Chinese Optics Letters, Volume. 6, Issue 7, 487(2008)
A data hiding approach for the self-security of iris recognition
[1] [1] C. A. Shoniregun and S. Crosier, Securing Biometrics Applications (Springer, New York, 2007).
[2] [2] B. Schneier, Commun. ACM 42, (8) 136 (1999).
[3] [3] A. Adler, in Proceedings of IEEE CCECE 2003 2, 1163 (2003).
[4] [4] A. K. Jain and U. Uludag, IEEE Trans. Pattern Anal. Machine Intell. 25, 1494 (2003).
[5] [5] F. Hartung and M. Kutter, Proc. IEEE 87, 1079 (1999).
[7] [7] S. Jain, in Proc. Indian Conf. Computer Vision, Graphics and Image Processing 139 (2000).
[8] [8] N. K. Ratha, J. H. Connell, and R. M. Bolle, in Proc. ACM Multimedia Workshops 127 (2000).
[9] [9] S. Pankanti and M. M. Yeung, Proc. SPIE 3657, 66 (1999).
[10] [10] B. Gunsel, U. Uludag, and A. M. Teklap, Pattern Recogn. 35, 2739 (2002).
[11] [11] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, IBM Systems Journal 35, 313 (1996).
[12] [12] M. Kutter, F. D. Jordan, and F. Bossen, Proc. SPIE 3022, 518 (1997).
[13] [13] J. Daugman, IEEE Trans. Circ. Syst. Video Technol. 14, 21 (2004).
[14] [14] A. K. Jain, S. Pankanti, S. Prabhahar, L. Hong, A. Ross, and J. L. Wayman, in Proceedings of the 17th International Conference on Pattern Recognition 935 (2004).
[15] [15] X. Ye, "Iris and face based multi-biometrics identification and fusion algorithm", Ph.D Thesis (University of Science and Technology of China, 2006).
Get Citation
Copy Citation Text
Xueyi Ye, Zhiwei He, Zhijing Zhao, "A data hiding approach for the self-security of iris recognition," Chin. Opt. Lett. 6, 487 (2008)
Received: Jul. 19, 2007
Accepted: --
Published Online: Jul. 11, 2008
The Author Email: