On-Line Fingerprint Verification
IEEE Transactions on Pattern Analysis and Machine Intelligence
Communications of the ACM
Secure smartcardbased fingerprint authentication
WBMA '03 Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications
Reusable cryptographic fuzzy extractors
Proceedings of the 11th ACM conference on Computer and communications security
Securing Fingerprint Template: Fuzzy Vault with Helper Data
CVPRW '06 Proceedings of the 2006 Conference on Computer Vision and Pattern Recognition Workshop
Analysis and Problems on Fuzzy Vault Scheme
IIH-MSP '06 Proceedings of the 2006 International Conference on Intelligent Information Hiding and Multimedia
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
SIAM Journal on Computing
A Multiple-Control Fuzzy Vault
PST '08 Proceedings of the 2008 Sixth Annual Conference on Privacy, Security and Trust
Minutiae and modified Biocode fusion for fingerprint-based key generation
Journal of Network and Computer Applications
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Fingerprint-Based Fuzzy Vault: Implementation and Performance
IEEE Transactions on Information Forensics and Security
A new algorithm for distorted fingerprints matching based on normalized fuzzy similarity measure
IEEE Transactions on Image Processing
Hardening fingerprint Fuzzy vault using password
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Hi-index | 0.00 |
A new multi-biometric-based secret sharing algorithm is presented to relieve the message deadlock problem of the single biometric instance-based fuzzy vault method. A multi-vault structure is constructed for all participants to equally share the key. During the enrolment procedure, sub-keys are generated from the key by applying secret sharing scheme and each of them is bound with a minutia set by a modified fuzzy vault method. At the authentication stage, the key can be reconstructed when the necessary minutia sets come together. The experimental results on FVC2002 DB2 show that the proposed scheme decreases the deadlock rate without increasing the false acceptance rate significantly.