Secure smartcardbased fingerprint authentication
WBMA '03 Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications
Finding the original point set hidden among chaff
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Securing Fingerprint Template: Fuzzy Vault with Helper Data
CVPRW '06 Proceedings of the 2006 Conference on Computer Vision and Pattern Recognition Workshop
Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme
ICPR '06 Proceedings of the 18th International Conference on Pattern Recognition - Volume 04
EURASIP Journal on Advances in Signal Processing
Memory-Efficient Fuzzy Fingerprint Vault based on the Geometric Hashing
ISA '08 Proceedings of the 2008 International Conference on Information Security and Assurance (isa 2008)
Protecting Secret Keys with Fuzzy Fingerprint Vault Based on a 3D Geometric Hash Table
ICANNGA '07 Proceedings of the 8th international conference on Adaptive and Natural Computing Algorithms, Part II
Security-Enhanced Fuzzy Fingerprint Vault Based on Minutiae's Local Ridge Information
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
A hybrid biometric cryptosystem for securing fingerprint minutiae templates
Pattern Recognition Letters
An alignment-free fingerprint cryptosystem based on fuzzy vault scheme
Journal of Network and Computer Applications
Fingerprint template protection using fuzzy vault
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
Automatic alignment of fingerprint features for fuzzy fingerprint vault
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Fingerprint-Based Fuzzy Vault: Implementation and Performance
IEEE Transactions on Information Forensics and Security
Hardening fingerprint Fuzzy vault using password
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Hi-index | 0.00 |
The fuzzy vault construction is one of the most widely adopted approaches for the protection of fingerprint data. The popularity of this scheme stems from its ability to deal with unordered sets of fingerprint features, as well as its tolerance to missing or spurious feature elements across multiple acquisitions of the same fingerprint. While a considerable number of fingerprint-based fuzzy vault implementations have been reported in the literature, a review of these schemes does not yet exist, to the best of the authors' knowledge. This paper, therefore, dissects existing fingerprint fuzzy vault schemes and provides a comprehensive discussion of what fingerprint features have been used, and how the locking and unlocking processes have been adapted to suit the nature of the fingerprint features employed.