An alignment-free fingerprint cryptosystem based on fuzzy vault scheme
Journal of Network and Computer Applications
Minutiae and modified Biocode fusion for fingerprint-based key generation
Journal of Network and Computer Applications
Extending match-on-card to local biometric identification
BioID_MultiComm'09 Proceedings of the 2009 joint COST 2101 and 2102 international conference on Biometric ID management and multimodal communication
Negative databases for biometric data
Proceedings of the 12th ACM workshop on Multimedia and security
Binary spectral minutiae representation with multi-sample fusion for fingerprint recognition
Proceedings of the 12th ACM workshop on Multimedia and security
Increasing error tolerance in biometric systems
Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia
On the commonality of iris biometrics
Proceedings of the 9th International Conference on Advances in Mobile Computing and Multimedia
An effective biometric cryptosystem combining fingerprints with error correction codes
Expert Systems with Applications: An International Journal
Privacy preserving key generation for iris biometrics
CMS'10 Proceedings of the 11th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Iris-Biometric fuzzy commitment schemes under signal degradation
ICISP'12 Proceedings of the 5th international conference on Image and Signal Processing
Hi-index | 0.00 |
Fuzzy commitment schemes, introduced as a link between biometrics and cryptography, are a way to handle biometric data matching as an error-correction issue. We focus here on finding the best error-correcting code with respect to a given database of biometric data. We propose a method that models discrepancies between biometric measurements as an erasure and error channel, and we estimate its capacity. We then show that two-dimensional iterative min-sum decoding of properly chosen product codes almost reaches the capacity of this channel. This leads to practical fuzzy commitment schemes that are close to theoretical limits. We test our techniques on public iris and fingerprint databases and validate our findings.