Author:
Wang Zairan,Dong Jing,Wang Wei,Tan Tieniu
Publisher
Springer International Publishing
Reference29 articles.
1. Jain, A.K., Uludag, U.: Hiding biometric data. IEEE Trans. Pattern Anal. Mach. Intell. 25, 1494–1498 (2003)
2. Schneier, B.: The uses and abuses of biometrics. Commun. ACM 42(8), 136 (1999)
3. Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40, 614–634 (2001)
4. Ratha, N.K., Connell, J.H., Bolle, R.M.: Secure data hiding in wavelet compressed fingerprint images. In: ACM Multimedia Conference, pp. 127–130 (2000)
5. Jain, A.K., Uludag, U.: Hiding Fingerprint Minutiae in Images. In: Proceedings of 3rd Workshop on Automatic Identification Advanced Technologies (2002)