TY - STD TI - T. Matsumoto, H. Matsumoto, K. Yamada, S. Hoshino, in Proc. SPIE, Optical Security and Counterfeit Deterrence Techniques IV, vol. 4677. Impact of artificial “gummy” fingers on fingerprint systems, (2002), pp. 275–289. ID - ref1 ER - TY - JOUR AU - Frumkin, D. AU - Wasserstrom, A. AU - Davidson, A. AU - Grafit, A. PY - 2010 DA - 2010// TI - Authentication of forensic DNA samples JO - FSI Genet. VL - 4 ID - Frumkin2010 ER - TY - CHAP AU - Linnartz, J. -. P. AU - Tuyls, P. PY - 2003 DA - 2003// TI - New shielding functions to enhance privacy and prevent misuse of biometric templates BT - Audio- and Video-Based Biometric Person Authentication PB - Springer CY - Berlin ID - Linnartz2003 ER - TY - JOUR AU - de Groot, J. AU - Škorić, B. AU - de Vreede, N. AU - Linnartz, J. P. PY - 2016 DA - 2016// TI - Quantization in Zero Leakage Helper Data Schemes JO - EURASIP J. Adv. Signal Process. VL - 2016 UR - https://doi.org/10.1186/s13634-016-0353-z DO - 10.1186/s13634-016-0353-z ID - de Groot2016 ER - TY - JOUR AU - Stanko, T. AU - Andini, F. N. AU - Škorić, B. PY - 2017 DA - 2017// TI - Optimized quantization in Zero Leakage Helper Data Systems JO - IEEE Trans. Inf. Forensics Secur. VL - 12 UR - https://doi.org/10.1109/TIFS.2017.2697840 DO - 10.1109/TIFS.2017.2697840 ID - Stanko2017 ER - TY - STD TI - A. Juels, M. Wattenberg, in ACM Conference on Computer and Communications Security (CCS) 1999. A fuzzy commitment scheme, (1999), pp. 28–36. ID - ref6 ER - TY - JOUR AU - Dodis, Y. AU - Ostrovsky, R. AU - Reyzin, L. AU - Smith, A. PY - 2008 DA - 2008// TI - Fuzzy Extractors: how to generate strong keys from biometrics and other noisy data JO - SIAM J. Comput. VL - 38 UR - https://doi.org/10.1137/060651380 DO - 10.1137/060651380 ID - Dodis2008 ER - TY - STD TI - R. Canetti, B. Fuller, O. Paneth, L. Reyzin, A. Smith, in Eurocrypt 2016, Volume 9665. Reusable fuzzy extractors for low-entropy distributions, (2016), pp. 117–146. ID - ref8 ER - TY - STD TI - J. Bringer, V. Despiegel, M. Favre, in Proc. SPIE 8029, Sensing Technologies for Global Health, Military Medicine, Disaster Response, and Environmental Monitoring; and Biometric Technology for Human Identification VIII. Adding localization information in a fingerprint binary feature vector representation, (2011), p. 80291O. ID - ref9 ER - TY - STD TI - B. Topcu, Y. Z. Isik, H. Erdogan, in IEEE Conference on Computer Vision and Pattern Recognition (CVPR) Workshop. GMM-SVM fingerprint verification based on minutiae only (IEEE, 2016), pp. 155–160. ID - ref10 ER - TY - JOUR AU - Jin, Z. AU - Lim, M. H. AU - Teoh, A. B. J. AU - Goi, B. M. AU - Tay, Y. H. PY - 2016 DA - 2016// TI - Generating fixed-length representation from minutiae using kernel methods for fingerprint authentication JO - IEEE Trans. Syst. Man Cybern. Syst. VL - 46 UR - https://doi.org/10.1109/TSMC.2015.2499725 DO - 10.1109/TSMC.2015.2499725 ID - Jin2016 ER - TY - CHAP AU - Tuyls, P. AU - Akkermans, A. H. M. AU - Kevenaar, T. A. M. AU - Schrijen, G. -. J. AU - Bazen, A. M. AU - Veldhuis, R. N. J. PY - 2005 DA - 2005// TI - Practical biometric authentication with template protection BT - International Conference on Audio- and Video-Based Biometric Person Authentication (AVBPA) PB - Springer CY - Berlin UR - https://doi.org/10.1007/11527923_45 DO - 10.1007/11527923_45 ID - Tuyls2005 ER - TY - JOUR AU - Xu, H. AU - Veldhuis, R. N. J. AU - Bazen, A. M. AU - Kevenaar, T. A. M. AU - Akkermans, A. H. M. AU - Gokberk, B. PY - 2009 DA - 2009// TI - Fingerprint verification using spectral minutiae representations JO - IEEE Trans. Inf. Forensics Secur. VL - 4 UR - https://doi.org/10.1109/TIFS.2009.2021692 DO - 10.1109/TIFS.2009.2021692 ID - Xu2009 ER - TY - STD TI - H. Xu, R. N. J. Veldhuis, in Int. Conf. on Biometrics: Theory, Applications and Systems (BTAS) 2009. Spectral minutiae representations of fingerprints enhanced by quality data (IEEE, 2009), pp. 1–5. ID - ref14 ER - TY - STD TI - H. Xu, R. N. J. Veldhuis, in Image and Signal Processing (CISP) 2009. Spectral representations of fingerprint minutiae subsets (IEEE, 2009), pp. 1–5. ID - ref15 ER - TY - STD TI - H. Xu, R. N. J. Veldhuis, in Computer Vision and Pattern Recognition Workshop. Complex spectral minutiae representation for fingerprint recognition (IEEE, 2010). ID - ref16 ER - TY - STD TI - B. Topcu, H. Erdogan, C. Karabat, B. Yanıkoglu, in Int. Conf. of the Biometrics Special Interest Group (BIOSIG). Biohashing with fingerprint spectral minutiae (IEEE, 2013), pp. 254–265. ID - ref17 ER - TY - STD TI - X. Shao, R. N. J. Veldhuis. IAPR Asian Conference on Pattern Recognition (IEEE, 2013), pp. 84–89. ID - ref18 ER - TY - STD TI - K. Nandakumar, in Workshop on Information Forensics and Security (WIFS). A fingerprint cryptosystem based on minutiae phase spectrum (IEEE, 2010), pp. 1–6. ID - ref19 ER - TY - STD TI - T. Stanko, B. Škorić, in IEEE Workshop on Information Forensics and Security (WIFS). Minutia-pair spectral representations for fingerprint template protection (IEEE, 2017). ID - ref20 ER - TY - STD TI - F. Farooq, R. M. Bolle, T. -Y. Jea, N. Ratha, in IEEE Conference on Computer Vision and Pattern Recognition. Anonymous and revocable fingerprint recognition (IEEE, 2007), pp. 1–7. ID - ref21 ER - TY - STD TI - Z. Jin, A. B. J. Teoh, T. S. Ong, C. Tee, in International Conference on Education Technology and Computer. Generating revocable fingerprint template using minutiae pair representation (IEEE, 2010), pp. 251–255. ID - ref22 ER - TY - JOUR AU - Chen, B. AU - Willems, F. M. J. PY - 2019 DA - 2019// TI - Secret key generation over biased physical unclonable functions with polar codes JO - IEEE Internet Things J. VL - 6 UR - https://doi.org/10.1109/JIOT.2018.2864594 DO - 10.1109/JIOT.2018.2864594 ID - Chen2019 ER - TY - BOOK AU - Cover, T. M. AU - Thomas, J. A. PY - 2005 DA - 2005// TI - Elements of Information Theory PB - Wiley CY - Berlin UR - https://doi.org/10.1002/047174882X DO - 10.1002/047174882X ID - Cover2005 ER - TY - JOUR AU - Arıkan, E. PY - 2009 DA - 2009// TI - Channel polarization: a method for constructing capacity-achieving codes for symmetric binary-input memoryless channels JO - IEEE Trans. Inf. Theory VL - 55 UR - https://doi.org/10.1109/TIT.2009.2021379 DO - 10.1109/TIT.2009.2021379 ID - Arıkan2009 ER - TY - STD TI - C. I. Watson, M. D. Garris, E. Tabassi, C. L. Wilson, R. M. McCabe, S. Janet, K. Ko, User’s guide to export controlled distribution of NIST biometric image software (2004). NISTIR 7391. ID - ref26 ER - TY - STD TI - J. Ortega-Garcia, J. Fierrez-Aguilar, D. Simon, J. Gonzalez, M. Faundez, V. Espinosa, A. Satue, I. Hernaez, J. J. Igarza, C. Vivaracho, D. Escudero, Q. I. Moro, in Vision, Image and Signal Processing, Special Issue on Biometrics on the Internet, vol. 150. MCYT baseline corpus: A bimodal biometric database (IEEE, 2003), pp. 395–401. ID - ref27 ER - TY - BOOK AU - Maltoni, D. AU - Maio, D. AU - Jain, A. K. AU - Prabhakar, S. PY - 2009 DA - 2009// TI - Handbook of Fingerprint Recognition, 2nd edn PB - Springer CY - London UR - https://doi.org/10.1007/978-1-84882-254-2 DO - 10.1007/978-1-84882-254-2 ID - Maltoni2009 ER - TY - STD TI - VeriFinger SDK. Available online. www.neurotechnology.com. Accessed 5 Aug 2019. ID - ref29 ER - TY - JOUR AU - Ratha, N. K. AU - Connell, J. H. AU - Bolle, R. M. PY - 2001 DA - 2001// TI - Enhancing security and privacy in biometrics-based authentication systems JO - IBM Syst. J. VL - 40 UR - https://doi.org/10.1147/sj.403.0614 DO - 10.1147/sj.403.0614 ID - Ratha2001 ER - TY - JOUR AU - Škorić, B. AU - de Vreede, N. PY - 2014 DA - 2014// TI - The Spammed Code Offset Method JO - IEEE Trans. Inf. Forensics Secur. VL - 9 UR - https://doi.org/10.1109/TIFS.2014.2312851 DO - 10.1109/TIFS.2014.2312851 ID - Škorić2014 ER -