CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Fingerprint Minutiae: A Constructive Definition
ECCV '02 Proceedings of the International ECCV 2002 Workshop Copenhagen on Biometric Authentication
Handbook of Fingerprint Recognition
Handbook of Fingerprint Recognition
Biometric Hash based on Statistical Features of Online Signatures
ICPR '02 Proceedings of the 16 th International Conference on Pattern Recognition (ICPR'02) Volume 1 - Volume 1
Secure smartcardbased fingerprint authentication
WBMA '03 Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications
Enhancing security and privacy in biometrics-based authentication systems
IBM Systems Journal - End-to-end security
IEEE Transactions on Pattern Analysis and Machine Intelligence
Generating Cancelable Fingerprint Templates
IEEE Transactions on Pattern Analysis and Machine Intelligence
Cancellable biometrics and annotations on BioHash
Pattern Recognition
The best of both worlds: Applying secure sketches to cancelable biometrics
Science of Computer Programming
Secure speech template protection in speaker verification system
Speech Communication
Template protection for dynamic time warping based biometric signature authentication
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
Biometric systems: privacy and secrecy aspects
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
A secure digital camera based fingerprint verification system
Journal of Visual Communication and Image Representation
Privacy-enhancing fingerprint authentication using cancelable templates with passwords
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
A hybrid approach for generating secure and discriminating face template
IEEE Transactions on Information Forensics and Security
Cancelable fingerprint templates using minutiae-based bit-strings
Journal of Network and Computer Applications
Cancelable templates for sequence-based biometrics with application to on-line signature recognition
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans - Special issue on recent advances in biometrics
eSketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics
Proceedings of the 12th ACM workshop on Multimedia and security
A novel algorithm of fingerprint encryption using minutiae-based transformation
Pattern Recognition Letters
Pair-polar coordinate-based cancelable fingerprint templates
Pattern Recognition
Fingerprint template protection with minutiae-based bit-string for security and privacy preserving
Expert Systems with Applications: An International Journal
Biometric Security from an Information-Theoretical Perspective
Foundations and Trends in Communications and Information Theory
Enhanced multi-line code for minutiae-based fingerprint template protection
Pattern Recognition Letters
Hi-index | 0.00 |
Biometric based authentication can provide strong security guarantee about the identity of users. Security of biometric data is particularly important as compromise of the data will be permanent. Cancelable biometrics store a non–invertible transformed version of the biometric data and so if the storage is compromised the biometric data remains safe. Cancelable biometrics also provide a higher level of privacy by allowing many templates for the same biometric data and hence non-linkability of user’s data stored in different databases. We define how to measure the success of a particular transformation and matching algorithm for fingerprints. We consider a key–dependent geometric transform that is applied to the features extracted from a fingerprint, to generate a key–dependent cancelable template for the fingerprint. We investigate performance of an authentication system that uses this cancelable fingerprint when a fingerprint matching algorithm is used for detection. We evaluate performance of the system and show the challenges of achieving good performance if the matching algorithm is not modified.