Keyphrases
Minutiae
80%
Biometric Identification
80%
Multimodal Biometrics
80%
Hamming Space
61%
Biometric Cryptosystem
46%
Biometrics
41%
Fingerprint Minutiae
40%
Spatial Inhomogeneity
40%
Montgomery
40%
Privacy-preserving Biometrics
40%
Regression Approach
40%
Binary Code Learning
40%
Distance Filter
40%
Feature Fusion
40%
Hash-based
40%
Compact Binary Code
40%
Similarity Search
40%
Binary Features
40%
Efficient Search
40%
Anonymized
40%
Fingerprint Indexing
40%
Biometric Features
40%
Cylinder-code
40%
Distance Parameter
33%
Indexing Scheme
29%
Binary Hash Code
24%
Search Performance
21%
Distance Computation
20%
Distance Information
20%
Privacy Implications
20%
Distance Comparison
20%
Security Implications
20%
Hamming Ball
20%
Privacy Awareness
20%
Search Algorithm
20%
Search Methods
20%
Fused Features
16%
Statistical Experiment
16%
Fingerprint Database
16%
Compact Binaries
14%
Secure Computation
13%
Biometric Recognition System
13%
Montgomery Modular multiplication
13%
Search Index
13%
Vulnerability Study
13%
Cryptographic Primitives
13%
Similarity Information
13%
Associated Costs
13%
Inference-based Approach
13%
Obfuscation
13%
Biometric Applications
13%
Biometric Privacy
13%
Dynamic Interval
13%
Search Efficiency
13%
Binary Indices
13%
Index Codes
13%
Privacy-preserving
13%
Order of Magnitude
13%
Large Database
13%
Hamming Distance
13%
Computational Methods
13%
Pairwise Similarity
13%
Privacy Protection
13%
Analysis of Similarity (ANOSIM)
13%
High-dimensional Data
13%
Distance Measure
13%
Binary Representation
13%
Information Leakage
13%
Biometric Template
13%
Data-centric
13%
Adversarial Learning
13%
Fingerprint Evidence
8%
Intensity Function
8%
Distribution Modelling
8%
Minutiae Representation
8%
Large-scale Application
8%
Fingerprint Retrieval
8%
Multimodal Database
8%
Binarization
8%
Feature Group
8%
Scientific Validity
8%
Multimodal Biometric Recognition
8%
Regular Variation
8%
Fuzzy Extractor
8%
High Bits
8%
Orientation Field
8%
Kernel Regression
8%
Random Process
8%
Dependent Features
8%
Synthetic Fingerprint
8%
Cryptosystem
8%
Ridge Orientation
8%
Large-scale Systems
8%
Feature System
8%
Fusion Approach
8%
High Entropy
8%
Fuzzy Commitment
8%
Feature Fusion Method
8%
Binary-level
8%
Feature Discriminability
8%
Code Size
8%
Uniformly Distributed
8%
Hashing
8%
Markov Random Field
8%
Spatial Distribution
8%
Fusion Method
8%
Weakly Dependent
8%
System Evaluation
8%
Extraction Parameters
8%
Integrative Approach
8%
Popular
8%
Code-based
8%
Generalized Linear Model
8%
Multiple Sets
8%
Template Protection
8%
System Security
8%
Weak Dependence
8%
Maximum Likelihood Estimation
8%
Matcher
6%
Accurate Matching
6%
Personal Identification System
6%
Multiple Biometrics
6%
Biometric Traits
6%
Fast Operation
6%
Large-scale Search
6%
Population Coverage
6%
Binary Embedding
6%
Binary Forms
6%
Search Range
6%
Nearest Neighbor Search
6%
Existing Techniques
6%
Indexing Methods
6%
For Indexing
6%
Learning Objectives
6%
Machine Learning Techniques
6%
Memory Storage
6%
Modality-specific
6%
Order of Accuracy
6%
Dimensionality Reduction
6%
Recognition Accuracy
6%
System Use
6%
Computational Effort
6%
High Dimension
6%
Compact Form
6%
Security Applications
6%
Single Modality
6%
Deduplication
6%
Binarization Method
6%
Biometric Identity
6%
Design Learning
6%
Computational Memory
6%
Computationally Intensive
6%
Data Dependency
6%
Feature Distribution
6%
Vector Index
6%
Low Storage Cost
6%
National Security
6%
Feature Space
6%
Identity Management
6%
Iris
6%
Computer Science
Biometrics
100%
Biometric Identification
80%
Fingerprint Database
53%
Cryptography
46%
Similarity Search
40%
Orientation Field
40%
Hash Code
40%
Privacy Preserving
40%
Feature Fusion
40%
System Evaluation
40%
Binary Feature
40%
Spatial Distribution
40%
Biometric Feature
40%
Discriminability
32%
Privacy Implication
20%
Security Implication
20%
Searching Algorithm
20%
Real Data Sets
20%
Likelihood Estimate
13%
maximum-likelihood
13%
Information Retrieval
13%
Theoretical Framework
13%
Binary Representation
13%
Distance Measure
8%
Multimodal Biometric
8%
Cryptographic Primitive
8%
System Security
8%
template protection
8%
Adversarial Machine Learning
8%
Hamming Distance
8%
Privacy Protection
8%
Extracted Feature
8%
High Dimensional Data
8%
Experimental Result
8%
Recognition System
8%
Information Leakage
8%
biometric template
8%
Computational Effort
6%
Biometric Trait
6%
Search Procedure
6%
binarization
6%
Identity Management
6%
Neighbour Search
6%
learning design
6%
Machine Learning Technique
6%
Recognition Accuracy
6%
Security Application
6%
deduplication
6%
Indexing Method
6%
System Identification
6%
Feature Space
6%
Intensive Task
6%