Acknowledgement
Supported by : 한국연구재단
References
- T. Clancy, N. Kiyavash, and D. Lin, "Secure Smartcard- based Fingerprint Authentication," Proc. of ACM SIGMM Multim., Biom. Met. & App., pp. 45-52, 2003.
- Rahul Hooda and Sahil Gupta, "Fingerprint Fuzzy Vault: A Review," International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, Issue 4, pp. 479-482, 2013.
- Jiya Tian and Yanqin Peng, "Research of the Matlab Application in the Fingerprint Identification System," Conf. on Image Analysis and Signal Processing, pp. 1-5, 2012.
- Lin Hong, Yifei Wan, and Anil Jain, "Fingerprint Image Enhancement: Algorithm and Performance Evaluation," IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 20, Issue 8, pp. 777-789, 1998. https://doi.org/10.1109/34.709565
- Graig T. Diefenderfer, "Fingerprint Recognition," Master's thesis, Naval Postgraduate School, 2006.
- Y. Chung, et al., "Automatic Alignment of Fingerprint Features for Fuzzy Vault," CISC 2005, LNCS 3822, pp. 358-369, 2005.
- Daesung Moon, Sungju Lee, Yongwha Chung, Sungbum Pan, Kiyoung Moon, "Implementation of Automatic Fuzzy Fingerprint Vault," Proc. of the 7th International Conf. on Machine Learning and Cybernetics, pp. 3781-3786, 2008.
- A. Juels and M. Sudan, "A Fuzzy Vault Scheme," Proc. of Symp. on Information Theory, pp. 408, 2002.
- Daesung Moon, Seung-Hoon Chae, Yongwha Chung, Sung-Young Kim, and Jeong-Nyeo Kim, "Robust Fuzzy Fingerprint Vault System against Correlation Attack," Journal of the Korea Institute of Information Security and Cryptology, Vol. 21, No. 2, pp. 13-25, 2011.
- Soon-Nyean Cheong, Huo-Chong Ling, Pei-Lee The, "Secure Encrypted Steganography Graphical Password Scheme for Near Field Communication Smartphone Access Control System," Expert Systems with Applications, Vol. 41, Issue 7, pp. 3561-3568, 2013. https://doi.org/10.1016/j.eswa.2013.10.060