Protecting Iris Images through Asymmetric Digital Watermarking, 2007 IEEE Workshop on Automatic Identification Advanced Technologies, pp.192-197, 2007. ,
DOI : 10.1109/AUTOID.2007.380618
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.113.2613
Effects of watermarking on iris recognition performance, 2008 10th International Conference on Control, Automation, Robotics and Vision, pp.1156-1161, 2008. ,
DOI : 10.1109/ICARCV.2008.4795684
Experimental study on the impact of robust watermarking on iris recognition accuracy (best paper award, applications track), Proceedings of the 25th ACM Symposium on Applied Computing, pp.1479-1484, 2010. ,
Attack against robust watermarkingbased multimodal biometric recognition systems, Proceedings of the 2011 BioID Workshop, pp.25-36, 2011. ,
Watermarking as a means to enhance biometric systems: A critical survey, Proceedings of the 2011 Information Hiding Conference (IH'11), 2011. ,
Hiding fingerprint minutiae in images, Proceedings of AutoID 2002, 3rd Workshop on Automatic Identification Advanced Technologies, pp.97-102, 2002. ,
Hiding a face in a fingerprint image, Object recognition supported by user interaction for service robots, pp.756-759, 2002. ,
DOI : 10.1109/ICPR.2002.1048100
Hiding biometric data, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.25, issue.11, pp.1494-1498, 2003. ,
DOI : 10.1109/TPAMI.2003.1240122
Robust Hiding of Fingerprint-Biometric Data into Audio Signals, In Advances in Biometrics LNCS, vol.4642, pp.702-712, 2007. ,
DOI : 10.1007/978-3-540-74549-5_74
Digital watermarking of biometric speech references: impact
to the EER system performance, Security, Steganography, and Watermarking of Multimedia Contents IX, p.650513, 2007. ,
DOI : 10.1117/12.703890
Performance Evaluation of Watermarking Techniques for Secure Multimodal Biometric Systems, Proceedings of CIS 2005 (Part II), volume 3802 of LNAI, pp.635-642, 2005. ,
DOI : 10.1007/11596981_94
Enhancing security of fingerprints through contextual biometric watermarking, Forensic Science International, vol.169, issue.2-3, pp.188-194, 2007. ,
DOI : 10.1016/j.forsciint.2006.08.019
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.61.5384
A Study on Iris Feature Watermarking on Face Data, Proceedings of the 8th International Conference on Adaptive and Natural Computing Algorithms, ICANNGA '07, pp.415-423, 2007. ,
DOI : 10.1007/978-3-540-71629-7_47
Biometric template protection using watermarking with hidden password encryption, Proceedings of the International Symposium on Information Technology 2008 (ITSIM08), pp.296-303, 2008. ,
Enhancing security and privacy in biometrics-based authentication systems, IBM Systems Journal, vol.40, issue.3, pp.614-634, 2001. ,
DOI : 10.1147/sj.403.0614
Biometric attack vectors and defences, Computers & Security, vol.26, issue.1, pp.14-25, 2007. ,
DOI : 10.1016/j.cose.2006.12.008
URL : https://ourarchive.otago.ac.nz/bitstream/10523/1243/3/BiometricAttackVectors.pdf
Biometric watermark authentication with multiple verification rule, Proceedings of the 12th IEEE Workshop on Neural Networks for Signal Processing, pp.597-606, 2002. ,
DOI : 10.1109/NNSP.2002.1030071
Approaches to biometric watermarks for owner authentification, Proceedings of SPIE, Security and Watermarking of Multimedia Contents III, 2001. ,
DOI : 10.1117/12.435401
A Novel Biometric Image Integrity Authentication Using Fragile Watermarking and Arnold Transform, Information Computing and Automation ,
DOI : 10.1142/9789812799524_0203
Verification watermarks on fingerprint recognition and retrieval, Journal of Electronal Imaging, Special Issue on Image Security and Digital Watermarking, vol.9, issue.4, pp.468-476, 2000. ,
Security issues of Internet-based biometric authentication systems: risks of Man-in-the-Middle and BioPhishing on the example of BioWebAuth, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, pp.0-1, 2008. ,
DOI : 10.1117/12.767632