[1]
|
W. Stallings, “Cryptography and Network Security: Principles and Practice,” 3rd Edition, Prentice Hall, Saddle River, 2003.
|
[2]
|
R. F. Churchhouse, “Codes and Ciphers,” Cambridge University Press, Cambridge, 2004.
|
[3]
|
C. Paar and J. Pelzl, “Understanding Cryptography,” Springer-Verlag, Berlin, Heidelberg, 2010, p. 173.
|
[4]
|
B. Schneier, “Applied Cryptography—Protocols, Algorithms, and Source Code in C,” 2nd Edition, John Wiley & Sons, Inc., New York, 1996.
|
[5]
|
D. R. Stinson, “Cryptography: Theory and Practice,” 2nd Edition, CRC Press, Boca Raton, 2002.
|
[6]
|
G. Tomko, C. Soutar and G. Schmidt, “Biometric Controlled Key Generation,” United States Patent No. 5680460, 1997.
|
[7]
|
A. Goh and D. Ngo, “Computation of Cryptographic Keys from Face Biometrics,” Proceedings of International Conference on Communications and Multimedia Security, Torino, 2-3 October 2003, pp. 1-13.
|
[8]
|
F. Monrose, M. K. Reiter, Q. Li and S. Wetzel, “Cryptographic Key Generation from Voice,” Proceedings of the IEEE Symposium on Security and Privacy, Oakland, 14- 16 May 2001, pp. 202-213.
|
[9]
|
F. Hao, R. Anderson and J. Daugman, “Combining Crypto with Biometrics Effectively,” IEEE Transactions on Computers, Vol. 55, No. 9, 2006, pp. 1081-1088.
doi:10.1109/TC.2006.138
|
[10]
|
J. Daugman, “The Importance of Being Random: Statistical Principles of Iris Recognition,” Pattern Recognition, Vol. 36, No. 2, 2003, pp. 279-291.
doi:10.1016/S0031-3203(02)00030-4
|
[11]
|
S. Ziauddin and M. N. Dailey, “Robust Iris Verification for Key Management,” Pattern Recognition Letters, Vol. 31, No. 9, 2009, pp. 926-935.
doi:10.1016/j.patrec.2009.12.028
|
[12]
|
Massachusetts Institute of Technology, “Kerberos: The Network Authentication Protocol,” august 2011.
http://www.web.mit.edu/kerberos/
|
[13]
|
C. Tisse, L. Martin, L. Torres and M. Robert, “Person Identification Technique Using Human Iris Recognition,” Proceedings of 15th International Conference on Vision Interface, Calgary, 27-29 May 2002, pp. 294-299.
|
[14]
|
R. P. Wildes, “Iris Recognition: An Emerging Biometric Technology,” Proceedings of the IEEE, Vol. 85, No. 9, 1997, pp. 1348-1363. doi:10.1109/5.628669
|
[15]
|
S. Sanderson and J. Erbetta, “Authentication for Secure Environments Based on Iris Scanning Technology,” IEEE Colloquium on Visual Biometrics, London, 2 March 2000, pp. 8/1-8/7.
|
[16]
|
J. G. Daugman, “How Iris Recognition Works,” IEEE Transsctions on Circuits and Systems for Video Technology, Vol. 14, No. 1, 2004, pp. 21-30.
doi:10.1109/TCSVT.2003.818350
|
[17]
|
J. Wayman, A. Jain, D. Maltoni and D. Maio, “Biometric Systems, Technology, Design and Performance Evaluation,” Springer, London, 2005.
|
[18]
|
Hyvarinen, J. Karhunen and E. Oja, “Independent Component Analysis,” John Wiley, Hoboken, 2001.
doi:10.1002/0471221317
|
[19]
|
J. V. Stone, “Independent Component Analysis,” MIT Press, Cambridge, 2004.
|
[20]
|
S. Cho?, A. Cichocki and S. Amari, “Adaptative Blind Signal and Image Processing: Learning Algorithms Applications,” John Wiley & Sons, Hoboken, 2002.
|
[21]
|
A. Papoulis, “Probability, Random Variables, and Stochastic Processes,” 3rd Edition, McGraw-Hill, Boston, 1991.
|
[22]
|
T. M. Cover and J. A. Thomas, “Elements of Information Theory,” Wiley, Hoboken, 1991.
doi:10.1002/0471200611
|
[23]
|
P. Comon, “Independent Component Analysis—A New Concept?” Signal Processing, Vol. 36, No. 3, 1994, pp. 287-314. doi:10.1016/0165-1684(94)90029-9
|
[24]
|
S. Amari, “Natural Gradient for Over- and Under-Complete Bases in ICA,” Neural Computation, Vol. 11, No. 8, 1999, pp. 1875-1883. doi:10.1162/089976699300015990
|
[25]
|
National Institute of Standards and Technology (NIST), “Advanced Encryption Standard,” NIST, FIPS PUB 197, US Department of Commerce, 2001.
http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
|
[26]
|
M. Dworkin, “Recommendation for Block Cipher Modes and Operations,” NIST Special Publication 800-38A, 2001.
|
[27]
|
C. Berrou, “Codes et Turbo Codes,” Springer-Verlag, Paris, 2007. ISBN 13: 978-2-287-32739-1
|
[28]
|
J. Proakis and M. Salehi, “Digital Communications,” 5th Edition, McGraw-Hill, Boston, 2007.
ISBN-13: 978-0072957167
|
[29]
|
S. H. Moi, P. Saad, N. A. Rahim and S. Ibrahim, “Error Correction on IRIS Biometric Template Using Reed Solomon Codes,” IEEE 4th Inernationnal Conference on Mathematical/Analytical Modelling and Computer Simulation (AMS), Kota Kinabalu, 26-28 May 2010, pp. 209-214.
doi10.1109/AMS.2010.50
|
[30]
|
Download the Application form at the Website:
http://www.cbsr.ia.ac.cn/IrisDatabase.html
|
[31]
|
J. Daugman, “High Confidence Visual Recognition of Persons by a Test of Statistical Independence,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 15, No. 11, 1993, pp. 1148-1161. doi:10.1109/34.244676
|
[32]
|
L. Ma, T. Tan, Y. Wang and D. Zhang, “Efficient Iris Recognition by Characterizing Key Local Variations,” IEEE Transactions on Image Processing, Vol. 13, No. 6, 2004, pp. 739-750. doi:10.1109/TIP.2004.827237
|
[33]
|
L. Ma, T. Tan, Y. Wang and D. Zhang, “Personal identification based on iris texture analysis,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 25, No. 12, 2003, pp. 1519-1533.
doi:10.1109/TPAMI.2003.1251145
|
[34]
|
C. E. Shannon, “Communication Theory of Secrecy Systems,” Bell System Technical Journal, Vol. 28, No. 4, 1949, pp. 656-715.
|