Combining Biometric Features of Iris and Retina for Better Security Cryptography
Abstract
Keywords
Full Text:
PDFReferences
R. Ang, R. Safavi-Naini, L. McAven, “Cancellable key-based fingerprint templates," ACISP 2005, pp. 242-252.
Announcing the Advanced Encryption Standard (AES), Federal Information, Processing Standards Publication 197, Nov. 26, 2001.
Y. J. Chang, Z. Wende, and T. Chen, “Biometrics- based cryptographic key generation," IEEE International Conference on Multimedia and Expo, vol. 3, p. 2203-2206, 2004
Chen, and V. Chandran, “Biometric Based Cryptographic Key Generation from Faces," Proceedings of the 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications, pp. 394-401, 2007.
T. Connie, A. Teoh, M. Goh, and D. Ngo, “ Palm hashing: A novel approach for cancellable biometrics," Information processing letters, vol. 93, no. 1, pp. 1-5, 2005.
Feldmeier and P. Karn. “UNIX password security Ten years later," Advances in Cryptology Crytpo '89, LNCS 435, pp. 44-63, Springer-Verlag, 1990.
Y. C. Feng, P. C. Yuen, and A. K. Jain, “A hybrid approach for face template protection," Proceedings of SPIE Conference of Biometric Technology for Human Identification, Orlando, USA, vol. 6944, pp. ca. 325, 2008.
M. F. Santos, J. F. Aguilar, and J. O. Garcia, Cryptographic key generation using handwritten signature," Proceedings of SPIE, vol. 6202, pp. 225-231, Orlando, Fla, USA, Apr. 2006.
Gabor Filter. (http://en.wikipedia.org/wiki/Gaborlter) [10] F. Hao, R. Anderson, and J. Daugman, “Combining crypto with biometrics effectively," IEEE Transactions on Computers, vol. 55, pp. 1081-1088, 2006.
L. C. Jain, U. Halici, I. Hayashi, S.B. Lee, and S.Tsutsui, “Intelligent Biometric Techniques in Fingerprint and Face Recognition”, CRC Press, 1999.
J. G. Jo, J. W. Seo, and H. W. Lee, “Biometric digital signature key generation and cryptography communication based on fingerprint," First Annual International Workshop 2007, LNCS 4613, pp. 38-49, Springer Verlag, 2007.
Klein, “Foiling the cracker: A survey of, and improvements to, password security," Proceedings of the 2nd USENIX Security Workshop, pp. 5-14, Aug. 1990.
L. Lam, S. W. Lee, and C. Y. Suen, “Thinning methodologies-A comprehensive survey," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol 14, no. 9, pp. 879, Sep. 1992.
B. Teoh, and C. T. Yuang, “Cancellable biometrics realization with multispace random projections," IEEE Transactions on Systems, vol. 37, no. 5, pp.1096-106, 2007.
Alexander P. Pons, and Peter Polak, “Understanding user perspectives on biometric technology,” Communications of the ACM, vol. 51, no. 9, pp. 115-118, September 2008.
N. K. Ratha, J. H. Connell, and R. M. Bolle “Enhancing security and privacy in biometrics based authentication systems”, IBM Systems Journal, vol. 40, pp. 614-634, 2001.
S. C. Chong, A. B. J. Teoh, and D. C. L. Ngo, “Iris Authentication Using Privatized Advanced Correlation Filter,” in ICB, pages 382–388, 2006.
Li Chen, IEEE Member, Xiao-Long Zhang, “Feature-based Image Registration using Bifurcation Structures”, Matlab Central.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.