CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Handbook of Applied Cryptography
Handbook of Applied Cryptography
An Analysis of Minutiae Matching Strength
AVBPA '01 Proceedings of the Third International Conference on Audio- and Video-Based Biometric Person Authentication
Biometric Hash based on Statistical Features of Online Signatures
ICPR '02 Proceedings of the 16 th International Conference on Pattern Recognition (ICPR'02) Volume 1 - Volume 1
Biometric Recognition: Security and Privacy Concerns
IEEE Security and Privacy
Adaptive Blind Signal and Image Processing: Learning Algorithms and Applications
Adaptive Blind Signal and Image Processing: Learning Algorithms and Applications
IEEE Transactions on Pattern Analysis and Machine Intelligence
Enhancing security and privacy in biometrics-based authentication systems
IBM Systems Journal - End-to-end security
Cancelable Biometric Filters for Face Recognition
ICPR '04 Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04) Volume 3 - Volume 03
Recent Advancements in Automatic Signature Verification
IWFHR '04 Proceedings of the Ninth International Workshop on Frontiers in Handwriting Recognition
Designs, Codes and Cryptography
Handbook of Multibiometrics (International Series on Biometrics)
Handbook of Multibiometrics (International Series on Biometrics)
Identity authentication using improved online signature verification method
Pattern Recognition Letters
IEEE Transactions on Pattern Analysis and Machine Intelligence
Generating Cancelable Fingerprint Templates
IEEE Transactions on Pattern Analysis and Machine Intelligence
Biometrics from Brain Electrical Activity: A Machine Learning Approach
IEEE Transactions on Pattern Analysis and Machine Intelligence
Use of intelligent system techniques for storage and retrieval of biometrics data with application to personal identification
Handwriting: feature correlation analysis for biometric hashes
EURASIP Journal on Applied Signal Processing
HMM-based on-line signature verification: Feature extraction and signature modeling
Pattern Recognition Letters
EURASIP Journal on Advances in Signal Processing
Cancelable Voiceprint Templates Based on Knowledge Signatures
ISECS '08 Proceedings of the 2008 International Symposium on Electronic Commerce and Security
Cracking Cancelable Fingerprint Template of Ratha
ISCSCT '08 Proceedings of the 2008 International Symposium on Computer Science and Computational Technology - Volume 02
Digital Watermarking and Steganography
Digital Watermarking and Steganography
Combined handwriting and speech modalities for user authentication
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans - Special section: Best papers from the 2007 biometrics: Theory, applications, and systems (BTAS 07) conference
Model-based feature extraction for gait analysis and recognition
MIRAGE'07 Proceedings of the 3rd international conference on Computer vision/computer graphics collaboration techniques
Generation of replaceable cryptographic keys from dynamic handwritten signatures
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
Cancelable key-based fingerprint templates
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Fingerprint-Based Fuzzy Vault: Implementation and Performance
IEEE Transactions on Information Forensics and Security
Protecting Biometric Templates With Sketch: Theory and Practice
IEEE Transactions on Information Forensics and Security - Part 2
On Using the Viterbi Path Along With HMM Likelihood Information for Online Signature Verification
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Multimodal decision-level fusion for person authentication
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
A Novel Hybrid Model Framework to Blind Color Image Deconvolution
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Fingerprint Image Reconstruction from Standard Templates
IEEE Transactions on Pattern Analysis and Machine Intelligence
An introduction to biometric recognition
IEEE Transactions on Circuits and Systems for Video Technology
A new forgery scenario based on regaining dynamics of signature
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
An approach for on-line signature authentication using Zernike moments
Pattern Recognition Letters
Eigen-model projections for protected on-line signature recognition
BioID'11 Proceedings of the COST 2101 European conference on Biometrics and ID management
Pair-polar coordinate-based cancelable fingerprint templates
Pattern Recognition
A bio-cryptographic system based on offline signature images
Information Sciences: an International Journal
Hi-index | 0.01 |
Recent years have seen the rapid spread of biometric technologies for automatic people recognition. However, security and privacy issues still represent the main obstacles for the deployment of biometric-based authentication systems. In this paper, we propose an approach, which we refer to as BioConvolving, that is able to guarantee security and renewability to biometric templates. Specifically, we introduce a set of noninvertible transformations, which can be applied to any biometrics whose template can be represented by a set of sequences, in order to generate multiple transformed versions of the template. Once the transformation is performed, retrieving the original data from the transformed template is computationally as hard as random guessing. As a proof of concept, the proposed approach is applied to an on-line signature recognition system, where a hidden Markov model-based matching strategy is employed. The performance of a protected on-line signature recognition system employing the proposed BioConvolving approach is evaluated, both in terms of authentication rates and renewability capacity, using the MCYT signature database. The reported extensive set of experiments shows that protected and renewable biometric templates can be properly generated and used for recognition, at the expense of a slight degradation in authentication performance.