A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional PalmPhasor-fusion
Published 2013 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
A remote cancelable palmprint authentication protocol based on multi-directional two-dimensional PalmPhasor-fusion
Authors
Keywords
-
Journal
Security and Communication Networks
Volume 7, Issue 11, Pages 1860-1871
Publisher
Wiley
Online
2013-11-12
DOI
10.1002/sec.900
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Argument on biometrics identity-based encryption schemes
- (2013) Syh-Yuan Tan et al. Security and Communication Networks
- PalmHash Code vs. PalmPhasor Code
- (2012) Lu Leng et al. NEUROCOMPUTING
- Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach
- (2012) Song Wang et al. PATTERN RECOGNITION
- On Random Transformations for Changeable Face Verification
- (2011) Yongjin Wang et al. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS
- Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security
- (2011) Lu Leng et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Pair-polar coordinate-based cancelable fingerprint templates
- (2011) Tohari Ahmad et al. PATTERN RECOGNITION
- Challenge-response-based biometric image scrambling for secure personal identification
- (2010) Muhammad Khurram Khan et al. Future Generation Computer Systems-The International Journal of eScience
- Blind Authentication: A Secure Crypto-Biometric Verification Protocol
- (2010) Maneesh Upmanyu et al. IEEE Transactions on Information Forensics and Security
- An Analysis of Random Projection for Changeable and Privacy-Preserving Biometric Verification
- (2010) Yongjin Wang et al. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS
- Generating cancelable palmprint templates via coupled nonlinear dynamic filters and multiple orientation palmcodes
- (2010) Hengjian Li et al. INFORMATION SCIENCES
- Identification with encrypted biometric data
- (2010) Julien Bringer et al. Security and Communication Networks
- Palmprint authentication using fusion of wavelet and contourlet features
- (2010) S. M. Prasad et al. Security and Communication Networks
- A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment
- (2010) Kai Xi et al. Security and Communication Networks
- A survey of palmprint recognition
- (2009) Adams Kong et al. PATTERN RECOGNITION
- Three measures for secure palmprint identification
- (2007) Adams Kong et al. PATTERN RECOGNITION
- Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices
- (2006) Muhammad Khurram Khan et al. CHAOS SOLITONS & FRACTALS
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreAdd your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload Now