Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
A. Menezes, P. van Oorschot, S. Vanstone, Handbook of Applied Cryptography (CRC, Boca Raton, 1996)
R.M. Bolle, J.H. Connell, N.K. Ratha, Biometric perils and patches. Pattern Recognit. 35, 2727–2738 (2002)
A.K. Jain, K. Nandakumar, A. Nagar, Biometric template security. EURASIP J. Adv. Signal. Process. article ID 579416 (2008). Special issue on Advanced Signal Processing and Pattern Recognition Methods for Biometrics
I. Cox, M. Miller, J. Bloom, M. Miller, J. Fridrich, Digital Watermarking and Steganography, 2nd edn. (Morgan Kaufmann, San Francisco, 2007)
C.S. Chin, A.B.J. Teoh, D.C.L. Ngo, High security iris verification system based on random secret integration. Comput. Vis. Image Underst. 102(2), 169–177 (2006)
J. Daugman, How iris recognition works. IEEE Trans. Circuits Syst. Video Technol. 14(1), 21–30 (2004)
A. Juels, M. Wattenberg, A fuzzy commitment scheme, in Sixth ACM Conference on Computer and Communication Security, Singapore, 1999, pp. 28–36
A. Juels, M. Sudan, A fuzzy vault scheme, in Proceedings of the IEEE on International Symposium on Information Theory, Lausanne, 2002, p. 408
S. Yang, I. Verbauwhede, Secure iris verification, in Proceedings of the IEEE ICASSP, Honolulu, 2007, vol. 2, pp. 133–136 (2007)
F. Hao, R. Anderson, J. Daugman, Combining Crypto with biometrics effectively. IEEE Trans. Comput. 55(9), 1081–1088 (2006)
J. Bringer, H. Chabanne, G. Cohen, B. Kindarji, G. Zemor, Optimal iris fuzzy sketches, in First IEEE International Conference on Biometrics: Theory, Applications, and Systems, BTAS, Washington, DC, 2007, pp. 1–6
Y.J. Lee, K. Bae, S.J. Lee, K.R. Park, Biometric key binding: fuzzy vault based on iris images, in ICB 2007, Seoul. LNCS, vol. 4642, 2002, pp. 800–808
K. Nandakumar, Multibiometric systems: fusion strategies and template security. Dissertation, Department of Computer Science and Engineering, Michigan State University, 2008
E. Martinian, S. Yekhanin, J.S. Yedidia, Secure biometrics via syndromes, in 43rd Annual Allerton Conference on Communications, Control, and Computing, Monticello, Oct 2005
M.K. Khan, J. Zhang, L. Tian, Chaotic secure content-based hidden transmission of biometric templates. Chaos Solitons Fractals 32, 1749–1759 (2007). Elsevier
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media New York
About this entry
Cite this entry
Campisi, P., Maiorana, E., Neri, A. (2015). Iris Template Protection. In: Li, S.Z., Jain, A.K. (eds) Encyclopedia of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-1-4899-7488-4_308
Download citation
DOI: https://doi.org/10.1007/978-1-4899-7488-4_308
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4899-7487-7
Online ISBN: 978-1-4899-7488-4
eBook Packages: Computer ScienceReference Module Computer Science and Engineering