On-Line Fingerprint Verification
IEEE Transactions on Pattern Analysis and Machine Intelligence
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Password hardening based on keystroke dynamics
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices
Proceedings of the 11th USENIX Security Symposium
A Robust Fingerprint Matching Algorithm Using Local Alignment
ICPR '02 Proceedings of the 16 th International Conference on Pattern Recognition (ICPR'02) Volume 3 - Volume 3
Cryptographic Key Generation from Voice
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Secure smartcardbased fingerprint authentication
WBMA '03 Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications
Cancelable Biometric Filters for Face Recognition
ICPR '04 Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04) Volume 3 - Volume 03
Combining Crypto with Biometrics Effectively
IEEE Transactions on Computers
Cancelable Biometrics: A Case Study in Fingerprints
ICPR '06 Proceedings of the 18th International Conference on Pattern Recognition - Volume 04
Generating Cancelable Fingerprint Templates
IEEE Transactions on Pattern Analysis and Machine Intelligence
A fast and elastic fingerprint matching algorithm using minutiae-centered circular regions
SECUREWARE '07 Proceedings of the The International Conference on Emerging Security Information, Systems, and Technologies
Key Management Using Biometrics
ISDPE '07 Proceedings of the The First International Symposium on Data, Privacy, and E-Commerce
A minutia-based partial fingerprint recognition system
Pattern Recognition
Cancelable key-based fingerprint templates
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Biometrics: a tool for information security
IEEE Transactions on Information Forensics and Security
Journal of Intelligent Manufacturing
Hi-index | 0.10 |
This paper presents a novel algorithm of fingerprint encryption which transforms fingerprint minutiae and performs matching in the transformed form. If an encrypted template is compromised, it can be cancelled by choosing just another transformed template. In our algorithm, a circular region is constructed around each minutia and non-invertible transformation is applied to all regions but only transformed regions are stored in the database. The proposed algorithm improves the accuracy of verification compared to related fuzzy vault systems. Experimental results show the comparative performance of matching using both transformed and original data. We find that transformed matching also has an impressive accuracy and speed.