Induction of one-level decision trees
ML92 Proceedings of the ninth international workshop on Machine learning
On-Line Fingerprint Verification
IEEE Transactions on Pattern Analysis and Machine Intelligence
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Dissimilarity representations allow for building good classifiers
Pattern Recognition Letters
Biometric Hash based on Statistical Features of Online Signatures
ICPR '02 Proceedings of the 16 th International Conference on Pattern Recognition (ICPR'02) Volume 1 - Volume 1
Use of distance measures in handwriting analysis
Use of distance measures in handwriting analysis
International Journal of Computer Vision - Special Issue on Content-Based Image Retrieval
Secure smartcardbased fingerprint authentication
WBMA '03 Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications
Enhancing security and privacy in biometrics-based authentication systems
IBM Systems Journal - End-to-end security
Secure biometric systems
On the Applicability of Off-Line Signatures to the Fuzzy Vault Construction
ICDAR '07 Proceedings of the Ninth International Conference on Document Analysis and Recognition - Volume 02
Evaluating Biometric Encryption Key Generation Using Handwritten Signatures
BLISS '08 Proceedings of the 2008 Bio-inspired, Learning and Intelligent Systems for Security
Fuzzy Vault for 3D Face Recognition Systems
IIH-MSP '08 Proceedings of the 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing
IEEE Transactions on Pattern Analysis and Machine Intelligence
Development of a new cryptographic construct using palmprint-based fuzzy vault
EURASIP Journal on Advances in Signal Processing - Special issue on recent advances in biometric systems: a signal processing perspective
Fuzzy face vault: how to implement fuzzy vault with weighted features
UAHCI'07 Proceedings of the 4th international conference on Universal access in human computer interaction: coping with diversity
Cancelable templates for sequence-based biometrics with application to on-line signature recognition
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans - Special issue on recent advances in biometrics
Generation of replaceable cryptographic keys from dynamic handwritten signatures
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
ICIAR'10 Proceedings of the 7th international conference on Image Analysis and Recognition - Volume Part II
Fingerprint-Based Fuzzy Vault: Implementation and Performance
IEEE Transactions on Information Forensics and Security
Biometrics: a tool for information security
IEEE Transactions on Information Forensics and Security
Automatic Signature Verification: The State of the Art
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
A New Method for Generating an Invariant Iris Private Key Based on the Fuzzy Vault System
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Multibiometric Cryptosystems Based on Feature-Level Fusion
IEEE Transactions on Information Forensics and Security - Part 2
Hardening fingerprint Fuzzy vault using password
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Hi-index | 0.07 |
In bio-cryptography, biometric traits are replacing traditional passwords for secure exchange of cryptographic keys. The Fuzzy Vault (FV) scheme has been successfully employed to design bio-cryptographic systems as it can absorb a wide range of variation in biometric traits. Despite the intensity of research on FV based on physiological traits like fingerprints, iris, and face, there is no conclusive research on behavioral traits such as offline handwritten signature images, that have high inter-personal similarity and intra-personal variability. In this paper, a FV system based on the offline signature images is proposed. A two-step boosting feature selection (BFS) technique is proposed for selecting a compact and discriminant user-specific feature representation from a large number of feature extractions. The first step seeks dimensionality reduction through learning a population-based representation, that discriminates between different users in the population. The second step filters this representation to produce a compact user-based representation that discriminates the specific user from the population. This last representation is used to generate the FV locking/unlocking points. Representation variability is modeled by employing the BFS in a dissimilarity representation space, and it is considered for matching the unlocking and locking points during FV decoding. Proof of concept simulations involving 72,000 signature matchings (corresponding to both genuine and forged query signatures from the Brazilian Signature Database) have shown FV recognition accuracy of about 97% and system entropy of about 45-bits.