CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Password hardening based on keystroke dynamics
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Cryptographic Key Generation from Voice
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Secure smartcardbased fingerprint authentication
WBMA '03 Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications
Enhancing security and privacy in biometrics-based authentication systems
IBM Systems Journal - End-to-end security
Cancelable Biometric Filters for Face Recognition
ICPR '04 Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04) Volume 3 - Volume 03
Robust Distance Measures for Face-Recognition Supporting Revocable Biometric Tokens.
FGR '06 Proceedings of the 7th International Conference on Automatic Face and Gesture Recognition
Protecting Face Biometric Data on Smartcard with Reed-Solomon Code
CVPRW '06 Proceedings of the 2006 Conference on Computer Vision and Pattern Recognition Workshop
Securing Fingerprint Template: Fuzzy Vault with Helper Data
CVPRW '06 Proceedings of the 2006 Conference on Computer Vision and Pattern Recognition Workshop
Combining Crypto with Biometrics Effectively
IEEE Transactions on Computers
Fingerprint Minutiae Matching Based on Coordinate System Bank and Global Optimum Alignment
ICPR '06 Proceedings of the 18th International Conference on Pattern Recognition - Volume 04
A Non-Iterative Approach to Reconstruct Face Templates from Match Scores
ICPR '06 Proceedings of the 18th International Conference on Pattern Recognition - Volume 04
IEEE Transactions on Pattern Analysis and Machine Intelligence
An analysis of BioHashing and its variants
Pattern Recognition
From Template to Image: Reconstructing Fingerprints from Minutiae Points
IEEE Transactions on Pattern Analysis and Machine Intelligence
Generating Cancelable Fingerprint Templates
IEEE Transactions on Pattern Analysis and Machine Intelligence
Random subspace for an improved BioHashing for face authentication
Pattern Recognition Letters
Local binary patterns for a hybrid fingerprint matcher
Pattern Recognition
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
SIAM Journal on Computing
Simulation and experimental studies on fuzzy vault fingerprint cryptography
International Journal of Knowledge-based and Intelligent Engineering Systems
Descriptors for image-based fingerprint matchers
Expert Systems with Applications: An International Journal
New shielding functions to enhance privacy and prevent misuse of biometric templates
AVBPA'03 Proceedings of the 4th international conference on Audio- and video-based biometric person authentication
Symmetric hash functions for fingerprint minutiae
ICAPR'05 Proceedings of the Third international conference on Pattern Recognition and Image Analysis - Volume Part II
Cancelable key-based fingerprint templates
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Automatic alignment of fingerprint features for fuzzy fingerprint vault
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Fingerprint matching using minutiae coordinate systems
IbPRIA'05 Proceedings of the Second Iberian conference on Pattern Recognition and Image Analysis - Volume Part II
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Alignment-Free Cancelable Fingerprint Templates Based on Local Minutiae Information
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
A New Method for Generating an Invariant Iris Private Key Based on the Fuzzy Vault System
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Fingerprint Image Reconstruction from Standard Templates
IEEE Transactions on Pattern Analysis and Machine Intelligence
Robust extraction of secret bits from minutiae
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Fuzzy extractors for minutiae-based fingerprint authentication
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Ensemble-based methods for cancellable biometrics
ICANN'10 Proceedings of the 20th international conference on Artificial neural networks: Part I
Pair-polar coordinate-based cancelable fingerprint templates
Pattern Recognition
Fingerprint template protection with minutiae-based bit-string for security and privacy preserving
Expert Systems with Applications: An International Journal
On the realization of fuzzy identity-based identification scheme using fingerprint biometrics
Security and Communication Networks
Enhanced multi-line code for minutiae-based fingerprint template protection
Pattern Recognition Letters
Hi-index | 0.00 |
It has become critical to protect biometric templates in the current biometric community. One way for doing this is using a cancelable biometric method, which transforms original biometric templates in a non-invertible way and uses those transformed templates to verify a person's identity. In this paper, we propose a new method to generate cancelable bit-strings (templates) from fingerprint minutiae. Our method is to provide a simple mean to generate cancelable templates without requiring for pre-alignment of fingerprints. The main idea is to map the minutiae into a predefined 3 dimensional array which consist of small cells and find out which cells include minutiae. To do this, we choose one of minutiae as a reference minutia and other minutiae are translated and rotated in order to map the minutiae into the cells based on the position and orientation of the reference minutia. After mapping, we set the cells in the 3D array to 1 if they include more than one minutia otherwise the cells are set to 0. A 1D bit-string is generated by sequentially visiting the cells in the 3D array. The order of the 1D bit-string is permuted according to the type of reference minutiae and user's PIN so that we can regenerate new templates when we need them. Finally, cancelable bit-strings are generated by changing the reference minutia into another minutia in turn. In the experiments, we evaluate our method using the FVC2004 database and show that the performance is better than that of a previous method.