Last modified: 2020-12-26
Abstract
Keywords
References
1. Anil J. Kain, Bolle Ruud and Pankanti Sharath "BIOMETRIC: Personal identification in networked society". Kluwer Academic Publichers, 1999.
2. Soutar C. , Roberge D. , Stojanov S.A., Gilroy R. and Kumar Vijaya B.V.K. "Biometric encryption using image processing". In: Proc. of SPIE, Optical Security and Counterfeit Deterrence Techniques 11, Vol. 3314, 1998, pp. 178-188.
3. Davida G.l., Frankel Y. and Matt B.J. "On enabling secure applications through off-line biometric identification", In: Proc. of Symp Privacy and Security IEEE, 1998, pp. 148-157.
4. Davida G.I., Frankel Y., Matt B.J. and Peralta R. "On the relation of error correction and cryptography to an offline biometric based identification scheme". In: Proc. of Workshop Coding and Cryptography (wcc'99), 1999, pp. 129-138.
5. Monrose F. , Reiter M.K. and Wetzel S. "Password hardening based on keystroke dynamics". In: Proc. of 6th ACM Conf Computer and Communications Security, 1999, pp. 73-82.
6. Verbitskiy F„., Tuyls P., Denteneer D. and Linnartz J.P. "Reliable biometric authentication with privacy protection". In: SPIE Biometric Technology for Human Identification Conference, Orlando, FL, USA, 2004.
7. Juels A. and Wattenberg M. , ''A fuzzy commitment scheme". In: Proc. 6th ACM Conf Computer and Communications Security, G. Tsudik, Ed., 1999, pp. 28-36.
8. McCulloch W.S., Pitts W.A. ''A logical calculus of the ideas immanent in nervous activity". Bull. Math. Biophys, 1943; 5: 115-133.
9. Pitts W.A., McCulloch W.S. "How we know universals: The perception of auditory and visual forms". Bull. Math. Biophys, 1947; 9: 127.
10 . Haykin S. "Neural Networks: A Comprehensive Foundation. Prentice Hall", 2nd edition. Upper Saddle River, New Jersey, 1999.
l l . Poggio T. and Girosi F. "Networks and the best approximation property". Biological Cybernetics, 1990; 63: 169-176.
12. Hornik K. , Stinchcombe M. and White H. "Universal approximation of an unknown mapping and its derivatives using multilayer feedforward networks". Neural Networks, 1990; 3: 551-560.
13. Stone M.H. "Applications of the Theory of Boolean Rings to General Topology". Transactions of the American Mathematical Society, 1943; 41(3): 375-481.
14. Stone M.H. "The Generalized Weierstrass Approximation Theorem". Mathematics Magazine, 1948; 21(4): 167-184 and 21(5): 237-254.
15. Gorban A.N. "The generalized Stone-Weierstrass approximation theorem and approximation of continuous functions of several variables by an arbitrary non-linear function of one variable, linear functions and their superpositions". Advances in Modelling and Analysis, Vol. 35, 1999; I: 7-13.
16, Uludag U, Pankanti S., Prabhakar S„ Jain A.K. "Biometric Cryptosystems: issues and challenges". In: Proc. ofThe IEEE, Vol. 92, 2004, pp. 948-960.
17. Monrose Reiter M.K„ Qi Li, Wetzel S. "Cryptographic Key Generation from Voice". In: Proc. of IEEE Symposium on Security and Privacy, 2001. www.cs.jhu.edu/—fabian/papers/oakland.pdñ
18. Riedmiller M. and Braun H. "A direct adaptive method for faster backpropagation learning: The RPROP algorithm". In: Proc. of the IEEE International Conference on Neural Networks, 1993.
19. Ferguson N. , Kelsey L, Lucks S., Schneier B. , Stay M. , Wagner D. and Whiting D. "Improved Cryptanalysis of Rijndael Seventh Fast Software Encryption Workshop". Springer-Verlag, 2000. http://www.schneier.com/paper-rijndael.html.