2006
DOI: 10.1016/j.patcog.2005.10.025
|View full text |Cite
|
Sign up to set email alerts
|

An analysis of BioHashing and its variants

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

2
95
0

Year Published

2006
2006
2013
2013

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 218 publications
(97 citation statements)
references
References 18 publications
2
95
0
Order By: Relevance
“…The authors report almost perfect performance rates for the generation of biometric hashes. In order to expose the true performance of BioHashing, Kong et al [9] presented an implementation of FaceHashing. It was found that the reported performance was achieved under the hidden assumption that random numbers are never lost, stolen, or compromised.…”
Section: Biometric T-fa Systemsmentioning
confidence: 99%
“…The authors report almost perfect performance rates for the generation of biometric hashes. In order to expose the true performance of BioHashing, Kong et al [9] presented an implementation of FaceHashing. It was found that the reported performance was achieved under the hidden assumption that random numbers are never lost, stolen, or compromised.…”
Section: Biometric T-fa Systemsmentioning
confidence: 99%
“…The limitations of correction capacity affect the matching accuracy of the system. Many hashing based systems have also been developed but they too fail to achieve high accuracy in realistic settings [16].…”
Section: Introductionmentioning
confidence: 99%
“…In most of these applications, biometric templates are stored in databases and/or smart cards, thus raising questions such as data security and privacy. Various biometric hashing methods, which mostly depend on random projections, are proposed to protect the biometrics data [1]- [5] in the literature. See Fig.…”
Section: Introductionmentioning
confidence: 99%