References
- P.N, Belhumeur, J.P. Kriegman and D.J. Kriegman, "Eigenfaces vs. Fisherfaces: Recognition using class specific linear projection", IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 19, no. 7, pp. 711-720, 1997. https://doi.org/10.1109/34.598228
- Y. Chang, W. Zhang and T. Chen, "Biometric-based cryptographic key generation," in Proc. of IEEE International Conference on Multimedia and Expo (ICME 2004), 2004.
- C. Chen, R. Veldhuis, T. Kevenaar and A. Akkermans, "Multi-bits biometric string generation based on the likelihood ratio," in Proc. of IEEE International Conference on Multimedia and Expo (ICME 2004), vol. 3, pp. 2203-2206, 2004.
- C. Chen, R. Veldhuis, T. Kevenaar and A. Akkermans, "Biometric quantization through detection rate optimized bit allocation," EURASIP Journal on Advances in Signal Processing, Article ID 784834, 16 pages, 2009.
- Y. Dodis, R. Ostrovsky, L. Reyzin and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," Eurocrypt 2004, LNCS, vol. 3027, pp. 523-540, 2004.
- F. Gray, "Pulse code communications," U.S. Patent 2632058, 1953.
- F. Han, J. Hu, L. He and Y. Wang, "Generation of reliable PINs from fingerprints," in Proc. of IEEE International Conference on Communications (ICC '07), pp. 1191-1196, 2007.
- F. Hao and C.W. Chan, "Private key generation from on-line handwritten signatures," Information Management & Computer Security, vol. 10, no. 4, pp. 159-164, 2002. https://doi.org/10.1108/09685220210436949
- A. Juels and M. Wattenberg, "A fuzzy commitment scheme," in Proc. of 6th ACM Conference in Computer and Communication Security (CCS'99), pp. 28-36, 1999.
- T.A.M. Kevenaar, G.J. Schrijen, M. van der Veen, A.H.M. Akkermans and F. Zuo, "Face recognition with renewable and privacy preserving binary templates," in Proc. of 4th IEEE Workshop on Automatic Identification Advanced Technologies (AutoID '05), pp. 21-26, 2005.
- M.-H. Lim and A.B.J. Teoh, "Linearly separable subcode: A novel output label with high separability for biometric discretization," in Proc. of 5th IEEE Conference on Industrial Electronics and Applications (ICIEA'10), pp. 290 - 294, 2010.
- J.-P. Linnartz and P. Tuyls, "New shielding functions to enhance privacy and prevent misuse of biometric templates," in Proc. of 4th International Conference on Audio and Video Based Perso Authentication (AVBPA 2004), LNCS, vol. 2688, pp. 238-250, 2003.
- A.M. Martinez and R. Benavente, "The AR Face Database," CVC Technical Report # 24, 1998.
- F. Monrose, M.K. Reiter, Q. Li and S. Wetzel, "Cryptographic key generation from voice," in Proc. of IEEE Symposium on Security and Privacy (S&P 2001), pp. 202-213, 2001.
- F. Monrose, M.K. Reiter, Q. Li and S. Wetzel, "Using voice to generate cryptographic keys," Odyssey 2001, The Speaker Verification Workshop, 2001.
-
A.B.J. Teoh, K.-A. Toh and W.K. Yip, "2
$^{\wedge}$ N discretisation of biophasor in cancellable biometrics," in Proc. of 2nd International Conference on Biometrics (ICB 2007), Lecture Notes in Computer Science, vol. 4642, pp. 435-444, 2007. - A.B.J. Teoh, D.C.L. Ngo and A. Goh, "Personalised cryptographic key generation based on FaceHashing," Computers and Security, vol. 23, no. 7, pp. 606-614, 2004. https://doi.org/10.1016/j.cose.2004.06.002
- A.B.J. Teoh, W.K. Yip and K.-A. Toh, "Cancellable biometrics and user-dependent multi-state discretization in BioHash," Pattern Analysis & Applications, vol. 13, no. 3, pp. 301-307, 2009.
- M. Turk and A. Pentland, "Eigenfaces for Recognition", Journal of Cognitive, Neuroscience, vol. 3, no. 1, pp. 71-86, 1991. https://doi.org/10.1162/jocn.1991.3.1.71
- P. Tuyls, A.H.M. Akkermans, T.A.M. Kevenaar, G.-J. Schrijen, A.M. Bazen and N.J. Veldhuis, "Practical biometric authentication with template protection," in Proc. of 5th International Conference on Audio- and Video-based Biometric Person Authentication, LNCS, vol. 3546, pp. 436-446, 2005.
- E. Verbitskiy, P. Tuyls, D. Denteneer and J.P. Linnartz, "Reliable biometric authentication with privacy protection," in Proc. of 24th Benelux Symposium on Information Theory, pp. 125-132, 2003.
- W.K. Yip, A. Goh, D.C.L. Ngo and A.B.J. Teoh, "Generation of replaceable cryptographic keys from dynamic handwritten signatures," in Proc. of 1st International Conference on Biometrics, Lecture Notes in Computer Science, vol. 3832, pp. 509-515, 2006.