On-Line Fingerprint Verification
IEEE Transactions on Pattern Analysis and Machine Intelligence
IEEE Transactions on Pattern Analysis and Machine Intelligence
Fingerprint Indexing Based on Novel Features of Minutiae Triplets
IEEE Transactions on Pattern Analysis and Machine Intelligence
Information fusion in biometrics
Pattern Recognition Letters - Special issue: Audio- and video-based biometric person authentication (AVBPA 2001)
Online Palmprint Identification
IEEE Transactions on Pattern Analysis and Machine Intelligence
Lip print recognition for security systems by multi-resolution architecture
Future Generation Computer Systems - Special issue: Modeling and simulation in supercomputing and telecommunications
PalmHashing: a novel approach for cancelable biometrics
Information Processing Letters
Biometrics: Personal Identification in Networked Society
Biometrics: Personal Identification in Networked Society
Journal of Cognitive Neuroscience
Pattern Recognition
Cancellable biometerics featuring with tokenised random number
Pattern Recognition Letters
An introduction to biometric recognition
IEEE Transactions on Circuits and Systems for Video Technology
An improved BioHashing for human authentication
Pattern Recognition
Three measures for secure palmprint identification
Pattern Recognition
Random subspace for an improved BioHashing for face authentication
Pattern Recognition Letters
Cancellable biometrics and annotations on BioHash
Pattern Recognition
Pattern Recognition Letters
Local binary patterns for a hybrid fingerprint matcher
Pattern Recognition
A survey of palmprint recognition
Pattern Recognition
Efficient Biometric Verification in Encrypted Domain
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Development of a new cryptographic construct using palmprint-based fuzzy vault
EURASIP Journal on Advances in Signal Processing - Special issue on recent advances in biometric systems: a signal processing perspective
Biometrics-based identifiers for digital identity management
Proceedings of the 9th Symposium on Identity and Trust on the Internet
Minutiae and modified Biocode fusion for fingerprint-based key generation
Journal of Network and Computer Applications
Cancelable fingerprint templates using minutiae-based bit-strings
Journal of Network and Computer Applications
Blind authentication: a secure crypto-biometric verification protocol
IEEE Transactions on Information Forensics and Security
Information Sciences: an International Journal
Multi-factor biometrics for authentication: a false sense of security
Proceedings of the 12th ACM workshop on Multimedia and security
Privacy preserving facial and fingerprint multi-biometric authentication
IWDW'10 Proceedings of the 9th international conference on Digital watermarking
Pair-polar coordinate-based cancelable fingerprint templates
Pattern Recognition
Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security
Journal of Network and Computer Applications
A Comparative Study of Palmprint Recognition Algorithms
ACM Computing Surveys (CSUR)
Fuzzy cyclic random mapping for face recognition based on MD-RiuLBP feature
CCBR'11 Proceedings of the 6th Chinese conference on Biometric recognition
From features extraction to strong security in mobile environment: a new hybrid system
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
ICIAR'10 Proceedings of the 7th international conference on Image Analysis and Recognition - Volume Part II
PalmHash Code vs. PalmPhasor Code
Neurocomputing
POSTER: Secure authentication from facial attributeswith no privacy loss
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Two-factor face authentication using matrix permutation transformation and a user password
Information Sciences: an International Journal
Hi-index | 0.01 |
As a result of the growing demand for accurate and reliable personal authentication, biometric recognition, a substitute for or complement to existing authentication technologies, has attracted considerable attention. It has recently been reported that, along with its variants, BioHashing, a new technique that combines biometric features and a tokenized (pseudo-) random number (TRN), has achieved perfect accuracy, having zero equal error rates (EER) for faces, fingerprints and palmprints. There are, however, anomalies in this approach. These are identified in this paper, in which we systematically analyze the details of the approach and conclude that the claim of having achieved a zero EER is based upon an impractical hidden assumption. We simulate the claimants' experiments and find that it is not possible to achieve their reported performance without the hidden assumption and that, indeed, the results are worse than when using the biometric alone.