Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Template protection")

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 15 of 15

  • Page / 1
Export

Selection :

  • and

A survey of palmprint recognitionKONG, Adams; ZHANG, David; KAMEL, Mohamed et al.Pattern recognition. 2009, Vol 42, Num 7, pp 1408-1418, issn 0031-3203, 11 p.Article

Three measures for secure palmprint identificationKONG, Adams; ZHANG, David; KAMEL, Mohamed et al.Pattern recognition. 2008, Vol 41, Num 4, pp 1329-1337, issn 0031-3203, 9 p.Article

Cancelable multi-biometrics: Mixing iris-codes based on adaptive bloom filtersRATHGEB, C; BUSCH, C.Computers & security. 2014, Vol 42, pp 1-12, issn 0167-4048, 12 p.Article

Masquerade attack on transform-based binary-template protection based on perceptron learningFENG, Yi C; LIM, Meng-Hui; YUEN, Pong C et al.Pattern recognition. 2014, Vol 47, Num 9, pp 3019-3033, issn 0031-3203, 15 p.Article

Modeling IrisCode and Its Variants as Convex Polyhedral Cones and Its Security ImplicationsKONG, Adams Wai-Kin.IEEE transactions on image processing. 2013, Vol 22, Num 3-4, pp 1148-1160, issn 1057-7149, 13 p.Article

Investigating fusion approaches in multi-biometric cancellable recognitionCANUTO, Anne M. P; PINTRO, Fernando; XAVIER-JUNIOR, Joao C et al.Expert systems with applications. 2013, Vol 40, Num 6, pp 1971-1980, issn 0957-4174, 10 p.Article

Security performance evaluation for biometric template protection techniquesISOBE, Yoshiaki; OHKI, Tetsushi; KOMATSU, Naohisa et al.International journal of biometrics (Print). 2013, Vol 5, Num 1, pp 53-72, issn 1755-8301, 20 p.Article

Secure biometric template generation for multi-factor authenticationKHAN, Salman H; ALI AKBAR, M; SHAHZAD, Farrukh et al.Pattern recognition. 2015, Vol 48, Num 2, pp 458-472, issn 0031-3203, 15 p.Article

A non-invertible cancellable fingerprint construct based on compact minutiae patternsKRIVOKUCA, Vedrana; ABDULLA, Waleed H; SWAIN, Akshya et al.International journal of biometrics (Print). 2014, Vol 6, Num 2, pp 125-142, issn 1755-8301, 18 p.Article

IrisCode Decompression Based on the Dependence between Its Bit PairsKONG, Adams Wai-Kin.IEEE transactions on pattern analysis and machine intelligence. 2012, Vol 34, Num 3, pp 506-520, issn 0162-8828, 15 p.Article

On the Security of BioEncoding Based Cancelable BiometricsOUDA, Osama; TSUMURA, Norimichi; NAKAGUCHI, Toshiya et al.IEICE transactions on information and systems. 2011, Vol 94, Num 9, pp 1768-1777, issn 0916-8532, 10 p.Article

Fingerprint template protection using multiline neighboring relationPRASAD, Munaga V. N. K; SANTHOSH KUMAR, C.Expert systems with applications. 2014, Vol 41, Num 14, pp 6114-6122, issn 0957-4174, 9 p.Article

A taxonomy of biometric system vulnerabilities and defencesYOGENDRA NARAIN SINGH; SANJAY KUMAR SINGH.International journal of biometrics (Print). 2013, Vol 5, Num 2, pp 137-159, issn 1755-8301, 23 p.Article

A Delaunay Quadrangle-Based Fingerprint Authentication System With Template Protection Using Topology Code for Local Registration and Security EnhancementWENCHENG YANG; JIANKUN HU; SONG WANG et al.IEEE transactions on information forensics and security. 2014, Vol 9, Num 7-8, pp 1179-1192, issn 1556-6013, 14 p.Article

Entropy Analysis and New Constructions of Biometric Key Generation SystemsGOLIC, Jovan Dj; BALTATU, Madalina.IEEE transactions on information theory. 2008, Vol 54, Num 5, pp 2026-2040, issn 0018-9448, 15 p.Article

  • Page / 1