A Real-Time Matching System for Large Fingerprint Databases
IEEE Transactions on Pattern Analysis and Machine Intelligence
Inside risks: the uses and abuses of biometrics
Communications of the ACM
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Password hardening based on keystroke dynamics
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Geometric Hashing: An Overview
IEEE Computational Science & Engineering
Handbook of Fingerprint Recognition
Handbook of Fingerprint Recognition
Biometric Recognition: Security and Privacy Concerns
IEEE Security and Privacy
Secure smartcardbased fingerprint authentication
WBMA '03 Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
SIAM Journal on Computing
New shielding functions to enhance privacy and prevent misuse of biometric templates
AVBPA'03 Proceedings of the 4th international conference on Audio- and video-based biometric person authentication
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
IEEE Transactions on Pattern Analysis and Machine Intelligence
EURASIP Journal on Advances in Signal Processing
Protecting Secret Keys with Fuzzy Fingerprint Vault Based on a 3D Geometric Hash Table
ICANNGA '07 Proceedings of the 8th international conference on Adaptive and Natural Computing Algorithms, Part II
KES '07 Knowledge-Based Intelligent Information and Engineering Systems and the XVII Italian Workshop on Neural Networks on Proceedings of the 11th International Conference
Simulation and experimental studies on fuzzy vault fingerprint cryptography
International Journal of Knowledge-based and Intelligent Engineering Systems
Secure Minutiae-Based Fingerprint Templates Using Random Triangle Hashing
IVIC '09 Proceedings of the 1st International Visual Informatics Conference on Visual Informatics: Bridging Research and Practice
Biometrics-based identifiers for digital identity management
Proceedings of the 9th Symposium on Identity and Trust on the Internet
Privacy-enhancing fingerprint authentication using cancelable templates with passwords
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Impact of embedding scenarios on the smart card-based fingerprint verification
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Minutiae and modified Biocode fusion for fingerprint-based key generation
Journal of Network and Computer Applications
Cancelable fingerprint templates using minutiae-based bit-strings
Journal of Network and Computer Applications
Hardware implementation of the fuzzy fingerprint vault system
ISPRA'10 Proceedings of the 9th WSEAS international conference on Signal processing, robotics and automation
Privacy preserving facial and fingerprint multi-biometric authentication
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
VLSI architecture of the fuzzy fingerprint vault system
ANNPR'10 Proceedings of the 4th IAPR TC3 conference on Artificial Neural Networks in Pattern Recognition
Fuzzy vault for multiple users
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
A dissection of fingerprint fuzzy vault schemes
Proceedings of the 27th Conference on Image and Vision Computing New Zealand
A practical implementation of fuzzy fingerprint vault for smart cards
Journal of Intelligent Manufacturing
Hi-index | 0.00 |
Biometrics-based user authentication has several advantages over traditional password-based systems for standalone authentication applications. This is also true for new authentication architectures known as crypto-biometric systems, where cryptography and biometrics are merged to achieve high security and user convenience at the same time. Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems. This construct aims to secure critical data(e.g., secret encryption key) with the fingerprint data in a way that only the authorized user can access the secret by providing the valid fingerprint, and some implementations results for fingerprint have been reported. However, all the previous results assumed that fingerprint features were pre-aligned, and automatic alignment in the fuzzy vault domain is a challenging issue. In this paper, we perform the automatic alignment of fingerprint features by using the geometric hashing technique which has been used for model-based object recognition applications. Based on the preliminary experimental results, we confirm that the proposed approach can align fingerprint features automatically in the domain of the fuzzy vault and can be integrated with any fuzzy fingerprint vault systems.