[图书][B] Handbook of pattern recognition and computer vision

CH Chen - 2015 - books.google.com
Pattern recognition, image processing and computer vision are closely linked areas which
have seen enormous progress in the last fifty years. Their applications in our daily life …

Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs

ABJ Teoh, A Goh, DCL Ngo - IEEE transactions on pattern …, 2006 - ieeexplore.ieee.org
Biometric analysis for identity verification is becoming a widespread reality. Such
implementations necessitate large-scale capture and storage of biometric data, which raises …

Cracking fuzzy vaults and biometric encryption

WJ Scheirer, TE Boult - 2007 Biometrics Symposium, 2007 - ieeexplore.ieee.org
This paper is a security analysis of leading privacy enhanced technologies (PETs) for
biometrics including biometric fuzzy vaults (BFV) and biometric encryption (BE). The lack of …

An analysis of biohashing and its variants

A Kong, KH Cheung, D Zhang, M Kamel, J You - Pattern recognition, 2006 - Elsevier
As a result of the growing demand for accurate and reliable personal authentication,
biometric recognition, a substitute for or complement to existing authentication technologies …

An improved biohashing for human authentication

A Lumini, L Nanni - Pattern recognition, 2007 - Elsevier
Given the recent explosion of interest in human authentication, verification based on
tokenized pseudo-random numbers and the user specific biometric feature (BioHashing) …

Cancellable biometrics and annotations on biohash

ABJ Teoh, YW Kuan, S Lee - Pattern recognition, 2008 - Elsevier
Lately, the once powerful one-factor authentication which is based solely on either
password, token or biometric approach, appears to be insufficient in addressing the …

Protecting biometric templates with sketch: Theory and practice

Y Sutcu, Q Li, N Memon - IEEE Transactions on Information …, 2007 - ieeexplore.ieee.org
Secure storage of biometric templates has become an increasingly important issue in
biometric authentication systems. We study how secure sketch, a recently proposed error …

Palmhash code vs. palmphasor code

L Leng, J Zhang - Neurocomputing, 2013 - Elsevier
The existing palmprint protection schemes without verification degrading do not strictly meet
non-invertible requirement; while non-invertible palmprint protection schemes do not meet …

Cancelable biometrics realization with multispace random projections

ABJ Teoh, CT Yuang - … on Systems, Man, and Cybernetics, Part …, 2007 - ieeexplore.ieee.org
Biometric characteristics cannot be changed; therefore, the loss of privacy is permanent if
they are ever compromised. This paper presents a two-factor cancelable formulation, where …

Alignment-free cancelable fingerprint templates based on local minutiae information

C Lee, JY Choi, KA Toh, S Lee… - IEEE Transactions on …, 2007 - ieeexplore.ieee.org
To replace compromised biometric templates, cancelable biometrics has recently been
introduced. The concept is to transform a biometric signal or feature into a new one for …