Biometric Template Security, EURASIP Journal on Advances in Signal Processing, vol.6, issue.2, p.579416, 2008. ,
DOI : 10.1109/TIFS.2007.908165
Local Binary LDA for Face Recognition, Proceedings of the 3 rd European Workshop on Biometrics and Identity Management (BioID2011), pp.144-155, 2011. ,
DOI : 10.1007/978-3-642-19530-3_14
The Best Bits in an Iris Code, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.31, issue.6, pp.964-973, 2009. ,
DOI : 10.1109/TPAMI.2008.185
On Combining Selective Best Bits of Iris-Codes, Proceedings of the 3 rd European Workshop on Biometrics and Identity Management (BioID2011), pp.127-137, 2011. ,
DOI : 10.1007/978-3-642-19530-3_21
An Efficient Secure Multimodal Biometric Fusion Using Palmprint and Face Image, International Journal of Computer Science Issues , IJCSI, vol.2, pp.49-53, 2009. ,
Biometric Recognition Using Feature Selection and Combination, LNCS, vol.3546, pp.813-822, 2005. ,
DOI : 10.1007/11527923_85
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.74.3696
Handwriting Biometrics: Feature Selection Based Improvements in Authentication and Hash Generation Accuracy, Proceedings of the 3 rd European Workshop on Biometrics and Identity Management (BioID2011), pp.37-48, 2011. ,
DOI : 10.1007/978-3-642-19530-3_4
Feature Selection by User Specific Feature Mask on a Biometric Hash Algorithm for Dynamic Handwriting, Proceedings of the 12th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security, pp.85-93, 2011. ,
DOI : 10.1007/978-3-642-24712-5_7
Biometric hash based on statistical features of online signatures, Object recognition supported by user interaction for service robots, 2002. ,
DOI : 10.1109/ICPR.2002.1044628
Biometric User Authentication for IT Security: From Fundamentals to Handwriting, 2006. ,
Potentielle Rückführbarkeit eines biometrischen Hashes für Handschriften, Proceedings of the D-A-CH Security Conference, pp.66-77, 2010. ,
Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data Reconstruction, Proceedings of the 11th Joint IFIP TC6/TC11 International Conference on Communications and Multimedia Security, pp.178-190, 2010. ,
DOI : 10.1007/978-3-642-13241-4_17
Advanced Studies on Reproducibility of Biometric?Hashes, Proceedings of the First Workshop on Biometrics and Identity Management, pp.150-159, 2008. ,
DOI : 10.1007/978-3-540-89991-4_16