Inside risks: the uses and abuses of biometrics
Communications of the ACM
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
FVC2000: Fingerprint Verification Competition
IEEE Transactions on Pattern Analysis and Machine Intelligence
Systematic Methods for the Computation of the Directional Fields and Singular Points of Fingerprints
IEEE Transactions on Pattern Analysis and Machine Intelligence
Handbook of Fingerprint Recognition
Handbook of Fingerprint Recognition
New shielding functions to enhance privacy and prevent misuse of biometric templates
AVBPA'03 Proceedings of the 4th international conference on Audio- and video-based biometric person authentication
Filterbank-based fingerprint matching
IEEE Transactions on Image Processing
Likelihood-ratio-based biometric verification
IEEE Transactions on Circuits and Systems for Video Technology
Fuzzy extractors for continuous distributions
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Generating Cancelable Fingerprint Templates
IEEE Transactions on Pattern Analysis and Machine Intelligence
Symmetric hash functions for secure fingerprint biometric systems
Pattern Recognition Letters
Cancellable biometrics and annotations on BioHash
Pattern Recognition
EURASIP Journal on Advances in Signal Processing
The best of both worlds: Applying secure sketches to cancelable biometrics
Science of Computer Programming
Embedding Renewable Cryptographic Keys into Continuous Noisy Data
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication
IWSEC '08 Proceedings of the 3rd International Workshop on Security: Advances in Information and Computer Security
Threshold-optimized decision-level fusion and its application to biometrics
Pattern Recognition
Secure pairing with biometrics
International Journal of Security and Networks
Binary Biometric Representation through Pairwise Polar Quantization
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Robust Biometric Key Extraction Based on Iris Cryptosystem
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Privacy-Preserving Face Recognition
PETS '09 Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
Geometric-Aligned Cancelable Fingerprint Templates
ICIAP '09 Proceedings of the 15th International Conference on Image Analysis and Processing
Fingerprint verification using spectral minutiae representations
IEEE Transactions on Information Forensics and Security
Biometric quantization through detection rate optimized bit allocation
EURASIP Journal on Advances in Signal Processing
Online signature verification using Fourier descriptors
EURASIP Journal on Advances in Signal Processing - Special issue on recent advances in biometric systems: a signal processing perspective
Multi-algorithm fusion with template protection
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
Pitfall of the detection rate optimized bit allocation within template protection and a remedy
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
Parameterized geometric alignment for minutiae-based fingerprint template protection
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
Spectral minutiae representations of fingerprints enhanced by quality data
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
Extended private information retrieval and its application in biometrics authentications
CANS'07 Proceedings of the 6th international conference on Cryptology and network security
A formal study of the privacy concerns in biometric-based remote authentication schemes
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
An authentication protocol with encrypted biometric data
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
Extending match-on-card to local biometric identification
BioID_MultiComm'09 Proceedings of the 2009 joint COST 2101 and 2102 international conference on Biometric ID management and multimodal communication
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans - Special issue on recent advances in biometrics
Binary spectral minutiae representation with multi-sample fusion for fingerprint recognition
Proceedings of the 12th ACM workshop on Multimedia and security
Secure sketch for multiple secrets
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Eigen-model projections for protected on-line signature recognition
BioID'11 Proceedings of the COST 2101 European conference on Biometrics and ID management
IWCF'10 Proceedings of the 4th international conference on Computational forensics
Electronic Commerce Research and Applications
Non-user-specific multivariate biometric discretization with medoid-based segmentation
CCBR'11 Proceedings of the 6th Chinese conference on Biometric recognition
Secure sketch for biometric templates
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
Multistage face recognition using adaptive feature selection and classification
ACIVS'05 Proceedings of the 7th international conference on Advanced Concepts for Intelligent Vision Systems
A quantitative analysis of indistinguishability for a continuous domain biometric cryptosystem
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Biometric Security from an Information-Theoretical Perspective
Foundations and Trends in Communications and Information Theory
A secure biometric discretization scheme for face template protection
Future Generation Computer Systems
"3D Face": biometric template protection for 3d face recognition
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Fuzzy extractors for minutiae-based fingerprint authentication
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Biometric cryptosystem based on discretized fingerprint texture descriptors
Expert Systems with Applications: An International Journal
Secure outsourced computation of iris matching
Journal of Computer Security
Hi-index | 0.00 |
In this paper we show the feasibility of template protecting biometric authentication systems. In particular, we apply template protection schemes to fingerprint data. Therefore we first make a fixed length representation of the fingerprint data by applying Gabor filtering. Next we introduce the reliable components scheme. In order to make a binary representation of the fingerprint images we extract and then quantize during the enrollment phase the reliable components with the highest signal to noise ratio. Finally, error correction coding is applied to the binary representation. It is shown that the scheme achieves an EER of approximately 4.2% with secret length of 40 bits in experiments.