CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Biometrics, Personal Identification in Networked Society: Personal Identification in Networked Society
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Secure smartcardbased fingerprint authentication
WBMA '03 Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications
New shielding functions to enhance privacy and prevent misuse of biometric templates
AVBPA'03 Proceedings of the 4th international conference on Audio- and video-based biometric person authentication
Fuzzy extractors for continuous distributions
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Generating Cancelable Fingerprint Templates
IEEE Transactions on Pattern Analysis and Machine Intelligence
Symmetric hash functions for secure fingerprint biometric systems
Pattern Recognition Letters
Simulation and experimental studies on fuzzy vault fingerprint cryptography
International Journal of Knowledge-based and Intelligent Engineering Systems
A New Approach for Biometric Template Storage and Remote Authentication
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
A Biometric Key-Binding and Template Protection Framework Using Correlation Filters
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Security-Enhanced Fuzzy Fingerprint Vault Based on Minutiae's Local Ridge Information
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Robust Biometric Key Extraction Based on Iris Cryptosystem
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Computer Standards & Interfaces
Secure Minutiae-Based Fingerprint Templates Using Random Triangle Hashing
IVIC '09 Proceedings of the 1st International Visual Informatics Conference on Visual Informatics: Bridging Research and Practice
Multibiometric cryptosystem: model structure and performance analysis
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Development of a new cryptographic construct using palmprint-based fuzzy vault
EURASIP Journal on Advances in Signal Processing - Special issue on recent advances in biometric systems: a signal processing perspective
Sorted index numbers for privacy preserving face recognition
EURASIP Journal on Advances in Signal Processing - Special issue on recent advances in biometric systems: a signal processing perspective
Biometric authentication using augmented face and random projection
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
Mobile user location-specific encryption (MULE): using your office as your password
Proceedings of the third ACM conference on Wireless network security
Privacy-enhancing fingerprint authentication using cancelable templates with passwords
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
A hybrid approach for generating secure and discriminating face template
IEEE Transactions on Information Forensics and Security
Robust iris verification for key management
Pattern Recognition Letters
An alignment-free fingerprint cryptosystem based on fuzzy vault scheme
Journal of Network and Computer Applications
Cancelable fingerprint templates using minutiae-based bit-strings
Journal of Network and Computer Applications
Fingerprint template protection using fuzzy vault
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
Hardware implementation of the fuzzy fingerprint vault system
ISPRA'10 Proceedings of the 9th WSEAS international conference on Signal processing, robotics and automation
Biometric mobile template protection: a composite feature based fingerprint fuzzy vault
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
PSKA: usable and secure key agreement scheme for body area networks
IEEE Transactions on Information Technology in Biomedicine
Fingerprint image processing and minutiae extraction for fuzzy vault
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
A novel algorithm of fingerprint encryption using minutiae-based transformation
Pattern Recognition Letters
Privacy preserving facial and fingerprint multi-biometric authentication
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
An evaluation of indirect attacks and countermeasures in fingerprint verification systems
Pattern Recognition Letters
Fingerprint image processing and fuzzy vault implementation
Journal of Mobile Multimedia
Multi fuzzy vault based on secret sharing for deadlock restoration
International Journal of Information Technology and Management
Biometric cryptosystem using online signatures
ISCIS'06 Proceedings of the 21st international conference on Computer and Information Sciences
Automatic alignment of fingerprint features for fuzzy fingerprint vault
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
VLSI architecture of the fuzzy fingerprint vault system
ANNPR'10 Proceedings of the 4th IAPR TC3 conference on Artificial Neural Networks in Pattern Recognition
Fingerprint template protection with minutiae-based bit-string for security and privacy preserving
Expert Systems with Applications: An International Journal
Biometric-Based non-transferable anonymous credentials
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Usable protection to healthcare application
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
Fuzzy vault for multiple users
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
Biometric key binding: fuzzy vault based on iris images
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Hardening fingerprint Fuzzy vault using password
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Biometric hashing based on genetic selection and its application to on-line signatures
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm
Future Generation Computer Systems
Security performance evaluation for biometric template protection techniques
International Journal of Biometrics
Biometric cryptosystem based on discretized fingerprint texture descriptors
Expert Systems with Applications: An International Journal
A dissection of fingerprint fuzzy vault schemes
Proceedings of the 27th Conference on Image and Vision Computing New Zealand
A key sharing fuzzy vault scheme
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
Continuous Remote Mobile Identity Management Using Biometric Integrated Touch-Display
MICROW '12 Proceedings of the 2012 45th Annual IEEE/ACM International Symposium on Microarchitecture Workshops
A practical implementation of fuzzy fingerprint vault for smart cards
Journal of Intelligent Manufacturing
Two-factor face authentication using matrix permutation transformation and a user password
Information Sciences: an International Journal
Hi-index | 0.00 |
Biometrics-based user authentication has several advantages over traditional password-based systems for standalone authentication applications, such as secure cellular phone access. This is also true for new authentication architectures known as crypto-biometric systems, where cryptography and biometrics are merged to achieve high security and user convenience at the same time. In this paper, we explore the realization of a previously proposed cryptographic construct, called fuzzy vault, with the fingerprint minutiae data. This construct aims to secure critical data (e.g., secret encryption key) with the fingerprint data in a way that only the authorized user can access the secret by providing the valid fingerprint. The results show that 128-bit AES keys can be secured with fingerprint minutiae data using the proposed system.