CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
A computational introduction to number theory and algebra
A computational introduction to number theory and algebra
Securing Fingerprint Template: Fuzzy Vault with Helper Data
CVPRW '06 Proceedings of the 2006 Conference on Computer Vision and Pattern Recognition Workshop
New shielding functions to enhance privacy and prevent misuse of biometric templates
AVBPA'03 Proceedings of the 4th international conference on Audio- and video-based biometric person authentication
Practical biometric authentication with template protection
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
EURASIP Journal on Advances in Signal Processing
Parameterized geometric alignment for minutiae-based fingerprint template protection
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
A hybrid approach for generating secure and discriminating face template
IEEE Transactions on Information Forensics and Security
Cancelable fingerprint templates using minutiae-based bit-strings
Journal of Network and Computer Applications
Reusable set constructions using randomized dissolvent templates for biometric security
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Pair-polar coordinate-based cancelable fingerprint templates
Pattern Recognition
A crypto-biometric scheme based on iris-templates with fuzzy extractors
Information Sciences: an International Journal
Biometric-Based non-transferable anonymous credentials
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Biometric cryptosystem based on discretized fingerprint texture descriptors
Expert Systems with Applications: An International Journal
Hi-index | 0.00 |
We propose an authentication scheme using fingerprint biometrics, protected by a construct called a Fuzzy Extractor. We look at a new way of quantizing and digitally representing the minutiae measurements so that a construct called PinSketch can be applied to the minutiae. This is converted to a Fuzzy Extractor by tying some random information to the minutiae measurements. We run a matching algorithm at chosen quantization parameters and show that the authentication accuracy is within acceptable limits. We demonstrate that our authentication system succeeds in protecting the users' identity.