On-Line Fingerprint Verification
IEEE Transactions on Pattern Analysis and Machine Intelligence
The Trimmed Iterative Closest Point Algorithm
ICPR '02 Proceedings of the 16 th International Conference on Pattern Recognition (ICPR'02) Volume 3 - Volume 3
FVC2002: Second Fingerprint Verification Competition
ICPR '02 Proceedings of the 16 th International Conference on Pattern Recognition (ICPR'02) Volume 3 - Volume 3
Cryptographic Key Generation from Voice
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Cancelable Biometric Filters for Face Recognition
ICPR '04 Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04) Volume 3 - Volume 03
Combining Crypto with Biometrics Effectively
IEEE Transactions on Computers
IEEE Transactions on Pattern Analysis and Machine Intelligence
Generating Cancelable Fingerprint Templates
IEEE Transactions on Pattern Analysis and Machine Intelligence
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Protecting Biometric Templates With Sketch: Theory and Practice
IEEE Transactions on Information Forensics and Security - Part 2
EURASIP Journal on Advances in Signal Processing
Bipartite Biotokens: Definition, Implementation, and Analysis
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Security-Enhanced Fuzzy Fingerprint Vault Based on Minutiae's Local Ridge Information
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Biometric systems: privacy and secrecy aspects
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Biometric recognition: overview and recent advances
CIARP'07 Proceedings of the Congress on pattern recognition 12th Iberoamerican conference on Progress in pattern recognition, image analysis and applications
Secure sketch for multiple secrets
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Fighting coercion attacks in key generation using skin conductance
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Multi fuzzy vault based on secret sharing for deadlock restoration
International Journal of Information Technology and Management
Biometric Security from an Information-Theoretical Perspective
Foundations and Trends in Communications and Information Theory
Fuzzy vault for multiple users
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
A dissection of fingerprint fuzzy vault schemes
Proceedings of the 27th Conference on Image and Vision Computing New Zealand
A bio-cryptographic system based on offline signature images
Information Sciences: an International Journal
Hi-index | 0.00 |
Security of stored templates is a critical issue in biometric systems because biometric templates are non-revocable. Fuzzy vault is a cryptographic framework that enables secure template storage by binding the template with a uniformly random key. Though the fuzzy vault framework has proven security properties, it does not provide privacy-enhancing features such as revocability and protection against cross-matching across different biometric systems. Furthermore, non-uniform nature of biometric data can decrease the vault security. To overcome these limitations, we propose a scheme for hardening a fingerprint minutiae-based fuzzy vault using password. Benefits of the proposed password-based hardening technique include template revocability, prevention of cross-matching, enhanced vault security and a reduction in the False Accept Rate of the system without significantly affecting the False Reject Rate. Since the hardening scheme utilizes password only as an additional authentication factor (independent of the key used in the vault), the security provided by the fuzzy vault framework is not affected even when the password is compromised.