Keyphrases
3D Geometric
11%
Adversary
7%
Algorithm Transformation
7%
Attack Algorithm
14%
Benchmark Dataset
11%
Big Data
11%
Binarization Method
14%
Binary Features
22%
Binary Hash Code
13%
Binary Input
11%
Binary Space
7%
Binary Transformation
7%
BioHashing
7%
Biometric Cryptosystem
47%
Biometric Data
20%
Biometric Databases
10%
Biometric Features
7%
Biometric Identity
7%
Biometric Modalities
12%
Biometric Performance
11%
Biometric Security
11%
Biometric System
28%
Biometric Template
16%
Biometric Template Protection
22%
Biometrics
40%
Border Control
6%
Compact Binary Code
22%
Component-wise
7%
Computation-intensive
11%
Corresponding Features
7%
Cylinder-code
44%
Deduplication
22%
Discrimination Power
14%
Efficient Search
11%
Face Image
14%
Fast Retrieval
7%
Feature Comparison
11%
Feature Fusing
22%
Feature Fusion
44%
Feature Information
7%
Feature Representation
7%
Feature Space
7%
Feature Transformation
22%
Fingerprint Identification
11%
Fingerprint Indexing
66%
Fingerprint Template
7%
Fraud
7%
Fused Features
8%
Fusion Method
15%
FVC2002
18%
Geometric Configuration
11%
Geometric Hashing
22%
Geometric Invariant
11%
Hamming Space
15%
Hash Table
11%
Hash-based
33%
Hash-based Indexing
11%
Hashing
26%
High-dimensional Features
7%
High-dimensional Space
11%
Hill Climbing
7%
Histogram
7%
Histogram Representation
22%
Hit Rate
11%
Identity Management
11%
Illegal Access
7%
Index Creation
11%
Indexing Methods
37%
Indexing Scheme
8%
Law
7%
Locality Sensitive Hashing
22%
Low Penetration Rate
11%
Masquerade Attack
22%
Minutiae
44%
Minutiae Points
14%
Multi-biometric System
9%
Multimodal Biometrics
88%
Multimodality
11%
Multiple Biometrics
9%
Multiple Enrollment
7%
Non-invertibility
7%
Normalized Frequency
7%
Perceptron Learning
22%
Popular
15%
Processing Bottleneck
7%
Protection Method
13%
Publicly Available Dataset
11%
Rank-one
14%
Recognition Performance
29%
Recognition Rate
14%
Recognition Template
7%
Sample Distortion
11%
Sample Feature
7%
Sampling Noise
11%
Security Performance
22%
Security Privacy
6%
State-of-the-art Techniques
11%
Synthetic Faces
7%
System Protection
7%
System Security
11%
Template Fusion
22%
Template Protection
66%
Template Recognition
22%
Template Security
29%
Three-dimensional (3D)
7%
Token
7%
Transformation Method
7%
Transformation Scheme
22%
Unauthorized Access
7%
Unibiometric
6%
User-centric
7%
Computer Science
Authentication
11%
Big Data
11%
binarization
14%
Binary Feature
22%
Biometric Data
22%
Biometric Feature
7%
Biometric Modality
14%
Biometric System
29%
biometric template
18%
Biometric Template Protection
22%
Biometrics
100%
Cryptography
48%
deduplication
22%
Dimensional Feature
7%
Discretization
14%
Discriminability
47%
Enrollment Biometric
7%
Experimental Result
26%
Extracted Feature
15%
Feature Fusion
37%
Feature Information
7%
Feature Space
7%
Fingerprint Database
7%
Fingerprint Identification
11%
Hash Code
22%
Hash Table
11%
Hashing
44%
High Dimensional Space
11%
Hill Climbing
7%
Hit Rate
11%
Identity Management
11%
Indexing Method
37%
Information Retrieval
14%
Intensive Computation
11%
Intermediate Step
7%
Invariant
11%
Likelihood Estimate
7%
Locality Sensitive Hashing
22%
maximum-likelihood
7%
Multimodal Biometric
26%
Protection Method
7%
Protection Technique
7%
Recognition Performance
29%
Recognition Rate
14%
Representing Set
7%
Security and Privacy
7%
Security Template
29%
Stored Information
7%
System Security
11%
template protection
63%
Theoretical Framework
7%
Unauthorized Access
7%