CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
SESAM: A Biometric Person Identification System Using Sensor Fusion
AVBPA '97 Proceedings of the First International Conference on Audio- and Video-Based Biometric Person Authentication
Information fusion in biometrics
Pattern Recognition Letters - Special issue: Audio- and video-based biometric person authentication (AVBPA 2001)
Reusable cryptographic fuzzy extractors
Proceedings of the 11th ACM conference on Computer and communications security
Designs, Codes and Cryptography
Combining Crypto with Biometrics Effectively
IEEE Transactions on Computers
Cancelable Biometrics: A Case Study in Fingerprints
ICPR '06 Proceedings of the 18th International Conference on Pattern Recognition - Volume 04
From Template to Image: Reconstructing Fingerprints from Minutiae Points
IEEE Transactions on Pattern Analysis and Machine Intelligence
Multibiometric systems: fusion strategies and template security
Multibiometric systems: fusion strategies and template security
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Biometric authentication system using reduced joint feature vector of iris and face
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
A principled approach to score level fusion in multimodal biometric systems
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Fingerprint-Based Fuzzy Vault: Implementation and Performance
IEEE Transactions on Information Forensics and Security
Biometrics: a tool for information security
IEEE Transactions on Information Forensics and Security
Spoof Attacks on Gait Authentication System
IEEE Transactions on Information Forensics and Security - Part 2
An adaptive multimodal biometric management algorithm
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Combination of hyperbolic functions for multimodal biometrics data fusion
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Entropy Analysis and New Constructions of Biometric Key Generation Systems
IEEE Transactions on Information Theory
Fingerprint Image Reconstruction from Standard Templates
IEEE Transactions on Pattern Analysis and Machine Intelligence
An effective biometric cryptosystem combining fingerprints with error correction codes
Expert Systems with Applications: An International Journal
Investigating fusion approaches in multi-biometric cancellable recognition
Expert Systems with Applications: An International Journal
Hi-index | 0.00 |
Single biometric cryptosystems were developed to obtain win-win scenarios for security and privacy. They are seriously threatened by spoof attacks, in which a forged biometric copy or artificially recreated biometric data of a legitimate user may be used to spoof a system. Meanwhile, feature alignment and quantization greatly degrade the accuracy of single biometric cryptosystems. In this paper, by trying to bind multiple biometrics to cryptography, a cryptosystem named multibiometric cryptosystem (MBC), is demonstrated from the theoretical point of view. First, an MBC with two fusion levels: fusion at the biometric level, and fusion at the cryptographic level, is formally defined. Then four models, namely biometric fusion model, MN-split model, nonsplit model, and package model, adopted at those two levels for fusion are presented. Shannon entropy analysis shows that even if the biometric ciphertexts and some biometric traits are disclosed, the new constructions still can achieve consistently data security and biometric privacy. In addition, the achievable accuracy is analyzed in terms of false acceptance rate/false rejection rate at each model. Finally, a comparison on the relative advantages and disadvantages of the proposed models is discussed.