참고문헌
- G. Davida, Y. Frankel, and B.J. Matt, "On Enabling Secure Applications through Off-Line Biometric Identification," IEEE Symp. Security Privacy, 1998, pp. 148-157.
- N.K. Ratha, J.H. Connell, and R.M. Bolle, "Enhancing Security and Privacy in Biometrics-Based Authentication Systems," IBM Syst. J., vol. 40, no. 3, Jan. 2001, pp. 614-634.
- T. Connie et al., "PalmHashing: A Novel Approach for Cancelable Biometrics," Inf. Process. Lett., vol. 93, no. 1, Jan. 2005, pp. 1-5. https://doi.org/10.1016/j.ipl.2004.09.014
- T. Kevenaar et al., "Face Recognition with Renewable and Privacy Preserving Binary Templates," IEEE Workshop Automatic Identification Advanced Technol., 2005, pp. 21-26.
- Y. Sutcu, T. Sencar, and N. Memon, "A Secure Biometric Authentication Scheme Based on Robust Hashing," ACM Workshop on Multimedia and Security, 2005, pp. 111-116.
- J.H. Ton and T. Kalker, "Robust Audio Hashing for Content Identification," Content-Based Multimedia Indexing, 2001.
- Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data," Adv. Cryptology - EUROCRYPT, LNCS 3027, 2004, pp. 523-540.
- A. Juels and M. Sudan, "A Fuzzy Vault Scheme," IEEE Int. Symp. Inf. Theory, 2002, p. 408.
- A. Juels and M. Wattenberg, "A Fuzzy Commitment Scheme," ACM Conf. Computer Commun. Security, 1999, pp. 28-36.
- Q. Li, Y. Sutcu, and N. Memon, "Secure Sketch for Biometric Templates," Adv. Cryptology - ASIACRYPT, LNCS 4284, 2006, pp. 99-113.
- J.P. Linnartz and P. Tuyls, "New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates," Audioand Video-Based Biometric Person Authentication, LNCS 2688, 2003, pp. 393-402.
- K. Simoens, P. Tuyls, and B. Preneel, "Privacy Weaknesses in Biometric Sketches," IEEE Symp. Security Privacy, 2009, pp. 188-203.
- R. Ang, R. Safavi-Naini, and L. McAven, "Cancelable Key- Based Fingerprint Templates," Australasian Conf. Inf. Security Privacy, LNCS 3574, 2005, pp. 242-252.
- N. Ratha et al., "Cancelable Biometrics: A Case Study in Fingerprints," Int. Conf. Pattern Recog., vol. 4, 2006, pp. 370-373.
- N.K. Ratha et al., "Generating Cancelable Fingerprint Templates," IEEE Trans. Pattern Anal. Mach. Intell., vol. 29, no. 4, 2007, pp. 561-572.
- Y.J. Lee et al., "One-Time Templates for Face Authentication," Int. Conf. Convergence Inf. Technol., Nov. 2007, pp. 1818-1823.
- M. Turk and A. Pentland, "Eigenfaces for Recognition," J. Cognitive Neuroscience, vol. 3, no. 1, Jan. 1991, pp. 71-86. https://doi.org/10.1162/jocn.1991.3.1.71
- P.N. Belhumeur, J.P. Hespanha, and D.J. Kriegman, "Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection," IEEE Trans. Pattern Analysis Mach. Intell., vol. 19, no. 7, Oct. 1997, pp. 711-720. https://doi.org/10.1109/34.598228
- Y.J. Lee, Y.S. Chung, and K.Y. Moon, "Inverse Operation and Preimage Attack on Biohashing," IEEE Workshop Computational Intell. Biometrics: Theory, Algorithms, Appl., Mar. 2009, pp. 92-97.
- Y.K. Lee and I. Verbauwhede, "Secure and Low-Cost RFID Authentication Protocols," IEEE Int. Workshop Adaptive Wireless Networks, Nov. 2005.
- K. Messer et al., "XM2VTSDB: The Extended M2VTS Database," Audio- and Video-Based Biometric Person Authentication, Mar. 1999, pp. 72-77.
- A.T.B. Jin, D.N.C. Ling, and A. Goh, "Biohashing: Two Factor Authentication Featuring Fingerprint Data and Tokenised Random Number," Patt. Recog., vol. 37, no. 11, Nov. 2004, pp. 2245-2255. https://doi.org/10.1016/j.patcog.2004.04.011
- A.B.J. Teoh, D.C.L. Ngo, and A. Goh, "An Integrated Dual Factor Authenticator Based on the Face Data and Tokenised Random Number," Int. Conf. Biometric Authentication, LNCS 3072, 2004, pp. 117-123.
- A. Kong et al., "An Analysis of BioHashing and Its Variants," Pattern Recog., vol. 39, no. 7, July 2006, pp. 1359-1368. https://doi.org/10.1016/j.patcog.2005.10.025