[1]WANG Kejun,CAO Yi,XING Xianglei.Finger-vein encryption algorithm based on MB-CSLBP[J].CAAI Transactions on Intelligent Systems,2018,13(4):543-549.[doi:10.11992/tis.201704034]
Copy

Finger-vein encryption algorithm based on MB-CSLBP

References:
[1] DAUGMAN J G. High confidence visual recognition of persons by a test of statistical independence[J]. IEEE transactions on pattern analysis and machine intelligence, 1993, 15(11):1148-1161.
[2] AHADULLAH M, SAID M R M, BANERJEE S. History, development and trend of fractal based biometric cryptography[M]//ER?ETIN?S S, BANERJEE S. Chaos, Complexity and Leadership 2013. Cham:Springer, 2015:27-33.
[3] NAVEEN K H N, JAGADEESHA S, AMITH K J. Human facial expression recognition from static images using shape and appearance feature[C]//Proceedings of the 2nd International Conference on Applied and Theoretical Computing and Communication Technology. Bangalore, India, 2016:598-603.
[4] HUANG Di, ZHANG Renke, YIN Yuan, et al. Local feature approach to dorsal hand vein recognition by centroid-based circular key-point grid and fine-grained matching[J]. Image and vision computing, 2017, 58:266-277.
[5] RATHA N K, CONNELL J H, BOLLE R M. An analysis of minutiae matching strength[C]//Proceedings of the 3rd International Conference on Audio- and Video-Based Biometric Person Authentication. Halmstad, Sweden, 2001:223-228.
[6] JAIN A K, NANDAKUMAR K, NAGAR A. Biometric template security[J]. EURASIP journal on advances in signal processing, 2008, 2008:279416.
[7] 张宁, 臧亚丽, 田捷. 生物特征与密码技术的融合——一种新的安全身份认证方案[J]. 密码学报, 2015, 2(2):159-176. ZHANG Ning, ZANG Yali, TIAN Jie. The integration of biometrics and cryptography-a new solution for secure identity authentication[J]. Journal of cryptologic reseatch, 2015, 2(2):159-176.
[8] LI Peng, YANG Xin, CAO Kai, et al. An alignment-free fingerprint cryptosystem based on fuzzy vault scheme[J]. Journal of network and computer applications, 2010, 33(3):207-220.
[9] CHUNG Y, MOON D, LEE S, et al. Automatic alignment of fingerprint features for fuzzy fingerprint vault[C]//Proceedings of the 5st SKLOIS Conference Information Security and Cryptology. Beijing, China, 2005:358-369.
[10] ULUDAG U, PANKANTI S, PRABHAKAR S, et al. Biometric cryptosystems:issues and challenges[J]. Proceedings of the IEEE, 2004, 92(6):948-960.
[11] PERALTA D, TRIGUERO I, SANCHEZ-REILLO R, et al. Fast fingerprint identification for large databases[J]. Pattern recognition, 2014, 47(2):588-602.
[12] CHAUDHARY D R, SHARMA A. Hand geometry based recognition system[C]//Proceedings of 2012 Nirma University International Conference on Engineering. Ahmedabad, India, 2012:1-5.
[13] JING Xiaoyuan, LI Sheng, ZHANG D, et al. Optimal subset-division based discrimination and its kernelization for face and palmprint recognition[J]. Pattern recognition, 2012, 45(10):3590-3602.
[14] 王科俊, 曹逸, 姜博威, 等. 基于纠错码的指静脉加密算法[J]. 智能系统学报, 2017, 12(1):55-59. WANG Kejun, CAO Yi, JIANG Bowei, et al. Finger vain encryption algorithm based on an error-correcting code[J]. CAAI transactions on intelligent systems, 2017, 12(1):55-59.
[15] YOU Lin, WANG Jiawan, YAN Bin. A secure finger vein recognition algorithm based on MB-GLBP and Logistic mapping[J]. Journal of information hiding and multimedia signal processing, 2016, 7(6):1231-1242.
[16] ZHANG D, ZUO Wangmeng, YUE Feng. A comparative study of palmprint recognition algorithms[J]. ACM computing surveys (CSUR), 2012, 44(1):2.
[17] OJALA T, PIETIK?INEN M, HARWOOD D. A comparative study of texture measures with classification based on featured distributions[J]. Pattern recognition, 1996, 29(1):51-59.
[18] OJALA T, PIETIKAINEN M, MAENPAA T. Multiresolution gray-scale and rotation invariant texture classification with local binary patterns[J]. IEEE transactions on pattern analysis and machine intelligence, 2002, 24(7):971-987.
[19] AHONEN T, PIETIK?INEN M. A framework for analyzing texture descriptors[C]//Proceedings of the 3rd International Conference on Computer Vision Theory and Applications. Madeira, Portugal, 2008:1.
[20] HEIKKILA M, PIETIKAINEN M. A texture-based method for modeling the background and detecting moving objects[J]. IEEE transactions on pattern analysis and machine intelligence, 2006, 28(4):657-662.
[21] HEIKKIL? M, PIETIK?INEN M, SCHMID C. Description of interest regions with local binary patterns[J]. Pattern recognition, 2009, 42(3):425-436.
[22] MALOFEY O P, MALOFEY A O, SHANGINA A E. Enhancing the functionality of the procedures of encoding and decoding BCH codes[C]//Proceedings of 2017 International Conference "Quality Management, Transport and Information Security, Information Technologies". Petersburg, Russia, 2017:243-246.
[23] SLIMANE N B, BOUALLEGUE K, MACHHOUT M. A novel image encryption scheme using chaos, hyper-chaos systems and the secure Hash algorithm SHA-1[C]//Proceedings of 2017 International Conference on Control, Automation and Diagnosis. Hammamet, Tunisia, 2017:141-145.
[24] SLIMANE N B, BOUALLEGUE K, MACHHOUT M. Nested chaotic image encryption scheme using two-diffusion process and the Secure Hash Algorithm SHA-1[C]//Proceedings of the 4th International Conference on Control Engineering and Information Technology. Hammamet, Tunisia, 2016:1-5.
[25] MAKKAD R K, SAHU A K. Novel design of fast and compact SHA-1 algorithm for security applications[C]//Proceedings of IEEE International Conference on Recent Trends in Electronics, Information and Communication Technology. Bangalore, India, 2016:921-925.
Similar References:

Memo

-

Last Update: 2018-08-25

Copyright © CAAI Transactions on Intelligent Systems