Biometric system security. Handbook of biometrics, 2007. ,
DOI : 10.1007/978-0-387-71041-9_19
URL : http://www.sce.carleton.ca/faculty/adler/publications/2007/adler-2007-biometrics-system-security.pdf
Biohashing for securing minutiae template, Proceedings of the 20th International Conference on Pattern Recognition, pp.1168-1171, 2010. ,
DOI : 10.1109/icpr.2010.292
Comparative study on texture features for fingerprint recognition: application to the biohashing template protection scheme, Journal of Electronic Imaging, vol.25, issue.1, pp.13033-013033, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01269208
Biometric perils and patches, Pattern Recognition, vol.35, issue.12, pp.2727-2738, 2002. ,
DOI : 10.1016/s0031-3203(01)00247-3
Gshade: faster privacy-preserving distance computation and biometric identification, Proceedings of the 2nd ACM workshop on Information hiding and multimedia security, pp.187-198, 2014. ,
Optimal iris fuzzy sketches, IEEE first conference on biometrics BTAS, 2007. ,
URL : https://hal.archives-ouvertes.fr/hal-00269913
Secure biometricbased authentication scheme using chebyshev chaotic map for multiserver environment, IEEE Transactions on Dependable and Secure Computing, 2016. ,
Simple permutations mix well, Theor. Comput. Sci, vol.348, issue.2-3, pp.251-261, 2005. ,
DOI : 10.1007/978-3-540-27836-8_65
URL : http://www.cs.ubc.ca/~shlomoh/papers/kwise05.pdf
Biometric template security, In EURASIP Journal on Advances in Signal Processing, 2008. ,
Ranking-based locality sensitive hashing-enabled cancelable biometrics: Index-of-max hashing, IEEE Transactions on Information Forensics and Security, vol.13, issue.2, pp.393-407, 2018. ,
DOI : 10.1109/tifs.2017.2753172
URL : http://arxiv.org/pdf/1703.05455
A fuzzy vault scheme. Des. Codes Cryptography, vol.38, pp.237-257, 2006. ,
DOI : 10.1007/s10623-005-6343-z
A fuzzy commitment scheme, ACM conference on Computer and communication security, pp.28-36, 1999. ,
DOI : 10.1145/319709.319714
URL : http://www.rsalabs.com/rsalabs/staff/ajuels/papers/fuzzycommit.ps
An analysis of biohashing and its variants, Pattern Recognition, vol.39, 2005. ,
DOI : 10.1016/j.patcog.2005.10.025
URL : http://hdl.handle.net/10397/20801
, Empirical tests on biohashing. NeuroComputing, vol.69, pp.2390-2395, 2006.
Handbook of Fingerprint Recognition, 2003. ,
Biometric template transformation: A security analysis, Proceedings of SPIE, Electronic Imaging, Media Forensics and Security XII, 2010. ,
DOI : 10.1117/12.839976
Cancelable biometrics: A review, IEEE Signal Processing Magazine, vol.32, issue.5, pp.54-65, 2015. ,
Sectored random projections for cancelable iris biometrics, Acoustics Speech and Signal Processing (ICASSP), 2010 IEEE International Conference on, pp.1838-1841, 2010. ,
Fingerprint image reconstruction from standard templates, IEEE Transactions on Pattern Analysis Machine Intelligence, vol.29, pp.1489-1503, 2007. ,
Enhancing security and privacy in biometrics-based authentication systems, IBM systems Journal, vol.40, issue.3, pp.614-634, 2001. ,
Generating cancelable fingerprint templates, IEEE Trans. Pattern Anal. Mach. Intell, vol.29, issue.4, pp.561-572, 2007. ,
DOI : 10.1109/tpami.2007.1004
Enhancing security and privacy in biometrics-based authentication system, IBM Systems J, vol.37, issue.11, pp.2245-2255, 2001. ,
DOI : 10.1147/sj.403.0614
On application of bloom filters to iris biometrics, IET Biometrics, vol.3, issue.4, pp.207-218, 2014. ,
DOI : 10.1049/iet-bmt.2013.0049
Evaluation of biometric template protection schemes based on a transformation, International Conference on Information Systems Security and Privacy (ICISSP), 2018. ,
DOI : 10.5220/0006550502160224
URL : https://hal.archives-ouvertes.fr/hal-01620968
Soft biometrics in conjunction with optics based biohashing, Optics Communications, vol.284, issue.3, pp.756-763, 2011. ,
DOI : 10.1016/j.optcom.2010.10.007
Privacy weaknesses in biometric sketches, 30th IEEE Symposium on Security and Privacy, 2009. ,
DOI : 10.1109/sp.2009.24
URL : https://www.cosic.esat.kuleuven.be/publications/article-1205.pdf
, Cancellable biometrics and annotations on biohash. Pattern recognition, vol.41, pp.2034-2044, 2008.
DOI : 10.1016/j.patcog.2007.12.002
Biohashing: two factor authentication featuring fingerprint data and tokenised random number, Pattern recognition, p.40, 2004. ,
Cancellable biometrics realization through biophasoring, Proceedings of 9th IEEE International Conference on Control, Automation, Robotics and Vision (ICARCV'06), 2006. ,
Finger-knuckle-print verification based on band-limited phase-only correlation, International Conference on Computer Analysis of Images and Patterns, pp.141-148, 2009. ,
DOI : 10.1007/978-3-642-03767-2_17
URL : http://www4.comp.polyu.edu.hk/~cslzhang/paper/conf/CAIP09_ZL.pdf
Feature correlation attack on biometric privacy protection schemes, Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, pp.1061-1065, 2009. ,
DOI : 10.1109/iih-msp.2009.237