Eigenfaces vs. Fisherfaces: Recognition Using Class Specific Linear Projection
IEEE Transactions on Pattern Analysis and Machine Intelligence
Inside risks: the uses and abuses of biometrics
Communications of the ACM
Password hardening based on keystroke dynamics
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
High Confidence Visual Recognition of Persons by a Test of Statistical Independence
IEEE Transactions on Pattern Analysis and Machine Intelligence
Enhancing security and privacy in biometrics-based authentication systems
IBM Systems Journal - End-to-end security
Cancelable Biometrics with Perfect Secrecy for Correlation-Based Matching
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Personal authentication using multiple palmprint representation
Pattern Recognition
Biometrics-based identifiers for digital identity management
Proceedings of the 9th Symposium on Identity and Trust on the Internet
Palmprint identification using pairwise relative angle and EMD
VISUAL'07 Proceedings of the 9th international conference on Advances in visual information systems
Blind authentication: a secure crypto-biometric verification protocol
IEEE Transactions on Information Forensics and Security
Information Sciences: an International Journal
Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security
Journal of Network and Computer Applications
A Comparative Study of Palmprint Recognition Algorithms
ACM Computing Surveys (CSUR)
Revealing the secret of facehashing
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
An analysis on accuracy of cancelable biometrics based on biohashing
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part III
PalmHash Code vs. PalmPhasor Code
Neurocomputing
International Journal of Innovation in the Digital Economy
Hi-index | 0.89 |
We propose a novel cancelable biometric approach, known as PalmHashing, to solve the non-revocable biometric issue. The proposed method hashes palmprint templates with a set of pseudo-random keys to obtain a unique code called palmhash. The palmhash code can be stored in portable devices such tokens and smartcards for verification. Multiple sets of palmhash codes can be maintained in multiple applications. Thus the privacy and security of the applications can be greatly enhanced. When compromised, revocation can also be achieved via direct replacement of a new set of palmhash code. In addition, PalmHashing offers several advantages over contemporary biometric approaches such as clear separation of the genuine-imposter populations and zero EER occurrences. In this paper, we outline the implementation details of this method and also highlight its potentials in security-critical applications.