참고문헌
- V.M. Patel, N.K. Ratha, and R. Chellappa, "Cancelable biometrics :A review," IEEE Signal Processing Magazine, vol. 32(5), pp. 54-65, Sept. 2015 https://doi.org/10.1109/MSP.2015.2434151
- J.K. Pillai, V.M. Ptel, R. Chellappa, and N.K. Ratha, "Secure and robust iris recognition using random projections and sparse representations," IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 33(9), pp. 1877-1893, 2011 https://doi.org/10.1109/TPAMI.2011.34
- J. Kang, D. Nyang, and K.Lee, "Two-factor face authentication using matrix permutation transformation and a user password," Information Sciences, 269, pp. 1-20, 2014 https://doi.org/10.1016/j.ins.2014.02.011
- A.T.B. Jin, D.N.C. Ling, and A.Goh, "Biohashing: two factor authentication featuring fingerprint data and tokenised random number," Pattern recognition, vol. 37(11), pp. 2245-2255, 2014 https://doi.org/10.1016/j.patcog.2004.04.011
- J. Zuo, N.K. Ratha and, J.H. Connell, "Cancelable iris biometric" Pattern Recognition, 2008. ICPR 2008. 19th International Conference on, pp. 1-4, 2008
- A. Juels and M. Wattenberg, "A fuzzy commitment scheme," Proc. ACM Conf. Compter and Communications Security, pp. 28-36, 1999
- A. Juels and M. Sudan, "A fuzzy vault scheme," Information Theory, 2002. Proc. IEEE International Symposium, pp. 408, 2002
- W.J. Scheirer and T.E. Boult, "Bio-cryptographic protocols with bipartite biotokens," Biometrics Symposium, BSYM'08, pp. 9-16, 2008
- C. Rathgeb F. Breitinger and C. Busch, "Alignment-free cancelable iris biometric templates based on adaptive bloom filters," Biometrics (ICB) 2013 International Conference, pp. 1-8, 2013
- 김재성, 이새움, "생체신호를 이용한 텔레바이오 인식기술 동향 및 전망," 정보보호학회지, 26(4), pp. 41-46, 2016
- A. Kong, K.H. Cheung, D. Zhang, M. Kamel, and J. You "An analysis of BioHashing and its variants," Pattern Recognition, 39(7), pp. 1359-1368, 2006 https://doi.org/10.1016/j.patcog.2005.10.025
- Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," Int. conference on the theory and applications of cryptographic techniques, pp. 523-540, 2004