. J. AU - Ross, A. A. PY - 2008 DA - 2008// BT - Handbook of Biometrics ID - Jain2008 ER - TY - JOUR AU - Soutar, C. AU - Roberge, D. AU - Stoianov, A. AU - Gilroy, R. AU - Kumar, B. V. PY - 1998 DA - 1998// TI - Biometric encryption--enrollment and verification procedures JO - Proc SPIE, Optical Pattern Recognition IX VL - 3386 ID - Soutar1998 ER - TY - JOUR AU - Soutar, C. AU - Roberge, D. AU - Stoianov, A. AU - Gilroy, R. AU - Kumar, B. V. PY - 1998 DA - 1998// TI - Biometric encryption using image processing JO - Proc SPIE, Optical Security and Counterfeit Deterrence Techniques II VL - 3314 ID - Soutar1998 ER - TY - CHAP AU - Soutar, C. AU - Roberge, D. AU - Stoianov, A. AU - Gilroy, R. AU - Kumar, B. V. PY - 1999 DA - 1999// BT - Biometric encryption, ICSA Guide to Cryptography ID - Soutar1999 ER - TY - CHAP AU - Soutar, C. AU - Roberge, D. AU - Stoianov, A. AU - Gilroy, R. AU - Kumar, B. V. PY - 2001 DA - 2001// TI - Method for secure key management using a biometrics BT - US Patent ID - Soutar2001 ER - TY - JOUR AU - Hao, F. AU - Anderson, R. AU - Daugman, J. PY - 2006 DA - 2006// TI - Combining cryptography with biometrics effectively JO - IEEE Trans Comput VL - 55 ID - Hao2006 ER - TY - CHAP AU - Bringer, J. AU - Chabanne, H. AU - Cohen, G. AU - Kindarji, B. AU - Źemor, G. PY - 2007 DA - 2007// TI - Optimal iris fuzzy sketches BT - Proc 1st IEEE Int Conf on Biometrics: Theory, Applications, and Systems (BTAS'07) ID - Bringer2007 ER - TY - JOUR AU - Bringer, J. AU - Chabanne, H. AU - Cohen, G. AU - Kindarji, B. AU - Źemor, G. PY - 2008 DA - 2008// TI - Theoretical and practical boundaries of binary secure sketches JO - IEEE Trans Inf Forensic Secur VL - 3 ID - Bringer2008 ER - TY - CHAP AU - Rathgeb, C. AU - Uhl, A. PY - 2009 DA - 2009// TI - Systematic construction of iris-based fuzzy commitment schemes BT - Proc of the 3rd Int Conf on Biometrics 2009 (ICB'09) ID - Rathgeb2009 ER - TY - CHAP AU - Rathgeb, C. AU - Uhl, A. PY - 2009 DA - 2009// TI - Context-based texture analysis for secure revocable iris-biometric key generation BT - Proc of the 3rd Int Conf on Imaging for Crime Detection and Prevention, ICDP '09 ID - Rathgeb2009 ER - TY - CHAP AU - Zhang, L. AU - Sun, Z. AU - Tan, T. AU - Hu, S. PY - 2009 DA - 2009// TI - Robust biometric key extraction based on iris cryptosystem BT - Proc of the 3rd Int Conf on Biometrics 2009 (ICB'09) ID - Zhang2009 ER - TY - CHAP AU - Ignatenko, T. AU - Willems, F. PY - 2009 DA - 2009// TI - Achieving secure fuzzy commitment scheme for optical pufs BT - Int Conf on Intelligent Information Hiding and Multimedia Signal Processing ID - Ignatenko2009 ER - TY - CHAP AU - Rathgeb, C. AU - Uhl, A. PY - 2010 DA - 2010// TI - Adaptive fuzzy commitment scheme based on iris-code error analysis BT - Proc of the 2nd European Workshop on Visual Information Processing (EUVIP'10) ID - Rathgeb2010 ER - TY - JOUR AU - Teoh, A. AU - Kim, J. PY - 2007 DA - 2007// TI - Secure biometric template protection in fuzzy commitment scheme JO - IEICE Electron Express VL - 4 ID - Teoh2007 ER - TY - CHAP AU - Goh, A. AU - Ngo, D. C. L. PY - 2003 DA - 2003// TI - Computation of cryptographic keys from face biometrics BT - Communications and Multimedia Security ID - Goh2003 ER - TY - CHAP AU - Zeng, Z. AU - Watters, P. A. PY - 2007 DA - 2007// TI - A novel face hashing method with feature fusion for biometric cryptosystems BT - European Conference on Universal Multiservice Networks ID - Zeng2007 ER - TY - CHAP AU - Ao, M. AU - Li, S. Z. PY - 2009 DA - 2009// TI - Near infrared face based biometric key binding BT - Proc of the 3rd Int Conf on Biometrics 2009 (ICB'09) ID - Ao2009 ER - TY - CHAP AU - Tong, V. AU - Sibert, H. AU - Lecoeur, J. AU - Girault, M. PY - 2007 DA - 2007// TI - Biometric fuzzy extractors made practical: a proposal based on fingercodes BT - Int Conf on Biometrics ID - Tong2007 ER - TY - CHAP AU - Nandakumar, K. PY - 2010 DA - 2010// TI - A fingerprint cryptosystem based on minutiae phase spectrum BT - Proc of IEEE Workshop on Information Forensics and Security (WIFS) ID - Nandakumar2010 ER - TY - JOUR AU - Van der Veen, M. AU - Kevenaar, T. AU - Schrijen, G. -. J. AU - Akkermans, T. H. AU - Zuo, F. PY - 2006 DA - 2006// TI - Face biometrics with renewable templates JO - SPIE Proc on Security, Steganography, and Watermarking of Multimedia Contents VL - 6072 ID - Van der Veen2006 ER - TY - CHAP AU - Lu, H. AU - Martin, K. AU - Bui, F. AU - Plataniotis, K. AU - Hatzinakos, D. PY - 2009 DA - 2009// TI - Face recognition with biometric encryption for privacy-enhancing self exclusion BT - Proc of the 16th Int Conf on Digital Signal Processing (DSP 2009) ID - Lu2009 ER - TY - JOUR AU - Maiorana, E. AU - Campisi, P. AU - Neri, A. PY - 2008 DA - 2008// TI - User adaptive fuzzy commitment for signature templates protection and renewability JO - SPIE J Elec Imaging Spec Sect Biomet Adv Secur Usability Interoper VL - 17 ID - Maiorana2008 ER - TY - JOUR AU - Maiorana, E. AU - Campisi, P. PY - 2010 DA - 2010// TI - Fuzzy commitment for function based signature template protection JO - IEEE Signal Process Lett VL - 17 ID - Maiorana2010 ER - TY - JOUR AU - Zheng, G. AU - Li, W. AU - Zhan, C. PY - 2006 DA - 2006// TI - Cryptographic key generation from biometric data using lattice mapping JO - 18th Int Conf on Pattern Recognition (ICPR 2006) VL - 4 ID - Zheng2006 ER - TY - CHAP AU - Linnartz, J. -. P. AU - Tuyls, P. PY - 2003 DA - 2003// TI - New shielding functions to enhance privacy and prevent misuse of biometric templates BT - Proc 4th Int Conf Audio- And Video-Based Biometric Person Authentication ID - Linnartz2003 ER - TY - JOUR AU - Tuyls, P. AU - Akkermans, A. H. M. AU - Kevenaar, T. A. M. AU - Schrijen, G. J. AU - Bazen, A. M. AU - Veldhuis, R. N. J. PY - 2005 DA - 2005// TI - Practical biometric authentication with template protection JO - Proc Audio-and Video-Based Biometrie Person Authentication VL - 3546 ID - Tuyls2005 ER - TY - CHAP AU - Buhan, I. R. AU - Doumen, J. M. AU - Hartel, P. H. AU - Veldhuis, R. N. J. PY - 2007 DA - 2007// BT - Constructing practical fuzzy extractors using QIM, Centre for Telematics and Information Technology, University of Twente, Enschede, Technical Report TR-CTIT-07-52 ID - Buhan2007 ER - TY - CHAP AU - Li, H. AU - Wang, M. AU - Pang, L. AU - Zhang, W. PY - 2009 DA - 2009// TI - Key binding based on biometric shielding functions BT - IAS ID - Li2009 ER - TY - CHAP AU - Clancy, T. C. AU - Kiyavash, N. AU - Lin, D. J. PY - 2003 DA - 2003// TI - Secure smartcard-based fingerprint authentication BT - Proc ACM SIGMM 2003 Multimedia, Biometrics Methods and Applications Workshop ID - Clancy2003 ER - TY - JOUR AU - Nandakumar, K. AU - Jain, A. K. AU - Pankanti, S. PY - 2007 DA - 2007// TI - Fingerprint-based fuzzy vault: implementation and performance JO - IEEE Trans Inf Forensic Secur VL - 2 ID - Nandakumar2007 ER - TY - CHAP AU - Uludag, U. AU - Jain, A. K. PY - 2004 DA - 2004// TI - Fuzzy fingerprint vault BT - Proc Workshop: Biometrics: Challenges Arising from Theory to Practice ID - Uludag2004 ER - TY - CHAP AU - Uludag, U. AU - Jain, A. K. PY - 2006 DA - 2006// TI - Securing fingerprint template: fuzzy vault with helper data BT - Proc IEEE Workshop on Privacy Research In Vision ID - Uludag2006 ER - TY - JOUR AU - Yang, S. AU - Verbauwhede, I. PY - 2005 DA - 2005// TI - Automatic secure fingerprint verification system based on fuzzy vault scheme JO - Proc of IEEE Int Conf Audio, Speech and Signal Processing (ICASSP'05) VL - 5 ID - Yang2005 ER - TY - CHAP AU - Chung, Y. AU - Moon, D. AU - Lee, S. AU - Jung, S. AU - Kim, T. AU - Ahn, D. PY - 2005 DA - 2005// TI - Automatic alignment of fingerprint features for fuzzy fingerprint vault BT - Proc of Conf on Information Security and Cryptology ID - Chung2005 ER - TY - JOUR AU - Li, P. AU - Yang, X. AU - Cao, K. AU - Tao, X. AU - Wang, R. AU - Tian, J. PY - 2010 DA - 2010// TI - An alignment free fingerprint cryptosystem based on fuzzy vault scheme JO - J Netw Comput Appl VL - 33 ID - Li2010 ER - TY - CHAP AU - Jeffers, J. AU - Arakala, A. PY - 2006 DA - 2006// TI - Minutiae-based structures for a fuzzy vault BT - Proc of the Biometric Consortium Conf 2006 ID - Jeffers2006 ER - TY - CHAP AU - Moon, D. AU - Choi, W. -. Y. AU - Moon, K. AU - Chung, Y. PY - 2009 DA - 2009// TI - Fuzzy fingerprint vault using multiple polynomials BT - IEEE 13th Int Symposium on Consumer Electronics, ISCE '09 ID - Moon2009 ER - TY - JOUR AU - Nagar, A. AU - Chaudhury, S. PY - 2006 DA - 2006// TI - Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme JO - 18th Int Conf on Pattern Recognition (ICPR'06) VL - ICPR 4 ID - Nagar2006 ER - TY - CHAP AU - Nagar, A. AU - Nandakumar, K. AU - Jain, A. K. PY - 2008 DA - 2008// TI - Securing fingerprint template: Fuzzy vault with minutiae descriptors BT - Int Conf on Pattern Recognition (ICPR'08). IEEE ID - Nagar2008 ER - TY - JOUR AU - Arakala, A. PY - 2009 DA - 2009// TI - Secure and private fingerprint-based authentication JO - Bull Aust Math Soc VL - 80 ID - Arakala2009 ER - TY - CHAP AU - Lee, Y. J. AU - Bae, K. AU - Lee, S. J. AU - Park, K. R. AU - Kim, J. PY - 2007 DA - 2007// TI - Biometric key binding: Fuzzy vault based on iris images BT - Proc of Second Int Conf on Biometrics ID - Lee2007 ER - TY - CHAP AU - Wu, X. AU - Qi, N. AU - Wang, K. AU - Zhang, D. PY - 2008 DA - 2008// TI - A Novel Cryptosystem based on Iris Key Generation BT - Fourth Int Conf on Natural Computation (ICNC'08) ID - Wu2008 ER - TY - CHAP AU - Wu, X. AU - Qi, N. AU - Wang, K. AU - Zhang, D. PY - 2008 DA - 2008// TI - An iris cryptosystem for information security BT - IIH-MSP '08: Proc of the 2008 Int Conf on Intelligent Information Hiding and Multimedia Signal Processing ID - Wu2008 ER - TY - CHAP AU - Wu, X. AU - Wang, K. AU - Zhang, D. PY - 2008 DA - 2008// TI - A cryptosystem based on palmprint feature BT - 19th Int Conf on Pattern Recognition, (ICPR 2008) ID - Wu2008 ER - TY - CHAP AU - Wu, Y. AU - Qiu, B. PY - 2010 DA - 2010// TI - Transforming a pattern identifier into biometric key generators BT - Proc of Int Conf on Multimedia and Expo (ICME) ID - Wu2010 ER - TY - JOUR AU - Reddy, E. AU - Babu, I. PY - 2008 DA - 2008// TI - Performance of Iris Based Hard Fuzzy Vault JO - Int J Comput Sci Netw Secur (IJCSNS) VL - 8 ID - Reddy2008 ER - TY - JOUR AU - Kumar, A. AU - Kumar, A. PY - 2008 DA - 2008// TI - A palmprint based cryptosystem using double encryption JO - Proc SPIE Conf Biometric Technology for human identification VL - 6944 ID - Kumar2008 ER - TY - CHAP AU - Kumar, A. AU - Kumar, A. PY - 2009 DA - 2009// TI - Development of a new cryptographic construct using palmprint-based fuzzy vault BT - EURASIP J Adv Signal Process ID - Kumar2009 ER - TY - JOUR AU - Kholmatov, A. AU - Yanikoglu, B. PY - 2006 DA - 2006// TI - Biometric cryptosystem using online signatures JO - Comput Inf Sci ISCIS 2006 (LNCS) VL - 4263 ID - Kholmatov2006 ER - TY - CHAP AU - Bodo, A. PY - 1994 DA - 1994// TI - Method for producing a digital signature with aid of a biometric feature BT - German patent DE 4243908 A1 ID - Bodo1994 ER - TY - CHAP AU - Davida, G. AU - Frankel, Y. AU - Matt, B. PY - 1998 DA - 1998// TI - On enabling secure applications through off-line biometric identification BT - Proc of IEEE, Symp on Security and Privacy ID - Davida1998 ER - TY - CHAP AU - Davida, G. AU - Frankel, Y. AU - Matt, B. PY - 1999 DA - 1999// TI - On the relation of error correction and cryptography to an off line biometric based identication scheme BT - Proc of WCC99, Workshop on Coding and Cryptography ID - Davida1999 ER - TY - JOUR AU - Yang, S. AU - Verbauwhede, I. PY - 2007 DA - 2007// TI - Secure Iris Verification JO - Proc of the IEEE Int Conf on Acoustics, Speech and Signal Processing, (ICASSP 2007) VL - 2 ID - Yang2007 ER - TY - CHAP AU - Scheidat, T. AU - Vielhauer, C. AU - Dittmann, J. PY - 2009 DA - 2009// TI - An iris-based interval mapping scheme for biometric key generation BT - Proc of the 6th Int Symposium on Image and Signal Processing and Analysis, ISPA '09 ID - Scheidat2009 ER - TY - CHAP AU - Hoque, S. AU - Fairhurst, M. AU - Howells, G. PY - 2008 DA - 2008// TI - Evaluating biometric encryption key generation using handwritten signatures BT - Proc of the 2008 Bio-inspired, Learning and Intelligent Systems for Security ID - Hoque2008 ER - TY - CHAP AU - Sutcu, Y. AU - Sencar, H. T. AU - Memon, N. PY - 2005 DA - 2005// TI - A secure biometric authentication scheme based on robust hashing BT - MMSec '05: Proc of the 7th Workshop on Multimedia and Security ID - Sutcu2005 ER - TY - CHAP AU - Li, Q. AU - Guo, M. AU - Chang, E. -. C. PY - 2008 DA - 2008// TI - Fuzzy extractors for asymmetric biometric representations BT - IEEE Workshop on Biometrics (In association with CVPR) ID - Li2008 ER - TY - CHAP AU - Li, Q. AU - Chang, E. -. C. PY - 2006 DA - 2006// TI - Robust, short and sensitive authentication tags using secure sketch BT - MM&Sec '06: Proc of the 8th workshop on Multimedia and security ID - Li2006 ER - TY - JOUR AU - Sutcu, Y. AU - Li, Q. AU - Memon, N. PY - 2007 DA - 2007// TI - Protecting biometric templates with sketch: Theory and practice JO - IEEE Trans Inf Forensic Secur VL - 2 ID - Sutcu2007 ER - TY - CHAP AU - Rathgeb, C. AU - Uhl, A. PY - 2009 DA - 2009// TI - An iris-based interval-mapping scheme for biometric key generation BT - Proc of the 6th Int Symposium on Image and Signal Processing and Analysis, ISPA '09 ID - Rathgeb2009 ER - TY - CHAP AU - Rathgeb, C. AU - Uhl, A. PY - 2010 DA - 2010// TI - Privacy Preserving Key Generation for Iris Biometrics BT - Proc of the 11th Joint IFIP TC6 and TC11 Conf. on Communications and Multimedia Security, CMS '2010 ID - Rathgeb2010 ER - TY - CHAP AU - Monrose, F. AU - Reiter, M. K. AU - Lopresti, D. P. AU - Shih, C. PY - 2002 DA - 2002// TI - Toward speech generated cryptographic keys on resource constrained devices BT - Proc 11th USENIX Security Symposium ID - Monrose2002 ER - TY - CHAP AU - Ballard, L. AU - Kamara, S. AU - Monrose, F. AU - Reiter, M. K. PY - 2008 DA - 2008// TI - Towards practical biometric key generation with randomized biometric templates BT - CCS '08: Proc of the 15th ACM Conf on Computer and Communications Security ID - Ballard2008 ER - TY - CHAP AU - Chen, B. C. AU - Chandran, V. PY - 2007 DA - 2007// TI - Biometric based cryptographic key generation from faces BT - Proc. Digital Image Computing: Techniques and Applications (DICTA) ID - Chen2007 ER - TY - JOUR AU - Goh, A. AU - Teoh, A. B. J. AU - Ngo, D. C. L. PY - 2006 DA - 2006// TI - Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs JO - IEEE Trans Pattern Anal Mach Intell VL - 28 ID - Goh2006 ER - TY - JOUR AU - Teoh, A. B. J. AU - Ngo, D. C. L. AU - Goh, A. PY - 2004 DA - 2004// TI - Personalised cryptographic key generation based on face hashing JO - Comput Secur VL - 2004 ID - Teoh2004 ER - TY - JOUR AU - Teoh, A. B. J. AU - Ngo, D. C. L. AU - Goh, A. PY - 2006 DA - 2006// TI - Biometric Hash: High-Confidence Face Recognition JO - IEEE Trans Circ Syst Video Technol VL - 16 ID - Teoh2006 ER - TY - JOUR AU - Song, O. T. AU - Teoh, A. B. AU - Ngo, D. C. L. PY - 2008 DA - 2008// TI - Application-specific key release scheme from biometrics JO - Int J Netw Secur VL - 6 ID - Song2008 ER - TY - JOUR AU - Teoh, A. B. J. AU - Ngo, D. C. L. AU - Goh, A. PY - 2004 DA - 2004// TI - Biohashing: two factor authentication featuring fingerprint data and tokenised random number JO - Pattern Recogn VL - 37 ID - Teoh2004 ER - TY - JOUR AU - Chong, S. C. AU - Jin, A. T. B. AU - Ling, D. N. C. PY - 2006 DA - 2006// TI - High security iris verification system based on random secret integration, Comput JO - Vision Image Understanding VL - 102 ID - Chong2006 ER - TY - CHAP AU - Chong, S. C. AU - Jin, A. T. B. AU - Ling, D. N. C. PY - 2006 DA - 2006// TI - Iris authentication using privatized advanced correlation filter BT - Proc of the 1st Int IAPR Conf on Biometrics (ICB'06) ID - Chong2006 ER - TY - JOUR AU - Connie, T. AU - Teoh, A. AU - Goh, M. AU - Ngo, D. PY - 2005 DA - 2005// TI - Palmhashing: a novel approach for cancelable biometrics JO - Inf Process Lett VL - 93 ID - Connie2005 ER - TY - JOUR AU - Song, O. T. AU - Teoh, A. B. J. AU - Ngo, D. C. L. PY - 2008 DA - 2008// TI - Application-specific key release scheme from biometrics JO - Int J Netw Secur VL - 6 ID - Song2008 ER - TY - CHAP AU - Beng, A. AU - Teoh, J. AU - Toh, K. -. A. PY - 2008 DA - 2008// TI - Secure biometric-key generation with biometric helper BT - 3rd IEEE Conf on Industrial Electronics and Applications (ICIEA 2008) ID - Beng2008 ER - TY - JOUR AU - Kong, A. AU - Cheunga, K. -. H. AU - Zhanga, D. AU - Kamelb, M. AU - Youa, J. PY - 2006 DA - 2006// TI - An analysis of BioHashing and its variants JO - Pattern Recogn VL - 39 ID - Kong2006 ER - TY - JOUR AU - Teoh, A. B. J. AU - Kuan, Y. W. AU - Lee, S. PY - 2008 DA - 2008// TI - Cancellable biometrics and annotations on biohash JO - Pattern Recogn VL - 41 ID - Teoh2008 ER - TY - JOUR AU - Lumini, A. AU - Nanni, L. PY - 2007 DA - 2007// TI - An improved biohashing for human authentication JO - Pattern Recogn VL - 40 ID - Lumini2007 ER - TY - JOUR AU - Nanni, L. AU - Lumini, A. PY - 2008 DA - 2008// TI - Random subspace for an improved biohashing for face authentication JO - Pattern Recogn Lett VL - 29 ID - Nanni2008 ER - TY - CHAP AU - Jain, A. K. AU - Flynn, P. J. AU - Ross, A. A. PY - 2008 DA - 2008// BT - Handbook of Biometrics PB - Springer CY - New York ID - Jain2008 ER - TY - CHAP AU - Nandakumar, K. AU - Jain, A. K. PY - 2008 DA - 2008// TI - Multibiometric template security using fuzzy vault BT - IEEE 2nd Int Conf on Biometrics: Theory, Applications, and Systems, BTAS '08 ID - Nandakumar2008 ER - TY - CHAP AU - Voderhobli, K. AU - Pattinson, C. AU - Donelan, H. PY - 2006 DA - 2006// TI - A schema for cryptographic key generation using hybrid biometrics BT - 7th annual postgraduate symp.: The convergence of telecommunications, networking and broadcasting, Liverpool ID - Voderhobli2006 ER - TY - CHAP AU - Sutcu, Y. AU - Li, Q. AU - Memon, N. PY - 2007 DA - 2007// TI - Secure biometric templates from fingerprint-face features BT - IEEE Conf on Computer Vision and Pattern Recognition, CVPR '07 ID - Sutcu2007 ER - TY - CHAP AU - Cimato, S. AU - Gamassi, M. AU - Piuri, V. AU - Sassi, R. AU - Scotti, F. PY - 2008 DA - 2008// TI - A multibiometric verification system for the privacy protection of iris templates BT - Proc of the Int Workshop on Computational Intelligence in Security for Information Systems CISIS08 ID - Cimato2008 ER - TY - CHAP AU - Kanade, S. AU - Petrovska-Delacretaz, D. AU - Dorizzi, B. PY - 2009 DA - 2009// TI - Multi-biometrics based cryptographic key regeneration scheme BT - IEEE 3rd Int Conf on Biometrics: Theory, Applications, and Systems, BTAS '09 ID - Kanade2009 ER - TY - CHAP AU - Kanade, S. AU - Camara, D. AU - Petrovska-Delacrtaz, D. AU - Dorizzi, B. PY - 2009 DA - 2009// TI - Application of biometrics to obtain high entropy cryptographic keys BT - Proceedings of World Academy on Science, Engineering, and Technology, Hong Kong ID - Kanade2009 ER - TY - CHAP AU - Meenakshi, V. S. AU - Padmavathi, G. PY - 2009 DA - 2009// TI - Security analysis of password hardened multimodal biometric fuzzy vault BT - Proceedings of World Academy of Science, Engineering and Technology ID - Meenakshi2009 ER - TY - JOUR AU - Jagadeesan, A. AU - Thillaikkarasi, T. AU - Duraiswamy, K. PY - 2010 DA - 2010// TI - Cryptographic key generation from multiple biometric modalities: Fusing minutiae with iris feature JO - Int J Comput Appl VL - 2 ID - Jagadeesan2010 ER - TY - JOUR AU - Zhang, M. AU - Yang, B. AU - Zhang, W. AU - Takagi, T. PY - 2011 DA - 2011// TI - Multibiometric based secure encryption and authentication scheme with fuzzy extractor JO - Int J Netw Secur VL - 12 ID - Zhang2011 ER - TY - CHAP AU - Chafia, F. AU - Salim, C. AU - Farid, B. PY - 2010 DA - 2010// TI - A biometric crypto-system for authentication BT - Proc of Int Conf on Machine and Web Intelligence (ICMWI) ID - Chafia2010 ER - TY - JOUR AU - Chen, H. AU - Sun, H. AU - Lam, K. -. Y. PY - 2007 DA - 2007// TI - Key management using biometrics JO - Int Symposium on Data, Privacy, and E-Commerce VL - 1 ID - Chen2007 ER - TY - JOUR AU - Bui, F. M. AU - Martin, K. AU - Lu, H. AU - Plataniotis, K. N. AU - Hatzinakos, D. PY - 2010 DA - 2010// TI - Fuzzy key binding strategies based on quantization index modulation (QIM) for biometric encryption (BE) applications JO - Trans Inf Forensic Secur VL - 5 ID - Bui2010 ER - TY - CHAP AU - Draper, S. AU - Khisti, A. AU - Martinian, E. AU - Vetro, A. AU - Yedidia, J. PY - 2007 DA - 2007// TI - Secure storage of fingerprint biometrics using slepian-wolf codes BT - Inform Theory and Apps Work (UCSD) ID - Draper2007 ER - TY - CHAP AU - Martinian, S. Y. E. AU - Yedidia, J. S. PY - 2005 DA - 2005// TI - Secure biometrics via syndromes BT - 43rd Annual Allerton Conf on Communications, Control, and Computing ID - Martinian2005 ER - TY - JOUR AU - Boyen, X. AU - Dodis, Y. AU - Katz, J. AU - Ostrovsky, R. PY - 2005 DA - 2005// TI - A Smith, Secure remote authentication using biometric data JO - Proc Eurocrypt 05 (LNCS) VL - 3494 ID - Boyen2005 ER - TY - CHAP AU - Chang, E. -. C. AU - Roy, S. PY - 2007 DA - 2007// TI - Robust extraction of secret bits from minutiae BT - Proc of the 2nd Int Conf on Biometrics 2007 (ICB'07) ID - Chang2007 ER - TY - JOUR AU - Kholmatov, A. AU - Yanikoglu, B. AU - Savas, E. AU - Levi, A. PY - 2006 DA - 2006// TI - Secret sharing using biometric traits JO - Proc of SPIE VL - 6202 ID - Kholmatov2006 ER - TY - CHAP AU - Hirschbichler, M. AU - Boyd, C. AU - Boles, W. PY - 2008 DA - 2008// TI - A multiple-control fuzzy vault BT - PST '08: Proc of the 2008 Sixth Annual Conf on Privacy, Security and Trust ID - Hirschbichler2008 ER - TY - CHAP AU - Margarov, G. AU - Tolba, M. PY - 2009 DA - 2009// TI - Biometrics based secret sharing using fuzzy vault BT - 7th Int Conf on Computer Science and Information Technologies (CSIT'09) ID - Margarov2009 ER - TY - CHAP AU - Buhan, I. R. AU - Doumen, J. M. AU - Hartel, P. H. AU - Veldhuis, R. N. J. PY - 2006 DA - 2006// TI - Fuzzy extractors for continuous distributions BT - University of Twente, Technical Report ID - Buhan2006 ER - TY - JOUR AU - Vielhauer, C. AU - Steinmetz, R. PY - 2004 DA - 2004// TI - Handwriting: feature correlation analysis for biometric hashes JO - EURASIP J Appl Signal Process VL - 2004 ID - Vielhauer2004 ER - TY - JOUR AU - Scheidat, T. AU - Vielhauer, C. PY - 2008 DA - 2008// TI - Biometric hashing for handwriting: entropy based feature selection and semantic fusion JO - Proc of SPIE VL - 6819 ID - Scheidat2008 ER - TY - CHAP AU - Kelkboom, E. J. C. AU - Breebaart, J. AU - Buhan, I. AU - Veldhuis, R. N. J. PY - 2010 DA - 2010// TI - Analytical template protection performance and maximum key size given a Gaussian modeled biometric source BT - Proc of SPIE defense, security and sensing ID - Kelkboom2010 ER - TY - CHAP AU - Verbitskiy, E. AU - Tuyls, P. AU - Denteneer, D. AU - Linnartz, J. P. PY - 2004 DA - 2004// TI - Reliable biometric authentication with privacy protection BT - Paper presented at the SPIE Biometric Technology for Human Identification Conference ID - Verbitskiy2004 ER - TY - JOUR AU - Tuyls, P. AU - Goseling, J. PY - 2004 DA - 2004// TI - Capacity and examples of template protecting biometric authentication systems JO - Proc ECCV Workshop BioAW (LNCS) VL - 3087 ID - Tuyls2004 ER - TY - CHAP AU - Li, Q. AU - Sutcu, Y. AU - Memon, N. PY - 2006 DA - 2006// TI - Secure sketch for biometric templates BT - Adv. Cryptology Asiacrypt ID - Li2006 ER - TY - JOUR AU - Sutcu, Y. AU - Li, Q. AU - Memon, N. PY - 2007 DA - 2007// TI - How to Protect Biometric Templates JO - Proc of SPIE SPIE Conf on Security, Steganography and Watermarking of Multimedia Contents IX VL - 6505 ID - Sutcu2007 ER - TY - CHAP AU - Li, Q. AU - Chang, E. -. C. PY - 2006 DA - 2006// TI - Hiding secret points amidst chaff BT - Proc of the Eurocrypt '06 ID - Li2006 ER - TY - JOUR AU - Ignatenko, T. AU - Willems, F. M. J. PY - 2010 DA - 2010// TI - Information leakage in fuzzy commitment schemes JO - Trans Inf Forensic Secur VL - 5 ID - Ignatenko2010 ER - TY - JOUR AU - Ignatenko, T. AU - Willems, F. M. J. PY - 2009 DA - 2009// TI - Biometric systems: privacy and secrecy aspects JO - Trans Inf Forensic Secur VL - 4 ID - Ignatenko2009 ER - TY - CHAP AU - Zuo, J. AU - Ratha, N. K. AU - Connel, J. H. PY - 2008 DA - 2008// TI - Cancelable iris biometric BT - Proc of the 19th Int Conf on Pattern Recognition 2008 (ICPR'08) ID - Zuo2008 ER - TY - JOUR AU - Savvides, M. AU - Kumar, B. AU - Khosla, P. PY - 2004 DA - 2004// TI - Cancelable biometric filters for face recognition JO - ICPR '04: Proc of the Pattern Recognition, 17th Int Conf on (ICPR'04) VL - 3 ID - Savvides2004 ER - TY - JOUR AU - Hämmerle-Uhlr, J. AU - Pschernig, E. AU - Uhl, A. PY - 2009 DA - 2009// TI - Cancelable iris biometrics using block re-mapping and image warping JO - Proc of the Information Security Conf 2009 (ISC'09) LNCS VL - 5735 ID - Hämmerle-Uhlr2009 ER - TY - STD TI - Rathgeb C, Uhl A: Two-factor authentication or how to potentially counterfeit experimental results in biometric systems.Proc of the Int Conf on Image Analysis and Recognition (ICIAR'10), Part II6112: 296-305. LNCS 2010 ID - ref139 ER - TY - JOUR AU - Ratha, N. K. AU - Connell, J. H. AU - Chikkerur, S. PY - 2007 DA - 2007// TI - Generating cancelable fingerprint templates JO - IEEE Trans Pattern Anal Mach Intell VL - 29 ID - Ratha2007 ER - TY - CHAP AU - Ratha, N. K. AU - Connell, J. H. AU - Bolle, R. M. AU - Chikkerur, S. PY - 2006 DA - 2006// TI - Cancelable biometrics: a case study in fingerprints BT - ICPR '06: Proc of the 18th Int Conf on Pattern Recognition ID - Ratha2006 ER - TY - CHAP AU - Färberböck, P. AU - Hämmerle-Uhl, J. AU - Kaaser, D. AU - Pschernig, E. AU - Uhl, A. PY - 2010 DA - 2010// TI - Transforming rectangular and polar iris images to enable cancelable biometrics BT - Proc of the Int Conf on Image Analysis and Recognition (ICIAR'10) ID - Färberböck2010 ER - TY - CHAP AU - Rathgeb, C. AU - Uhl, A. PY - 2010 DA - 2010// TI - Secure iris recognition based on local intensity variations BT - Proc of the Int Conf on Image Analysis and Recognition (ICIAR'10) ID - Rathgeb2010 ER - TY - CHAP AU - Maiorana, E. AU - Martinez-Diaz, M. AU - Campisi, P. AU - Ortega-Garcia, J. AU - Neri, A. PY - 2008 DA - 2008// TI - Template protection for HMM-based on-line signature authentication BT - Proc Workshop Biometrics CVPR Conference ID - Maiorana2008 ER - TY - CHAP AU - Maiorana, E. AU - Martinez-Diaz, M. AU - Campisi, P. AU - Ortega-Garcia, J. AU - Neri, A. PY - 2008 DA - 2008// TI - Cancelable biometrics for hmm-based signature recognition BT - Proc of the 2nd IEEE Int Conf on Biometrics: Theory, applications and systems (BTAS'08) ID - Maiorana2008 ER - TY - JOUR AU - Maiorana, E. AU - Campisi, P. AU - Fierrez, J. AU - Ortega-Garcia, J. AU - Neri, A. PY - 2010 DA - 2010// TI - Cancelable templates for sequence-based biometrics with application to on-line signature recognition JO - Trans Syst Man Cybernet A Syst Hum VL - 40 ID - Maiorana2010 ER - TY - CHAP AU - Boult, T. PY - 2006 DA - 2006// TI - Robust distance measures for face-recognition supporting revocable biometric tokens BT - FGR '06: Proc of the 7th Int Conf on Automatic Face and Gesture Recognition ID - Boult2006 ER - TY - JOUR AU - Boult, T. AU - Scheirer, W. AU - Woodworth, R. PY - 2007 DA - 2007// TI - Revocable fingerprint biotokens: Accuracy and security analysis JO - IEEE Computer Society Conference on Computer Vision and Pattern Recognition VL - 1 ID - Boult2007 ER - TY - CHAP AU - Boult, T. AU - Scheirer, W. PY - 2008 DA - 2008// TI - Bio-cryptographic protocols with bipartite biotokens BT - Proc of the IEEE Biometric Symposium, BSYM '08 ID - Boult2008 ER - TY - STD TI - Boult T, Scheirer W: Bipartite biotokens: definition, implementation, and analysis.Proc of the 3rd Int Conf on Biometrics 2009 (ICB'09)5558: 775-785. LNCS: 2009 ID - ref150 ER - TY - CHAP AU - Teoh, A. B. J. AU - Ngo, D. C. L. PY - 2006 DA - 2006// TI - Biophasor: token supplemented cancellable biometrics BT - Proc of the Int Conf on Control, Automation, Robotics and Vision (ICARCV'06) ID - Teoh2006 ER - TY - JOUR AU - Teoh, A. B. J. AU - Yuang, C. T. PY - 2007 DA - 2007// TI - Cancellable biometrics realization with multispace random projections JO - IEEE Trans SMC B Recent Adv Biomet Syst VL - 37 ID - Teoh2007 ER - TY - JOUR AU - Teoh, A. B. J. AU - Chong, L. -. Y. PY - 2010 DA - 2010// TI - Secure speech template protection in speaker verification system JO - Speech Commun VL - 52 ID - Teoh2010 ER - TY - JOUR AU - Kuan, Y. W. AU - Teoh, A. B. J. AU - Ngo, D. C. L. PY - 2007 DA - 2007// TI - Secure hashing of dynamic hand signatures using wavelet-Fourier compression with biophasor mixing and 2N discretization JO - EURASIP J Appl Signal Process VL - 2007 ID - Kuan2007 ER - TY - JOUR AU - Yip, W. K. AU - Teoh, A. B. J. AU - Ngo, D. C. L. PY - 2006 DA - 2006// TI - Replaceable and securely hashed keys from online signatures JO - IEICE Electron Express VL - 3 ID - Yip2006 ER - TY - CHAP AU - Kim, Y. AU - Toh, K. PY - 2007 DA - 2007// TI - A method to enhance face biometric security BT - IEEE Int Conf on Biometrics: Theory, Applications, and Systems, BTAS '07 ID - Kim2007 ER - TY - CHAP AU - Wang, Y. AU - Plataniotis, K. PY - 2007 DA - 2007// TI - Face based biometric authentication with changeable and privacy preservable templates BT - Proc of the IEEE Biometrics Symposium ID - Wang2007 ER - TY - JOUR AU - Ouda, O. AU - Tsumura, N. AU - Nakaguchi, T. PY - 2010 DA - 2010// TI - Bioencoding: a reliable tokenless cancelable biometrics scheme for protecting iris codes JO - IEICE Trans Inf Syst VL - E93.D ID - Ouda2010 ER - TY - CHAP AU - Ouda, O. AU - Tsumura, N. AU - Nakaguchi, T. PY - 2010 DA - 2010// TI - Tokenless cancelable biometrics scheme for protecting iris codes BT - Proc of the 20th Int. Conf. on Pattern Recognition (ICPR'10) ID - Ouda2010 ER - TY - CHAP AU - Pillai, J. K. AU - Patel, V. M. AU - Chellappa, R. AU - Ratha, N. K. PY - 2010 DA - 2010// TI - Sectored random projections for cancelable iris biometrics BT - Proc of the IEEE Int Conf. on Acoustics Speech and Signal Processing (ICASSP) ID - Pillai2010 ER - TY - CHAP AU - Jeong, M. Y. AU - Lee, C. AU - Kim, J. AU - Choi, J. Y. AU - Toh, K. A. AU - Kim, J. PY - 2006 DA - 2006// TI - Changeable biometrics for appearance based face recognition BT - Proc of Biometric Consortium Conf, 2006 Biometrics Symposium ID - Jeong2006 ER - TY - CHAP AU - Tulyakov, S. AU - Farooq, F. AU - Govindaraju, V. PY - 2005 DA - 2005// TI - Symmetric hash functions for fingerprint minutiae BT - Int Workshop on Pattern Recognition for Crime Prevention (LNCS: 3687), Security and Surveillance ID - Tulyakov2005 ER - TY - JOUR AU - Tulyakov, S. AU - Farooq, F. AU - Mansukhani, P. AU - Govindaraju, V. PY - 2007 DA - 2007// TI - Symmetric hash functions for secure fingerprint biometric systems JO - Pattern Recogn Lett VL - 28 ID - Tulyakov2007 ER - TY - CHAP AU - Ang, R. AU - Safavi-Naini, R. AU - McAven, L. PY - 2005 DA - 2005// TI - Cancelable key-based fingerprint templates BT - Proc of the Australasian Conf. on Information Security and Privacy ACISP'05 ID - Ang2005 ER - TY - CHAP AU - Yang, B. AU - Busch, C. AU - Gafurov, D. AU - Bours, P. PY - 2010 DA - 2010// TI - Renewable minutiae templates with tunable size and security BT - Proc of the 20th Int Conf on Pattern Recognition (ICPR'10) ID - Yang2010 ER - TY - CHAP AU - Yang, B. AU - Hartung, D. AU - Simoens, K. AU - Busch, C. PY - 2010 DA - 2010// TI - Dynamic random projection for biometric template protection BT - Proc of the 4th IEEE Int Conf on Biometrics: Theory, applications and systems (BTAS'10) ID - Yang2010 ER - TY - JOUR AU - Lee, C. AU - Choi, J. AU - Toh, K. AU - Lee, S. AU - Kim, J. PY - 2007 DA - 2007// TI - Alignment-free cancelable fingerprint templates based on local minutiae information JO - IEEE Trans Syst Man Cybern B Cybern VL - 37 ID - Lee2007 ER - TY - JOUR AU - Hirata, S. AU - Takahashi, K. PY - 2009 DA - 2009// TI - Cancellable biometrics with perfect secrecy for correlation-based matching JO - Proc of the 3rd Int Conf on Biometrics 2009 (ICB'09), LNCS VL - 5558 ID - Hirata2009 ER - TY - CHAP AU - Takahashi, K. AU - Hirata, S. PY - 2009 DA - 2009// TI - Generating provably secure cancelable fingerprint templates based on correlation-invariant random filtering BT - IEEE 3rd Int Conf on Biometrics: Theory, Applications, and Systems, BTAS '09 ID - Takahashi2009 ER - TY - CHAP AU - Bringer, J. AU - Chabanne, H. AU - Kindarji, B. PY - 2009 DA - 2009// TI - Anonymous identification with cancelable biometrics BT - Proc of the 6th Int Symposium on Image and Signal Processing and Analysis, ISPA '09 ID - Bringer2009 ER - TY - JOUR AU - Feng, Y. C. AU - Yuen, P. C. AU - Jain, A. K. PY - 2008 DA - 2008// TI - A hybrid approach for face template protection JO - Proc of SPIE VL - 6944 ID - Feng2008 ER - TY - CHAP AU - Prasanalakshmi, B. AU - Kannammal, A. PY - 2009 DA - 2009// TI - A secure cryptosystem from palm vein biometrics BT - ICIS '09: Proc of the 2nd Int Conf on Interaction Sciences ID - Prasanalakshmi2009 ER - TY - CHAP AU - Bringer, J. AU - Chabanne, H. AU - Kindarji, B. PY - 2007 DA - 2007// TI - The best of both worlds: applying secure sketches to cancelable biometrics BT - Paper presented at the WISSec PB - Luxembourg City CY - Luxembourg ID - Bringer2007 ER - TY - JOUR AU - Gaddam, S. V. K. AU - Lal, M. PY - 2010 DA - 2010// TI - Efficient cancellable biometric key generation scheme for cryptography JO - Int J Netw Secur VL - 11 ID - Gaddam2010 ER - TY - JOUR AU - Lalithamani, N. AU - Soman, K. PY - 2009 DA - 2009// TI - Irrevocable cryptographic key generation from cancelable fingerprint templates: an enhanced and effective scheme JO - Eur J Sci Res VL - 31 ID - Lalithamani2009 ER - TY - JOUR AU - Lalithamani, N. AU - Soman, K. PY - 2009 DA - 2009// TI - An effective scheme for generating irrevocable cryptographic key from cancelable fingerprint templates JO - Int J Comput Sci Netw Secur VL - 9 ID - Lalithamani2009 ER - TY - CHAP AU - Lalithamani, N. AU - Soman, K. P. PY - 2009 DA - 2009// TI - Towards generating irrevocable key for cryptography from cancelable fingerprints BT - Int Conf on Computer Science and Information Technology ID - Lalithamani2009 ER - TY - JOUR AU - Gong, Y. AU - Deng, K. AU - Shi, P. PY - 2008 DA - 2008// TI - Pki key generation based on iris features JO - Int Conf on Computer Science and Software Engineering VL - 6 ID - Gong2008 ER - TY - CHAP AU - Arul, P. AU - Shanmugam, A. PY - 2009 DA - 2009// TI - Generate a key for AES using biometric for VOIP network security BT - J Theoretical Appl Inf Technol ID - Arul2009 ER - TY - JOUR AU - Khan, M. K. AU - Zhang, J. AU - Wang, X. PY - 2008 DA - 2008// TI - Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices JO - Chaos Solitons Frac VL - 35 ID - Khan2008 ER - TY - CHAP AU - Han, B. -. J. AU - Shin, Y. -. N. AU - Jeun, I. -. K. AU - Jung, H. -. C. PY - 2009 DA - 2009// TI - A framework for alternative pin service based on cancellable biometrics BT - Joint Workshop on Information Security, JWIS'09 ID - Han2009 ER - TY - CHAP AU - Rathgeb, C. AU - Uhl, A. PY - 2010 DA - 2010// TI - Iris-biometric hash generation for biometric database indexing BT - Proc of the 20th International Conference on Pattern Recognition (ICPR'10) ID - Rathgeb2010 ER - TY - CHAP AU - Upmanyu, M. AU - Namboodiri, A. M. AU - Srinathan, K. AU - Jawahar, C. PY - 2009 DA - 2009// TI - Efficient privacy preserving video surveillance BT - Proc of the IEEE Int Conf on Computer Vision (ICCV'09) ID - Upmanyu2009 ER - TY - CHAP AU - Ratha, N. K. AU - Connell, J. H. AU - Bolle, R. M. PY - 2001 DA - 2001// TI - An analysis of minutiae matching strength BT - AVBPA '01: Proc of the Third Int Conf on Audio- and Video-Based Biometric Person Authentication ID - Ratha2001 ER - TY - CHAP AU - Schuckers, S. AU - Hornak, L. AU - Norman, T. AU - Derakhshani, R. AU - Parthasaradhi, S. PY - 2002 DA - 2002// TI - Issues for liveness detection in biometrics BT - Biometric Consortium Conference, 2002 Biometrics Symposium ID - Schuckers2002 ER - TY - JOUR AU - Adler, A. PY - 2003 DA - 2003// TI - Sample images can be independently restored from face recognition templates JO - Proc of the Canadian Conf on Electrical and Computer Engineering VL - 2 ID - Adler2003 ER - TY - CHAP AU - Adler, A. PY - 2005 DA - 2005// TI - Vulnerabilities in biometric encryption systems BT - Audio- and video-based Biometric Person Authentication (AVBPA) ID - Adler2005 ER - TY - CHAP AU - Stoianov, A. AU - Kevenaar, T. AU - van der Veen, M. PY - 2009 DA - 2009// TI - Security issues of biometric encryption BT - Proc of the Toronto Int. Conf. Science and Technology for Humanity (TIC-STH) ID - Stoianov2009 ER - TY - CHAP AU - Boyen, X. PY - 2004 DA - 2004// BT - Reusable cryptographic fuzzy extractors, CCS'2004 Proc. of the 11th ACM Conf. on Computer and Communications Security ID - Boyen2004 ER - TY - JOUR AU - Scheirer, W. AU - Boult, T. PY - 2007 DA - 2007// TI - Cracking fuzzy vaults and biometric encryption JO - Biomet Symp VL - 2007 ID - Scheirer2007 ER - TY - CHAP AU - Rathgeb, C. AU - Uhl, A. PY - 2011 DA - 2011// TI - Statistical attack against iris-biometric fuzzy commitment schemes BT - Proc of the IEEE Computer Society and IEEE Biometrics Council Workshop on Biometrics (CVPRW'11) ID - Rathgeb2011 ER - TY - CHAP AU - Failla, P. AU - Sutcu, Y. AU - Barni, M. PY - 2010 DA - 2010// TI - esketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics BT - Proc of the 12th ACM workshop on Multimedia and security MM&Sec '10 ID - Failla2010 ER - TY - CHAP AU - Simoens, K. AU - Tuyls, P. AU - Preneel, B. PY - 2009 DA - 2009// TI - Privacy weaknesses in biometric sketches BT - Proc of the 30th IEEE Symposium on Security and Privacy ID - Simoens2009 ER - TY - CHAP AU - Buhan-Dulman, I. AU - Merchan, J. G. AU - Kelkboom, E. PY - 2010 DA - 2010// TI - Efficient strategies for playing the indistinguishability game for fuzzy sketches BT - Proc of IEEE Workshop on Information Forensics and Security (WIFS) ID - Buhan-Dulman2010 ER - TY - JOUR AU - Kelkboom, E. R. C. AU - Breebaart, J. AU - Kevenaar, T. A. M. AU - Buhan, I. AU - Veldhuis, R. N. J. PY - 2011 DA - 2011// TI - Preventing the decodability attack based crossmatching in a fuzzy commitment scheme JO - Trans Inf Forensic Secur VL - 6 ID - Kelkboom2011 ER - TY - JOUR AU - Daugman, J. PY - 2003 DA - 2003// TI - The importance of being random: statistical principles of iris recognition JO - Pattern Recogn VL - 36 ID - Daugman2003 ER - TY - CHAP AU - Buhan, I. R. AU - Breebaart, J. AU - Guajardo, J. AU - de Groot, K. AU - Kelkboom, E. AU - Akkermans, T. PY - 2009 DA - 2009// TI - A quantitative analysis of indistinguishability for a continuous domain biometric cryptosystem BT - Proc of the First Int. Workshop Signal Processing in the Encrypted Domain (SPEED '09) ID - Buhan2009 ER - TY - CHAP AU - Chang, E. -. C. AU - Shen, R. AU - Teo, F. W. PY - 2006 DA - 2006// TI - Finding the original point set hidden among chaff BT - ASIACCS '06: Proc of the 2006 ACM Symposium on Information, Computer and Communications Security ID - Chang2006 ER - TY - CHAP AU - Mihailescu, P. PY - 2007 DA - 2007// TI - The fuzzy vault for fingerprints is vulnerable to brute force attack BT - CoRR ID - Mihailescu2007 ER - TY - JOUR AU - Miri, A. AU - Poon, H. T. PY - 2009 DA - 2009// TI - A collusion attack on the fuzzy vault scheme JO - ISC Int J Inf Secur VL - 1 ID - Miri2009 ER - TY - CHAP AU - Hong, S. AU - Jeon, W. AU - Kim, S. AU - Won, D. AU - Park, C. PY - 2008 DA - 2008// TI - The vulnerabilities analysis of fuzzy vault using password BT - FGCN '08: Proc of the 2008 Second Int Conf on Future Generation Communication and Networking ID - Hong2008 ER - TY - CHAP AU - Kümmel, K. AU - Vielhauer, C. PY - 2010 DA - 2010// TI - Reverse-engineer methods on a biometric hash algorithm for dynamic handwriting BT - Proc of the 12th ACM workshop on Multimedia and security, MM&Sec '10 ID - Kümmel2010 ER - TY - JOUR AU - Delivasilis, D. L. AU - Katsikas, S. K. PY - 2005 DA - 2005// TI - Side channel analysis on biometric-based key generation algorithms on resource constrained devices JO - Int J Netw Secur VL - 3 ID - Delivasilis2005 ER - TY - CHAP AU - Tao, Z. AU - Ming-Yu, F. AU - Bo, F. PY - 2007 DA - 2007// TI - Side-channel attack on biometric cryptosystem based on keystroke dynamics BT - The First International Symposium on Data, Privacy, and E-Commerce, (ISDPE 2007) ID - Tao2007 ER - TY - CHAP AU - Karakoyunlu, D. AU - Sunar, B. PY - 2010 DA - 2010// TI - Differential template attacks on PUF enabled cryptographic devices BT - Proc of IEEE Workshop on Information Forensics and Security (WIFS) ID - Karakoyunlu2010 ER - TY - JOUR AU - Quan, F. AU - Fei, S. AU - Anni, C. AU - Feifei, Z. PY - 2008 DA - 2008// TI - Cracking cancelable fingerprint template of Ratha JO - Int Symposium on Computer Science and Computational Technology VL - 2 ID - Quan2008 ER - TY - JOUR AU - Shin, S. W. AU - Lee, M. -. K. AU - Moon, D. AU - Moon, K. PY - 2009 DA - 2009// TI - Dictionary attack on functional transform-based cancelable fingerprint templates JO - ETRI J VL - 31 ID - Shin2009 ER - TY - CHAP AU - Cimato, S. AU - Gamassi, M. AU - Piuri, V. AU - Sassi, R. AU - Scotti, F. PY - 2009 DA - 2009// TI - Privacy in biometrics BT - Biometrics: Fundamentals, Theory, and Systems PB - Wiley CY - London ID - Cimato2009 ER - TY - JOUR AU - Jain, A. K. AU - Ross, A. AU - Pankanti, S. PY - 2006 DA - 2006// TI - Biometrics: a tool for information security JO - IEEE Trans Inf Forensic Secur VL - 1 ID - Jain2006 ER - TY - CHAP AU - Delvaux, N. AU - Chabanne, H. AU - Bringer, J. AU - Lindeberg, P. AU - Midgren, J. AU - Breebaart, J. AU - Akkermans, T. AU - van der Veen, M. AU - Veldhuis, R. AU - Kindt, E. AU - Simoens, K. AU - Busch, C. AU - Bours, P. AU - Gafurov, D. AU - Yang, B. AU - Stern, J. AU - Rust, C. AU - Cucinelli, B. AU - Skepastianos, D. PY - 2008 DA - 2008// TI - Pseudo identities based on fingerprint characteristics BT - IIH-MSP '08: Proc of the 2008 Int Conf on Intelligent Information Hiding and Multimedia Signal Processing ID - Delvaux2008 ER - TY - CHAP AU - Bringer, J. AU - Despiegel, V. PY - 2010 DA - 2010// TI - Binary feature vector fingerprint representation from minutiae vicinities BT - Proc of the 4th IEEE Int Conf on Biometrics: Theory, Applications and Systems (BTAS'10) ID - Bringer2010 ER - TY - CHAP AU - Xu, H. AU - Veldhuis, R. N. PY - 2010 DA - 2010// TI - Binary representations of fingerprint spectral minutiae features BT - Proc of the 20th Int Conf on Pattern Recognition (ICPR'10) ID - Xu2010 ER - TY - CHAP AU - Barni, M. AU - Bianchi, T. AU - Catalano, D. AU - Di, R. M. AU - Donida, L. R. AU - Failla, P. AU - Fiore, D. AU - Lazzeretti, R. AU - Piuri, V. AU - Scotti, F. AU - Piva, A. PY - 2010 DA - 2010// TI - Privacy preserving fingercode authentication BT - Proc of the 12th ACM workshop on Multimedia and security MM&Sec '10 ID - Barni2010 ER - TY - JOUR AU - Upmanyu, M. AU - Namboodiri, A. M. AU - Srinathan, K. AU - Jawahar, C. V. PY - 2010 DA - 2010// TI - Blind authentication: a secure crypto-biometric verification protocol JO - Trans Inf Forensic Secur VL - 5 ID - Upmanyu2010 ER - TY - CHAP AU - Willems, F. AU - Ignatenko, T. PY - 2010 DA - 2010// TI - Identification and secret-key binding in binary-symmetric template-protected biometric systems BT - Proc of IEEE Workshop on Information Forensics and Security (WIFS) ID - Willems2010 ER - TY - JOUR AU - Kelkboom, E. J. C. AU - Molina, G. G. AU - Breebaart, J. AU - Veldhuis, R. N. J. AU - Kevenaar, T. A. M. AU - Jonker, W. PY - 2010 DA - 2010// TI - Binary biometrics: an analytic 22 framework to estimate the performance curves under Gaussian assumption JO - Trans Syst Man Cybern A Syst Hum VL - 40 ID - Kelkboom2010 ER - TY - CHAP AU - Breebaart, J. AU - Busch, C. AU - Grave, J. AU - Kindt, E. PY - 2008 DA - 2008// TI - A reference architecture for biometric template protection based on pseudo identities BT - Proc of the BIOSIG 2008: Biometrics and Electronic Signatures ID - Breebaart2008 ER -