Introduction to numerical analysis: 2nd edition
Introduction to numerical analysis: 2nd edition
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Password hardening based on keystroke dynamics
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Fitting algebraic curves to noisy data
STOC '02 Proceedings of the thiry-fourth annual ACM symposium on Theory of computing
Icsa Guide to Cryptography
On the Individuality of Fingerprints
IEEE Transactions on Pattern Analysis and Machine Intelligence
Enhancing SESAMEV4 with Smart Cards
CARDIS '98 Proceedings of the The International Conference on Smart Card Research and Applications
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Improved Decoding of Reed-Solomon and Algebraic-Geometric Codes
FOCS '98 Proceedings of the 39th Annual Symposium on Foundations of Computer Science
Design principles for tamper-resistant smartcard processors
WOST'99 Proceedings of the USENIX Workshop on Smartcard Technology on USENIX Workshop on Smartcard Technology
SSH: secure login connections over the internet
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Noisy polynomial interpolation and noisy chinese remaindering
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Microcoded coprocessor for embedded secure biometric authentication systems
CODES+ISSS '05 Proceedings of the 3rd IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis
Finding the original point set hidden among chaff
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Combining Crypto with Biometrics Effectively
IEEE Transactions on Computers
Robust, short and sensitive authentication tags using secure sketch
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
IEEE Transactions on Pattern Analysis and Machine Intelligence
EURASIP Journal on Applied Signal Processing
Symmetric hash functions for secure fingerprint biometric systems
Pattern Recognition Letters
Cancellable biometrics and annotations on BioHash
Pattern Recognition
EURASIP Journal on Advances in Signal Processing
Protecting Secret Keys with Fuzzy Fingerprint Vault Based on a 3D Geometric Hash Table
ICANNGA '07 Proceedings of the 8th international conference on Adaptive and Natural Computing Algorithms, Part II
Network Security Using Biometric and Cryptography
ACIVS '08 Proceedings of the 10th International Conference on Advanced Concepts for Intelligent Vision Systems
Privacy-Preserving Similarity Evaluation and Application to Remote Biometrics Authentication
MDAI '08 Sabadell Proceedings of the 5th International Conference on Modeling Decisions for Artificial Intelligence
KES '07 Knowledge-Based Intelligent Information and Engineering Systems and the XVII Italian Workshop on Neural Networks on Proceedings of the 11th International Conference
Simulation and experimental studies on fuzzy vault fingerprint cryptography
International Journal of Knowledge-based and Intelligent Engineering Systems
An agent-oriented mobile payment system secured using a biometrics approach
International Journal of Agent-Oriented Software Engineering
Security-Enhanced Fuzzy Fingerprint Vault Based on Minutiae's Local Ridge Information
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Robust Biometric Key Extraction Based on Iris Cryptosystem
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
K-Medoids-Based Random Biometric Pattern for Cryptographic Key Generation
CIARP '09 Proceedings of the 14th Iberoamerican Conference on Pattern Recognition: Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications
Secure Minutiae-Based Fingerprint Templates Using Random Triangle Hashing
IVIC '09 Proceedings of the 1st International Visual Informatics Conference on Visual Informatics: Bridging Research and Practice
SPPRA '08 Proceedings of the Fifth IASTED International Conference on Signal Processing, Pattern Recognition and Applications
Development of a new cryptographic construct using palmprint-based fuzzy vault
EURASIP Journal on Advances in Signal Processing - Special issue on recent advances in biometric systems: a signal processing perspective
Sorted index numbers for privacy preserving face recognition
EURASIP Journal on Advances in Signal Processing - Special issue on recent advances in biometric systems: a signal processing perspective
Biometrics-based identifiers for digital identity management
Proceedings of the 9th Symposium on Identity and Trust on the Internet
A secure digital camera based fingerprint verification system
Journal of Visual Communication and Image Representation
An evaluation of direct attacks using fake fingers generated from ISO templates
Pattern Recognition Letters
Privacy-enhancing fingerprint authentication using cancelable templates with passwords
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Fuzzy face vault: how to implement fuzzy vault with weighted features
UAHCI'07 Proceedings of the 4th international conference on Universal access in human computer interaction: coping with diversity
Fingerprint hardening with randomly selected chaff minutiae
CAIP'07 Proceedings of the 12th international conference on Computer analysis of images and patterns
A hybrid approach for generating secure and discriminating face template
IEEE Transactions on Information Forensics and Security
An alignment-free fingerprint cryptosystem based on fuzzy vault scheme
Journal of Network and Computer Applications
Minutiae and modified Biocode fusion for fingerprint-based key generation
Journal of Network and Computer Applications
Cancelable fingerprint templates using minutiae-based bit-strings
Journal of Network and Computer Applications
Fingerprint template protection using fuzzy vault
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
Hardware implementation of the fuzzy fingerprint vault system
ISPRA'10 Proceedings of the 9th WSEAS international conference on Signal processing, robotics and automation
Biometric mobile template protection: a composite feature based fingerprint fuzzy vault
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
A novel algorithm of fingerprint encryption using minutiae-based transformation
Pattern Recognition Letters
Secure sketch for multiple secrets
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Privacy preserving facial and fingerprint multi-biometric authentication
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
Increasing error tolerance in biometric systems
Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia
Problems of Information Transmission
Multi fuzzy vault based on secret sharing for deadlock restoration
International Journal of Information Technology and Management
Symmetric hash functions for fingerprint minutiae
ICAPR'05 Proceedings of the Third international conference on Pattern Recognition and Image Analysis - Volume Part II
Generation of replaceable cryptographic keys from dynamic handwritten signatures
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
A novel hybrid crypto-biometric authentication scheme for ATM based banking applications
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
Secure biometric authentication for weak computational devices
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Cancelable key-based fingerprint templates
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Cryptographic keys generation using fingercodes
IBERAMIA-SBIA'06 Proceedings of the 2nd international joint conference, and Proceedings of the 10th Ibero-American Conference on AI 18th Brazilian conference on Advances in Artificial Intelligence
Automatic alignment of fingerprint features for fuzzy fingerprint vault
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Development of a neural net-based, personalized secure communication link
ICANN'06 Proceedings of the 16th international conference on Artificial Neural Networks - Volume Part I
VLSI architecture of the fuzzy fingerprint vault system
ANNPR'10 Proceedings of the 4th IAPR TC3 conference on Artificial Neural Networks in Pattern Recognition
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Vulnerabilities in biometric encryption systems
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Hiding secret points amidst chaff
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Biometric-Based non-transferable anonymous credentials
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
Biometric fuzzy extractors made practical: a proposal based on fingercodes
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Robust extraction of secret bits from minutiae
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Biometric key binding: fuzzy vault based on iris images
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm
Future Generation Computer Systems
Security performance evaluation for biometric template protection techniques
International Journal of Biometrics
Biometric cryptosystem based on discretized fingerprint texture descriptors
Expert Systems with Applications: An International Journal
A dissection of fingerprint fuzzy vault schemes
Proceedings of the 27th Conference on Image and Vision Computing New Zealand
A taxonomy of biometric system vulnerabilities and defences
International Journal of Biometrics
A bio-cryptographic system based on offline signature images
Information Sciences: an International Journal
A practical implementation of fuzzy fingerprint vault for smart cards
Journal of Intelligent Manufacturing
Hi-index | 0.00 |
In this paper, the fundamental insecurities hampering a scalable, wide-spread deployment of biometric authentication are examined, and a cryptosystem capable of using fingerprint data as its key is presented. For our application, we focus on situations where a private key stored on a smartcard is used for authentication in a networked environment, and we assume an attacker can launch o -line attacks against a stolen card.Juels and Sudan's fuzzy vault is used as a starting point for building and analyzing a secure authentication scheme using fingerprints and smartcards called a figerprint vault. Fingerprint minutiae coordinates mi are encoded as elements in a nite eld F and the secret key is encoded in a polynomial f(x) over F[x]. The polynomial is evaluated at the minutiae locations, and the pairs (mi, f(mi)) are stored along with random (ci, di) cha points such that di ≠ f(ci). Given a matching fingerprint, a valid user can seperate out enough true points from the cha points to reconstruct f(x), and hence the original secret key.The parameters of the vault are selected such that the attacker's vault unlocking complexity is maximized, subject to zero unlocking complexity with a matching fingerprint and a reasonable amount of error. For a feature location measurement variance of 9 pixels, the optimal vault is 269 times more difficult to unlock for an attacker compared to a user posessing a matching fingerprint, along with approximately a 30% chance of unlocking failure.