On-Line Fingerprint Verification
IEEE Transactions on Pattern Analysis and Machine Intelligence
Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection
IEEE Transactions on Pattern Analysis and Machine Intelligence
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Password hardening based on keystroke dynamics
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
An Analysis of Minutiae Matching Strength
AVBPA '01 Proceedings of the Third International Conference on Audio- and Video-Based Biometric Person Authentication
Timely Authentication in Distributed Systems
ESORICS '92 Proceedings of the Second European Symposium on Research in Computer Security
Freshness Assurance of Authentication Protocols
ESORICS '92 Proceedings of the Second European Symposium on Research in Computer Security
Handbook of Fingerprint Recognition
Handbook of Fingerprint Recognition
Biometric Hash based on Statistical Features of Online Signatures
ICPR '02 Proceedings of the 16 th International Conference on Pattern Recognition (ICPR'02) Volume 1 - Volume 1
FVC2002: Second Fingerprint Verification Competition
ICPR '02 Proceedings of the 16 th International Conference on Pattern Recognition (ICPR'02) Volume 3 - Volume 3
Cryptographic Key Generation from Voice
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Secure smartcardbased fingerprint authentication
WBMA '03 Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications
Cancelable Biometric Filters for Face Recognition
ICPR '04 Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04) Volume 3 - Volume 03
Reusable cryptographic fuzzy extractors
Proceedings of the 11th ACM conference on Computer and communications security
PalmHashing: a novel approach for cancelable biometrics
Information Processing Letters
A secure biometric authentication scheme based on robust hashing
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Secure Coding in C and C++ (SEI Series in Software Engineering)
Secure Coding in C and C++ (SEI Series in Software Engineering)
Evaluating Liveness by Face Images and the Structure Tensor
AUTOID '05 Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies
Security and Privacy Issues in E-passports
SECURECOMM '05 Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks
Finding the original point set hidden among chaff
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Handbook of Multibiometrics (International Series on Biometrics)
Handbook of Multibiometrics (International Series on Biometrics)
High security Iris verification system based on random secret integration
Computer Vision and Image Understanding
Protecting Face Biometric Data on Smartcard with Reed-Solomon Code
CVPRW '06 Proceedings of the 2006 Conference on Computer Vision and Pattern Recognition Workshop
Securing Fingerprint Template: Fuzzy Vault with Helper Data
CVPRW '06 Proceedings of the 2006 Conference on Computer Vision and Pattern Recognition Workshop
Combining Crypto with Biometrics Effectively
IEEE Transactions on Computers
Robust, short and sensitive authentication tags using secure sketch
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme
ICPR '06 Proceedings of the 18th International Conference on Pattern Recognition - Volume 04
IEEE Transactions on Pattern Analysis and Machine Intelligence
Biometrics: Personal Identification in Networked Society
Biometrics: Personal Identification in Networked Society
Fuzzy extractors for continuous distributions
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
From Template to Image: Reconstructing Fingerprints from Minutiae Points
IEEE Transactions on Pattern Analysis and Machine Intelligence
Generating Cancelable Fingerprint Templates
IEEE Transactions on Pattern Analysis and Machine Intelligence
Fake iris detection by using purkinje image
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
Automatic alignment of fingerprint features for fuzzy fingerprint vault
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Practical biometric authentication with template protection
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Vulnerabilities in biometric encryption systems
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Secure remote authentication using biometric data
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Fingerprint-Based Fuzzy Vault: Implementation and Performance
IEEE Transactions on Information Forensics and Security
Biometrics: a tool for information security
IEEE Transactions on Information Forensics and Security
Fake finger detection by skin distortion analysis
IEEE Transactions on Information Forensics and Security
Protecting Biometric Templates With Sketch: Theory and Practice
IEEE Transactions on Information Forensics and Security - Part 2
Time-series detection of perspiration as a liveness test in fingerprint devices
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
A touch of money [biometric authentication systems]
IEEE Spectrum
Fingerprint Image Reconstruction from Standard Templates
IEEE Transactions on Pattern Analysis and Machine Intelligence
2^N discretisation of biophasor in cancellable biometrics
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
"3D Face": biometric template protection for 3d face recognition
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Robust extraction of secret bits from minutiae
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Fuzzy extractors for minutiae-based fingerprint authentication
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Biometric key binding: fuzzy vault based on iris images
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Hardening fingerprint Fuzzy vault using password
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Template Protection for On-Line Signature-Based Recognition Systems
Biometrics and Identity Management
Nineteen Urgent Research Topics in Biometrics and Identity Management
Biometrics and Identity Management
Binary Biometric Representation through Pairwise Polar Quantization
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Bipartite Biotokens: Definition, Implementation, and Analysis
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
An Information Theoretic Framework for Biometric Security Systems
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Efficient Biometric Verification in Encrypted Domain
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Security-Enhanced Fuzzy Fingerprint Vault Based on Minutiae's Local Ridge Information
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Robust Biometric Key Extraction Based on Iris Cryptosystem
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Protecting DCT Templates for a Face Verification System by Means of Pseudo-random Permutations
IWANN '09 Proceedings of the 10th International Work-Conference on Artificial Neural Networks: Part I: Bio-Inspired Systems: Computational and Ambient Intelligence
MinuCode: A Fixed-Value Representation of Fingerprint Minutiae for Biometric Cryptosystem
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
A channel coding approach for human authentication from gait sequences
IEEE Transactions on Information Forensics and Security
Biometric cryptosystem using function based on-line signature recognition
Expert Systems with Applications: An International Journal
Face Verification Based on DCT Templates with Pseudo-Random Permutations
Proceedings of the 2009 conference on Neural Nets WIRN09: Proceedings of the 19th Italian Workshop on Neural Nets, Vietri sul Mare, Salerno, Italy, May 28--30 2009
Expert Systems with Applications: An International Journal
Template protection for dynamic time warping based biometric signature authentication
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
Robust access based on speaker identification for optical communications security
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
Biometric systems: privacy and secrecy aspects
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Biometric template protection in multimodal authentication systems based on error correcting codes
Journal of Computer Security - EU-Funded ICT Research on Trust and Security
Pitfall of the detection rate optimized bit allocation within template protection and a remedy
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
Parameterized geometric alignment for minutiae-based fingerprint template protection
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
A performance driven methodology for cancelable face templates generation
Pattern Recognition
A hybrid biometric cryptosystem for securing fingerprint minutiae templates
Pattern Recognition Letters
A hybrid approach for generating secure and discriminating face template
IEEE Transactions on Information Forensics and Security
IEEE Transactions on Information Forensics and Security
Visual-based online signature verification using features extracted from video
Journal of Network and Computer Applications
An alignment-free fingerprint cryptosystem based on fuzzy vault scheme
Journal of Network and Computer Applications
Reusable set constructions using randomized dissolvent templates for biometric security
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Classification based revocable biometric identity code generation
BioID_MultiComm'09 Proceedings of the 2009 joint COST 2101 and 2102 international conference on Biometric ID management and multimodal communication
Improving identity prediction in signature-based unimodal systems using soft biometrics
BioID_MultiComm'09 Proceedings of the 2009 joint COST 2101 and 2102 international conference on Biometric ID management and multimodal communication
An inter-domain authentication scheme for pervasive computing environment
Computers & Mathematics with Applications
Cancelable templates for sequence-based biometrics with application to on-line signature recognition
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans - Special issue on recent advances in biometrics
Blind authentication: a secure crypto-biometric verification protocol
IEEE Transactions on Information Forensics and Security
A proposed digital rights management system for 3D graphics using biometric watermarks
CCNC'10 Proceedings of the 7th IEEE conference on Consumer communications and networking conference
Information Sciences: an International Journal
On design and optimization of face verification systems that are smart-card based
Machine Vision and Applications - Integrated Imaging and Vision Techniques for Industrial Inspection
Reverse-engineer methods on a biometric hash algorithm for dynamic handwriting
Proceedings of the 12th ACM workshop on Multimedia and security
Multi-factor biometrics for authentication: a false sense of security
Proceedings of the 12th ACM workshop on Multimedia and security
eSketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics
Proceedings of the 12th ACM workshop on Multimedia and security
Realtime training on mobile devices for face recognition applications
Pattern Recognition
Ensemble-based methods for cancellable biometrics
ICANN'10 Proceedings of the 20th international conference on Artificial neural networks: Part I
Journal of Network and Computer Applications
Template protection for security enhancement of a biometric face authentication system
Proceedings of the 2011 conference on Neural Nets WIRN10: Proceedings of the 20th Italian Workshop on Neural Nets
A key binding system based on n-nearest minutiae structure of fingerprint
Pattern Recognition Letters
Biometrics for non-repudiation: security and legal aspect
International Journal of Biometrics
GUC100 multisensor fingerprint database for in-house (semipublic) performance test
EURASIP Journal on Information Security
BioID'11 Proceedings of the COST 2101 European conference on Biometrics and ID management
Eigen-model projections for protected on-line signature recognition
BioID'11 Proceedings of the COST 2101 European conference on Biometrics and ID management
Pair-polar coordinate-based cancelable fingerprint templates
Pattern Recognition
An evaluation of indirect attacks and countermeasures in fingerprint verification systems
Pattern Recognition Letters
Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security
Journal of Network and Computer Applications
Watermarking as a means to enhance biometric systems: a critical survey
IH'11 Proceedings of the 13th international conference on Information hiding
CMS'11 Proceedings of the 12th IFIP TC 6/TC 11 international conference on Communications and multimedia security
Electronic Commerce Research and Applications
Selecting distinctive features to improve performances of multidimensional fuzzy vault scheme
CCBR'11 Proceedings of the 6th Chinese conference on Biometric recognition
A fuzzy vault scheme for feature fusion
CCBR'11 Proceedings of the 6th Chinese conference on Biometric recognition
Sparse reconstruction based watermarking for secure biometric authentication
CCBR'11 Proceedings of the 6th Chinese conference on Biometric recognition
Fingerprint template protection with minutiae-based bit-string for security and privacy preserving
Expert Systems with Applications: An International Journal
An effective biometric cryptosystem combining fingerprints with error correction codes
Expert Systems with Applications: An International Journal
A crypto-biometric scheme based on iris-templates with fuzzy extractors
Information Sciences: an International Journal
A quantitative analysis of indistinguishability for a continuous domain biometric cryptosystem
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Secure iris recognition based on local intensity variations
ICIAR'10 Proceedings of the 7th international conference on Image Analysis and Recognition - Volume Part II
Biometric Security from an Information-Theoretical Perspective
Foundations and Trends in Communications and Information Theory
A secure biometric discretization scheme for face template protection
Future Generation Computer Systems
Distinguishing users with capacitive touch communication
Proceedings of the 18th annual international conference on Mobile computing and networking
Spiral cube for biometric template protection
ICISP'12 Proceedings of the 5th international conference on Image and Signal Processing
Proceedings of the CUBE International Information Technology Conference
An investigation of ensemble systems applied to encrypted and cancellable biometric data
ICANN'12 Proceedings of the 22nd international conference on Artificial Neural Networks and Machine Learning - Volume Part II
Feature selection on handwriting biometrics: security aspects of artificial forgeries
CMS'12 Proceedings of the 13th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
On the realization of fuzzy identity-based identification scheme using fingerprint biometrics
Security and Communication Networks
A dissection of fingerprint fuzzy vault schemes
Proceedings of the 27th Conference on Image and Vision Computing New Zealand
Binary gabor statistical features for palmprint template protection
SSPR'12/SPR'12 Proceedings of the 2012 Joint IAPR international conference on Structural, Syntactic, and Statistical Pattern Recognition
Investigating fusion approaches in multi-biometric cancellable recognition
Expert Systems with Applications: An International Journal
Multiple factors based evaluation of fingerprint images quality
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
PalmHash Code vs. PalmPhasor Code
Neurocomputing
A taxonomy of biometric system vulnerabilities and defences
International Journal of Biometrics
Non-invertible and revocable iris templates using key-dependent wavelet transforms
Proceedings of the first ACM workshop on Information hiding and multimedia security
Enhanced multi-line code for minutiae-based fingerprint template protection
Pattern Recognition Letters
Cancelable fusion using social network analysis
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Analysis of unsupervised template update in biometric recognition systems
Pattern Recognition Letters
Two-factor face authentication using matrix permutation transformation and a user password
Information Sciences: an International Journal
Hi-index | 0.01 |
Biometric recognition offers a reliable solution to the problem of user authentication in identity management systems. With the widespread deployment of biometric systems in various applications, there are increasing concerns about the security and privacy of biometric technology. Public acceptance of biometrics technology will depend on the ability of system designers to demonstrate that these systems are robust, have low error rates, and are tamper proof. We present a high-level categorization of the various vulnerabilities of a biometric system and discuss countermeasures that have been proposed to address these vulnerabilities. In particular, we focus on biometric template security which is an important issue because, unlike passwords and tokens, compromised biometric templates cannot be revoked and reissued. Protecting the template is a challenging task due to intrauser variability in the acquired biometric traits. We present an overview of various biometric template protection schemes and discuss their advantages and limitations in terms of security, revocability, and impact on matching accuracy. A template protection scheme with provable security and acceptable recognition performance has thus far remained elusive. Development of such a scheme is crucial as biometric systems are beginning to proliferate into the core physical and information infrastructure of our society.