최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기멀티미디어학회논문지 = Journal of Korea Multimedia Society, v.16 no.10, 2013년, pp.1156 - 1162
Arshad, Nasim (Department of Electronics Engineering, Pukyong National University) , Moon, Kwang-Seok (Department of Electronics Engineering, Pukyong National University) , Kim, Jong-Nam (Dept. of IT Convergence & Application Engineering., Pukyong National University)
Face verification has been widely studied during the past two decades. One of the challenges is the rising concern about the security and privacy of the template database. In this paper, we propose a secure face verification system which generates a unique secure cryptographic key from a face templa...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
Ch. H. Lee, "Definition of Optimal Face Region for Face Recognition with Phase-Only Correlation," KISPS, Vol. 13, No. 3, pp. 150-155, 2012.
A. Bodo, "Method for Producing a Digital Signature with Aid of a Biometric Feature," German Patent DE 42 43 908 A1, 1994.
Y.J. Chang, W. Zhang, and T. Chen, "Biometrics- based Cryptographic Key Generation," Proc. of IEEE Int. Conf. on Multimedia and Expo, pp. 2203-2206, 2004.
A. Juels and M. Wattenberg, "A Fuzzy Commitment Scheme," Proc. of sixth ACM Conf. on Computer and Communication Security, pp. 28-36, 1999.
F. Hao, R. Anderson, and J. Daugman, "Combining Crypto with Biometric Effectively," IEEE Trans. on Computers, Vol. 55, No. 9, pp. 1081-1088, 2006.
K.N Ratha, S. Chikkerur, J.H. Connel, and R.M. Bolle, "Generating Cancellable Fingerprints," N IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 29, pp. 561-572, 2007.
M. Savvides, B.V. Kumar, and P. Khosla, "Cancellable Biometric Filters for Face Recognition," Proc. the 17th International Conferenceon Pattern Recognition, Vol. 3, pp. 922-925, 2004.
S.H. Moi, N.B. Rahim, P. Saad, P. Sim, Z. Zakaria, and S. Ibrahim, "Iris Biometric Cryptography for identity Document," International Conference on Soft Computing and Pattern Recognition, pp. 736-741, 2009.
Y. Wang and K.N. Plataniotis, "Fuzzy Vault for Face Based Cryptographic Key Generation," Biometric Symposium, 2007.
A. Sadeghi, T. Schneider, and I. Wehrenberg, "Efficient Privacy-Preserving Face Recognition," ICISC, pp. 229-224, 2009.
M.T. Nita and V.M. Thakare, "Biometrics Standards and Face Image Format for Data Interchange-Review," Int Journal of Advances in Engineering & Technology, Vol. 2. pp. 385-392, 2012.
P.S. Revenkar, A. Anjum, and W.Z. Gandhare, "Secure Iris Authentication using Visual Cryptography," Int Journal of Computer Science and Information Security, Vol. 7, No. 3, pp. 218-221, 2010.
J.J. Park and K.M. Kim, "Face Recognition using Eigenface," KISPS, Vol. 2, No. 2, pp. 1-6, 2001.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.