Keyphrases
Accurate Matching
6%
Adversarial Learning
13%
Analysis of Similarity (ANOSIM)
13%
Anonymized
40%
Associated Costs
13%
Binarization
8%
Binarization Method
6%
Binary Code Learning
40%
Binary Embedding
6%
Binary Features
40%
Binary Forms
6%
Binary Hash Code
24%
Binary Indices
13%
Binary Representation
13%
Binary-level
8%
Biometric Applications
13%
Biometric Cryptosystem
46%
Biometric Features
40%
Biometric Identification
80%
Biometric Identity
6%
Biometric Privacy
13%
Biometric Recognition System
13%
Biometric Template
13%
Biometric Traits
6%
Biometrics
41%
Code Size
8%
Code-based
8%
Compact Binaries
14%
Compact Binary Code
40%
Compact Form
6%
Computational Effort
6%
Computational Memory
6%
Computational Methods
13%
Computationally Intensive
6%
Cryptographic Primitives
13%
Cryptosystem
8%
Cylinder-code
40%
Data Dependency
6%
Data-centric
13%
Deduplication
6%
Dependent Features
8%
Design Learning
6%
Dimensionality Reduction
6%
Distance Comparison
20%
Distance Computation
20%
Distance Filter
40%
Distance Information
20%
Distance Measure
13%
Distance Parameter
33%
Distribution Modelling
8%
Dynamic Interval
13%
Efficient Search
40%
Existing Techniques
6%
Extraction Parameters
8%
Fast Operation
6%
Feature Discriminability
8%
Feature Distribution
6%
Feature Fusion
40%
Feature Fusion Method
8%
Feature Group
8%
Feature Space
6%
Feature System
8%
Fingerprint Database
16%
Fingerprint Evidence
8%
Fingerprint Indexing
40%
Fingerprint Minutiae
40%
Fingerprint Retrieval
8%
For Indexing
6%
Fused Features
16%
Fusion Approach
8%
Fusion Method
8%
Fuzzy Commitment
8%
Fuzzy Extractor
8%
Generalized Linear Model
8%
Hamming Ball
20%
Hamming Distance
13%
Hamming Space
61%
Hash-based
40%
Hashing
8%
High Bits
8%
High Dimension
6%
High Entropy
8%
High-dimensional Data
13%
Identity Management
6%
Index Codes
13%
Indexing Methods
6%
Indexing Scheme
29%
Inference-based Approach
13%
Information Leakage
13%
Integrative Approach
8%
Intensity Function
8%
Iris
6%
Kernel Regression
8%
Large Database
13%
Large-scale Application
8%
Large-scale Search
6%
Large-scale Systems
8%
Learning Objectives
6%
Low Storage Cost
6%
Machine Learning Techniques
6%
Markov Random Field
8%
Matcher
6%
Maximum Likelihood Estimation
8%
Memory Storage
6%
Minutiae
80%
Minutiae Representation
8%
Modality-specific
6%
Montgomery
40%
Montgomery Modular multiplication
13%
Multimodal Biometric Recognition
8%
Multimodal Biometrics
80%
Multimodal Database
8%
Multiple Biometrics
6%
Multiple Sets
8%
National Security
6%
Nearest Neighbor Search
6%
Obfuscation
13%
Order of Accuracy
6%
Order of Magnitude
13%
Orientation Field
8%
Pairwise Similarity
13%
Personal Identification System
6%
Popular
8%
Population Coverage
6%
Privacy Awareness
20%
Privacy Implications
20%
Privacy Protection
13%
Privacy-preserving
13%
Privacy-preserving Biometrics
40%
Random Process
8%
Recognition Accuracy
6%
Regression Approach
40%
Regular Variation
8%
Ridge Orientation
8%
Scientific Validity
8%
Search Algorithm
20%
Search Efficiency
13%
Search Index
13%
Search Methods
20%
Search Performance
21%
Search Range
6%
Secure Computation
13%
Security Applications
6%
Security Implications
20%
Similarity Information
13%
Similarity Search
40%
Single Modality
6%
Spatial Distribution
8%
Spatial Inhomogeneity
40%
Statistical Experiment
16%
Synthetic Fingerprint
8%
System Evaluation
8%
System Security
8%
System Use
6%
Template Protection
8%
Uniformly Distributed
8%
Vector Index
6%
Vulnerability Study
13%
Weak Dependence
8%
Weakly Dependent
8%
Computer Science
Adversarial Machine Learning
8%
binarization
6%
Binary Feature
40%
Binary Representation
13%
Biometric Feature
40%
Biometric Identification
80%
biometric template
8%
Biometric Trait
6%
Biometrics
100%
Computational Effort
6%
Cryptographic Primitive
8%
Cryptography
46%
deduplication
6%
Discriminability
32%
Distance Measure
8%
Experimental Result
8%
Extracted Feature
8%
Feature Fusion
40%
Feature Space
6%
Fingerprint Database
53%
Hamming Distance
8%
Hash Code
40%
High Dimensional Data
8%
Identity Management
6%
Indexing Method
6%
Information Leakage
8%
Information Retrieval
13%
Intensive Task
6%
learning design
6%
Likelihood Estimate
13%
Machine Learning Technique
6%
maximum-likelihood
13%
Multimodal Biometric
8%
Neighbour Search
6%
Orientation Field
40%
Privacy Implication
20%
Privacy Preserving
40%
Privacy Protection
8%
Real Data Sets
20%
Recognition Accuracy
6%
Recognition System
8%
Search Procedure
6%
Searching Algorithm
20%
Security Application
6%
Security Implication
20%
Similarity Search
40%
Spatial Distribution
40%
System Evaluation
40%
System Identification
6%
System Security
8%
template protection
8%
Theoretical Framework
13%