Signature recognition through spectral analysis
Pattern Recognition
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
On-Line and Off-Line Handwriting Recognition: A Comprehensive Survey
IEEE Transactions on Pattern Analysis and Machine Intelligence
Toward Speech-Generated Cryptographic Keys on Resource-Constrained Devices
Proceedings of the 11th USENIX Security Symposium
Biometric Hash based on Statistical Features of Online Signatures
ICPR '02 Proceedings of the 16 th International Conference on Pattern Recognition (ICPR'02) Volume 1 - Volume 1
Cryptographic Key Generation from Voice
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Online signature verification using a new extreme points warping technique
Pattern Recognition Letters
Secure smartcardbased fingerprint authentication
WBMA '03 Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications
Reusable cryptographic fuzzy extractors
Proceedings of the 11th ACM conference on Computer and communications security
EURASIP Journal on Applied Signal Processing
Cancellable biometrics and annotations on BioHash
Pattern Recognition
Biometric cryptosystem using function based on-line signature recognition
Expert Systems with Applications: An International Journal
Expert Systems with Applications: An International Journal
Template protection for dynamic time warping based biometric signature authentication
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
Cancelable templates for sequence-based biometrics with application to on-line signature recognition
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans - Special issue on recent advances in biometrics
Non-user-specific multivariate biometric discretization with medoid-based segmentation
CCBR'11 Proceedings of the 6th Chinese conference on Biometric recognition
A bio-cryptographic system based on offline signature images
Information Sciences: an International Journal
Hi-index | 0.00 |
In this paper, we present a method for generating cryptographic keys that can be replaced if the keys are compromised and without requiring a template signature to be stored. The replaceability of keys is accomplished using iterative inner product of Goh-Ngo [1] Biohash method, which has the effect of re-projecting the biometric into another subspace defined by user token. We also utilized a modified Chang et al [2] Multi-state Discretization (MSD) method to translate the inner products into binary bit-strings. Our experiments indicate encouraging result especially for skilled and random forgery whereby the equal error rates are