Skip to main content

Iris Template Protection

  • Reference work entry
  • First Online:
Book cover Encyclopedia of Biometrics

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 899.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 549.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. A. Menezes, P. van Oorschot, S. Vanstone, Handbook of Applied Cryptography (CRC, Boca Raton, 1996)

    Google Scholar 

  2. R.M. Bolle, J.H. Connell, N.K. Ratha, Biometric perils and patches. Pattern Recognit. 35, 2727–2738 (2002)

    MATH  Google Scholar 

  3. A.K. Jain, K. Nandakumar, A. Nagar, Biometric template security. EURASIP J. Adv. Signal. Process. article ID 579416 (2008). Special issue on Advanced Signal Processing and Pattern Recognition Methods for Biometrics

    Google Scholar 

  4. I. Cox, M. Miller, J. Bloom, M. Miller, J. Fridrich, Digital Watermarking and Steganography, 2nd edn. (Morgan Kaufmann, San Francisco, 2007)

    Google Scholar 

  5. C.S. Chin, A.B.J. Teoh, D.C.L. Ngo, High security iris verification system based on random secret integration. Comput. Vis. Image Underst. 102(2), 169–177 (2006)

    Google Scholar 

  6. J. Daugman, How iris recognition works. IEEE Trans. Circuits Syst. Video Technol. 14(1), 21–30 (2004)

    Google Scholar 

  7. A. Juels, M. Wattenberg, A fuzzy commitment scheme, in Sixth ACM Conference on Computer and Communication Security, Singapore, 1999, pp. 28–36

    Google Scholar 

  8. A. Juels, M. Sudan, A fuzzy vault scheme, in Proceedings of the IEEE on International Symposium on Information Theory, Lausanne, 2002, p. 408

    Google Scholar 

  9. S. Yang, I. Verbauwhede, Secure iris verification, in Proceedings of the IEEE ICASSP, Honolulu, 2007, vol. 2, pp. 133–136 (2007)

    Google Scholar 

  10. F. Hao, R. Anderson, J. Daugman, Combining Crypto with biometrics effectively. IEEE Trans. Comput. 55(9), 1081–1088 (2006)

    Google Scholar 

  11. J. Bringer, H. Chabanne, G. Cohen, B. Kindarji, G. Zemor, Optimal iris fuzzy sketches, in First IEEE International Conference on Biometrics: Theory, Applications, and Systems, BTAS, Washington, DC, 2007, pp. 1–6

    Google Scholar 

  12. Y.J. Lee, K. Bae, S.J. Lee, K.R. Park, Biometric key binding: fuzzy vault based on iris images, in ICB 2007, Seoul. LNCS, vol. 4642, 2002, pp. 800–808

    Google Scholar 

  13. K. Nandakumar, Multibiometric systems: fusion strategies and template security. Dissertation, Department of Computer Science and Engineering, Michigan State University, 2008

    Google Scholar 

  14. E. Martinian, S. Yekhanin, J.S. Yedidia, Secure biometrics via syndromes, in 43rd Annual Allerton Conference on Communications, Control, and Computing, Monticello, Oct 2005

    Google Scholar 

  15. M.K. Khan, J. Zhang, L. Tian, Chaotic secure content-based hidden transmission of biometric templates. Chaos Solitons Fractals 32, 1749–1759 (2007). Elsevier

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media New York

About this entry

Cite this entry

Campisi, P., Maiorana, E., Neri, A. (2015). Iris Template Protection. In: Li, S.Z., Jain, A.K. (eds) Encyclopedia of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-1-4899-7488-4_308

Download citation

Publish with us

Policies and ethics