CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Geometric Hashing: An Overview
IEEE Computational Science & Engineering
Handbook of Fingerprint Recognition
Handbook of Fingerprint Recognition
Biometric Recognition: Security and Privacy Concerns
IEEE Security and Privacy
Secure smartcardbased fingerprint authentication
WBMA '03 Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications
Automatic alignment of fingerprint features for fuzzy fingerprint vault
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
VLSI architecture of the fuzzy fingerprint vault system
ANNPR'10 Proceedings of the 4th IAPR TC3 conference on Artificial Neural Networks in Pattern Recognition
Biometric-Based non-transferable anonymous credentials
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Fuzzy vault for multiple users
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
A dissection of fingerprint fuzzy vault schemes
Proceedings of the 27th Conference on Image and Vision Computing New Zealand
Hi-index | 0.00 |
Biometrics-based user authentication has several advantages over traditional password-based systems for standalone authentication applications such as home networks. This is also true for new authentication architectures known as crypto-biometricsystems, where cryptography and biometrics are merged to achieve high security and user convenience at the same time. Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems. In this paper, we propose an approach to provide both the automatic alignment of fingerprint data and higher security by using a 3D geometric hash table. Based on the experimental results, we confirm that the proposed approach of using the 3D geometric hash table with the idea of the fuzzy vaultcan perform the fingerprint verification securely even with one thousand chaff data included.