Citation: | Ying-Han Pang, Andrew T. B. J., David N. C. L. Two-Factor Cancelable Biometrics Authenticator[J]. Journal of Computer Science and Technology, 2007, 22(1): 54-59. |
[1] |
Schneier B. Secret \& Lies: Digital Security in a Networked World, New York: John Wiley \& Sons, 2000, pp.141--145.
|
[2] |
Braithwaite M, Ulf Cahn von Seelen, Cambier J -\it et al}. Application-specific biometrics templates. In -\it Proc. IEEE Workshop on Automatic Identification Advanced Technologies}, Tarrytown, NY, 2002, pp.167--171.
|
[3] |
Bolle R M, Connel J H, Ratha N K. Biometric perils and patches. -\it Pattern Recognition}, 2002, 35: 2727--2738.
|
[4] |
Daugman J. Biometric decision landscapes. Technical Report, No.482, Cambridge University Computer Laboratory, 2002.
|
[5] |
Umut U, Sharah P, Salil P -\it et al}. Biometric cryptosystems: Issues and challenges. -\it Proc. the IEEE}, 2004, 92(6): 948--960.
|
[6] |
Goh A, Ngo D. Computation of cryptographic keys from face biometrics. In -\it Proc. 7th IFIP Communications and Multimedia Security}, Torino, 2003, pp.1--13.
|
[7] |
Ratha N, Connell J, Bolle R M. Enhancing security and privacy in biometrics-based authentication systems. -\it IBM Syst. J}., 2001, 40(3): 614--634.
|
[8] |
Davida G I, Frankel Y, Matt B J. On enabling secure applications through off-line biometric identification. In -\it Proc. IEEE Symp. Privacy and Security}, 1998, pp.148--157.
|
[9] |
Mukundan R, Ramakrishnan K R. Moment Functions in Image Analysis---Theory and Applications. World Scientific Publishing, 1998.
|
[10] |
Teh C H, Chin R T. On image analysis by the methods of moments. -\it IEEE Trans. Pattern Anal. Machine Intell}., 1998, 10: 496--512.
|
[11] |
Khotanzad A. Invariant image recognition by Zernike moments. -\it IEEE Trans. Pattern. Anal. Machine Intell}., 1990, 12(5): 489--497.
|
[12] |
Menezes A, Oorschot P V, Vanstone S. Handbook of Applied Cryptography. Boca Raton: CRC Press, 1996.
|
[13] |
Vision Group of Essex University----Face Database, http:// cswww.essex.ac.uk/allfaces/index.html.
|
[1] | Xin Geng, Zhi-Hua Zhou. Image Region Selection and Ensemble for Face Recognition[J]. Journal of Computer Science and Technology, 2006, 21(1): 116-125. |
[2] | Pin Liao, Li Shen, Yi-Qiang Chen, Shu-Chang Liu. Unified Model in Identity Subspace for Face Recognition[J]. Journal of Computer Science and Technology, 2004, 19(5). |
[3] | Pin Liao, Li Shen. Unified Probabilistic Models for Face Recognition from a SingleExample Image per Person[J]. Journal of Computer Science and Technology, 2004, 19(3). |
[4] | LIU QingShan, HUANG Rui, LU HanQing, MA SongDe. Kernel-Based Nonlinear Discriminant Analysis for Face Recognition[J]. Journal of Computer Science and Technology, 2003, 18(6). |
[5] | Al-Rawi Mohammed, YANG Jie. Practical Fast Computation of Zernike Moments[J]. Journal of Computer Science and Technology, 2002, 17(2). |
[6] | Zhang Yongyue, Peng Zhenyun, You Suya, Xu Guangyou. A Multi-View Face Recognition System[J]. Journal of Computer Science and Technology, 1997, 12(5): 400-407. |
[7] | Yang Changgui, Chen Yuian, Sun Jiaghang. Advanced Geometric Modeler with Hybrid Representation[J]. Journal of Computer Science and Technology, 1996, 11(1): 1-8. |
[8] | Xiang Dong, Wei Daozheng, Chen Shisong. Probabilistic Models for Estimation of Random and Pseudo-Random Test Length[J]. Journal of Computer Science and Technology, 1992, 7(2): 164-174. |
[9] | Li Zhongcheng, Min Yinghua. Pseudo-Random Test Generation for Large Combinational Circuits[J]. Journal of Computer Science and Technology, 1992, 7(1): 19-28. |
[10] | Lu Wei, Jin Tongguang, Liang Youdong. Geometric Modelling by Recursively Cutting Vertices[J]. Journal of Computer Science and Technology, 1989, 4(4): 363-373. |