[1] |
CAVOUKIAN A , STOIANOV A . Biometric encryption[M]. Boston,USA: Springer US, 2011: 90-98.
|
[2] |
NAGAR A . Biometric template security[M]. Switzerland: Springer International Publishing, 2012.
|
[3] |
SANDHYA M , PRASAD M V N K . Biometric template protection:a systematic literature review of approaches and modalities[M]// Biometric Security and Privacy. Springer International Publishing, 2017: 323-370.
|
[4] |
SANDHYA M , PRASAD M V N K , CHILLARIGE R R . Generating cancellable fingerprint templates based on Delaunay triangle feature set construction[J]. IET Biometrics, 2016,5(2): 131-139.
|
[5] |
CAVOUKIAN A , SNIJDER M , STOIANOV A ,et al. Privacy and biometrics for authentication purposes:a discussion of untraceable biometrics and biometric encryption[M]// Ethics and Policy of Biometrics. Springer Berlin Heidelberg, 2010: 14-22.
|
[6] |
BOULGOURIS N V , PLATANIOTIS K N MICHELI-TZANAKOU E . Biometric encryption:the new breed of untraceable biometrics[M]. Biometrics:Theory,Methods,and Applications.John Wiley & Sons,Inc. 2009: 655-718.
|
[7] |
ACHLIOPTAS D , . Database-friendly random projections[C]// The 12th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Data Base Systems. 2001: 274-281.
|
[8] |
NGO D C L , TEOH A B J , GOH A . Biometric hash:high-confidence face recognition[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2006,16(6): 771-775.
|
[9] |
JIN Z , GOI B M , TEOH A ,et al. A two-dimensional random projected minutiae vicinity decomposition-based cancellable fingerprint template[J]. Security and Communication Networks, 2014,7(11): 1691-1701.
|
[10] |
TEOH A B J , YUANG C T . Cancelable biometrics realization with multispace random projections[J]. IEEE Transactions on Systems,Man,and Cybernetics,Part B (Cybernetics), 2007,37(5): 1096-1106.
|
[11] |
WANG Y , PLATANIOTIS K N . An analysis of random projection for changeable and privacy-preserving biometric verification[J]. IEEE Transactions on Systems,Man,and Cybernetics,Part B (Cybernetics), 2010,40(5): 1280-1293.
|
[12] |
KHAN S H , AKBAR M A , SHAHZAD F ,et al. Secure biometric template generation for multi-factor authentication[J]. Pattern Recognition, 2015,48(2): 458-472.
|
[13] |
YANG B , HARTUNG D , SIMOENS K ,et al. Dynamic random projection for biometric template protection[C]// 2010 Fourth IEEE International Conference on Biometrics:Theory Applications and Systems (BTAS). IEEE, 2010: 1-7.
|
[14] |
ANZAKU E T , SOHN H , RO Y M . Multi-factor authentication using fingerprints and user-specific random projection[C]// 2010 12th International Asia-Pacific Web Conference (APWEB). 2010: 415-418.
|
[15] |
PATEL V M , RATHA N K , CHELLAPPA R . Cancelable biometrics:a review[J]. IEEE Signal Processing Magazine, 2015,32(5): 54-65.
|
[16] |
张宁, 臧亚丽, 田捷 . 生物特征与密码技术的融合—一种新的安全身份认证方案[J]. 密码学报, 2015,2(2): 159-176.
|
|
ZHANG N , ZANG Y L , TIAN J . The integration of biometrics and cryptography-a new solution for secure identity authentication[J]. Journal of Cryptologic Research, 2015,2(2): 159-176.
|
[17] |
DASGUPTA S , GUPTA A . An elementary proof of the Johnson-Lindenstrauss lemma[J]. International Computer Science Institute,Technical Report, 1999,22(1): 1-5.
|
[18] |
FRANKL P , MAEHARA H . The Johnson-Lindenstrauss lemma and the sphericity of some graphs[J]. Journal of Combinatorial Theory,Series B, 1988,44(3): 355-362.
|
[19] |
JASSIM S,AL-ASSAM H , SELLAHEWA H . Improving performance and security of biometrics using efficient and stable random projection techniques[C]// 6th International Symposium on Image and Signal Processing and Analysis. 2009: 556-561.
|
[20] |
ARRIAGA R I , VEMPALA S . An algorithmic theory of learning:Robust concepts and random projection[C]// 40th Annual Symposium on Foundations of Computer Science. 1999: 616-623.
|
[21] |
BLAZE M , BLEUMER G , STRAUSS M . Divertible protocols and atomic proxy cryptography[J]. Advances in CryptologyEUROCRYPT'98, 1998: 127-144.
|
[22] |
AHMED M , HOSSAIN M A . Cloud computing and security issues in the cloud[J]. International Journal of Network Security & Its Applications, 2014,6(1): 25.
|
[23] |
LIU S , HU S , WENG J ,et al. A novel asymmetric three-party based authentication scheme in wearable devices environment[J]. Journal of Network and Computer Applications, 2016,60: 144-154.
|
[24] |
PIRKER M , SLAMANIG D . A framework for privacy-preserving mobile payment on security enhanced arm TrustZone platforms[C]// 2012 IEEE 11th International Conference on Trust,Security and Privacy in Computing and Communications (TrustCom). 2012: 1155-1160.
|
[25] |
周阿转, 俞一彪 . 采用特征空间随机映射的鲁棒性语音识别[J]. 计算机应用, 2012,32(07): 2070-2073.
|
|
ZHOU A Z , YU Y B . Robust speech recognition by adopting random projection in feature space[J]. Journal of Computer Applications, 2012,32(07): 2070-2073.
|
[26] |
ATENIESE G , FU K , GREEN M ,et al. Improved proxy re-encryption schemes with applications to secure distributed storage[J]. ACM Transactions on Information and System Security (TISSEC), 2006,9(1): 1-30.
|
[27] |
XU Z , XIONG L , XU Y . On the provably secure CEW based on orthogonal decomposition[J]. Signal Processing:Image Communication, 2014,29(5): 607-617.
|
[28] |
MAIO D , MALTONI D , CAPPELLI R ,et al. FVC2000:fingerprint verification competition[J]. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2002,24(3): 402-412.
|
[29] |
JAIN A K , PRABHAKAR S , HONG L ,et al. Filterbank-based fingerprint matching[J]. IEEE transactions on Image Processing, 2000,9(5): 846-859.
|
[30] |
张玉清, 王晓菲, 刘雪峰 ,等. 云计算环境安全综述[J]. 软件学报, 2016,27(6): 1328-1348.
|
|
ZHANG Y Q , WANG X F , LIU X F ,et al. Survey on cloud computing security[J]. Journal of Software, 2016,27(6): 1328-1348.
|