参考文献
[1]Nandakumar K,Jain A K,Pankanti S.Fingerprint-based Fuzzy Vault:Implementation and Performance[J].IEEE Transactions on Information Forensics and Security,2007,2(4):744-757.
[2]游林.生物特征密码技术综述[J].杭州电子科技大学学报:自然科学版,2015,35(3):1-16.
[3]Monrose F,Reiter M K,Li Q,et al.Cryptographic Key Generation from Voice[C]//Proceedings of IEEE Sym-posium Security and Privacy.Sacramento,USA:IEEE Press,2001:202-213.
[4]Chen C,Veldhuis R N J,Kevenaar T A M,et al.Multi-bits Biometric String Generation Based on the Likelihood Ratio[C]//Proceedings of IEEE International Conference on Biometrics:Theory,Applications,and System.Washington D.C.,USA:IEEE Press,2007:1-6.
[5]Chen C,Veldhuis R N J,Kevenaar T A M,et al.Biometric Quantization Through Detection Rate Optimized Bit Allocation[J].EURASIP Journal on Advances in Signal Processing,2009,3(1):1-16.
[6]周俊,曹琦,王帅.基于虹膜特征的密钥生成研究[J].计算机工程与应用,2012,48(21):31-34.
[7]Sheng Weiguo,Howells G,Fairhurst M,et al.Reliable and Secure Encryption Key Generation from Fingerprints[J].Information Management & Computer Security,2012,20(3):207-221.
[8]常郝.基于动态手写签名的生物特征密钥生成研究[D].合肥:合肥工业大学,2007.
[9]王培沛.基于掌纹特征的密钥生成算法[D].哈尔滨:哈尔滨工业大学,2009.
[10]Chang Y J,Zhang W,Chen T.Biometric-based Crypto-graphic Key Generation[C]//Proceedings of IEEE International Conference on Multimedia and Expo.Copenhagen,Denmark:IEEE Press,2004:2203-2206.
[11]Lim M H,Teoh A B J,Toh K A.An Efficient Dynamic Reliability-dependent Bit Allocation for Biometric Discretization[J].Pattern Recognition,2011,45(5):1960-1971.
[12]Denier J J,Gon V,Thuring J.The Guiding of Human Writing Movements[J].Kybemetik,1965,4(3):145-148.
[13]Vielhauer C,Steinmetz R.Handwriting:Feature Correla-tion Analysis for Biometric Hashes[J].EURASIP Journal on Applied Signal Processing,2004,8(4):542-558.
[14]Yeung D Y,Chang H,Xiong Y,et al.SVC2004:First International Signature Verification Competition[C]//Proceedings of Conference on Lecture Notes in Com-puter Science.Berlin,Germany:Springer,2004,5(3):16-22.
[15]邱益鸣,胡华成,郑建彬,等.基于曲线相似的在线签名认证方法[J].系统工程与电子技术,2014,36(5):1016-1020.
[16]严霄凤.基于熵的密码强度估计[J].网络安全技术与应用,2012,12(11):36-38.
编辑索书志
|