Investigation of Multimodal Template-Free Biometric Techniques and Associated Exception Handling

0044 English OPEN
Aldosary, Saad;
(2015)
  • Subject: TA

The Biometric systems are commonly used as a fundamental tool by both government and private sector organizations to allow restricted access to sensitive areas, to identify the criminals by the police and to authenticate the identification of individuals requesting to a... View more
  • References (20)
    20 references, page 1 of 2

    [1] K. Jain, A. Ross, and K. Nandakumar, "Introduction to Biometrics", Springer, 2011 (ISBN 978-0-387-77325-4) International Journal of Bio-Science and BioTechnology, vol. 2, no. 1, pp. 13 24, 2010.

    [10] D. Maltoni, et al., Handbook of Fingerprint Recognition: Springer Verlag, 2003.

    [11] A. Shamir, "How to Share a Secret," Communications of the ACM, vol. 22, pp. 612-613, November 1979. McGraw-Hill, 1968 .

    [13] Dawson, E., Donovan, D., "The breadth of Shamir's secret-sharing scheme", Computers & Security 13: 69 78, doi:10.1016/0167- 4048(94)90097-3 .,1994. -Wesley, p. 505 ,1997.

    [15] M. Faundez-Zanuy, "On the vulnerability of biometric security systems," Aerospace and Electronic Systems Magazine, IEEE, vol. 19, pp. 3-8, 2004.

    [16] C. Soutar, et al., "Biometric Encryption," ICSA Guide to Cryptography, 1999.

    [17] A. Juels and M. Sudan, "A Fuzzy Vault Scheme," Design, Codes and Cryptography, vol. 38, pp. 237 - 257, 2005.

    [18] Y. Shenglin and I. Verbauwhede, "Automatic secure fingerprint verification system based on fuzzy vault scheme," 2005, pp. v/609-v/612 Vol. 5.

    [19] U. Uludag, et al., "Fuzzy Vault for Fingerprints," Lecture Notes in Computer Science, vol. 3546, pp. 310 - 319, 2005.

    [20] F. Monrose, et al., "Cryptographic Key Generation From Voice," IEEE Symposium on Security and Privacy, May 2001 2001.

  • Related Organizations (4)
  • Metrics
Share - Bookmark