Fingerprint pattern classification
Pattern Recognition
A Real-Time Matching System for Large Fingerprint Databases
IEEE Transactions on Pattern Analysis and Machine Intelligence
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Password hardening based on keystroke dynamics
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Systematic Methods for the Computation of the Directional Fields and Singular Points of Fingerprints
IEEE Transactions on Pattern Analysis and Machine Intelligence
Biometric Hash based on Statistical Features of Online Signatures
ICPR '02 Proceedings of the 16 th International Conference on Pattern Recognition (ICPR'02) Volume 1 - Volume 1
Localization of corresponding points in fingerprints by complex filtering
Pattern Recognition Letters - Special issue: Audio- and video-based biometric person authentication (AVBPA 2001)
Cryptographic Key Generation from Voice
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Guide to Biometrics
Enhancing security and privacy in biometrics-based authentication systems
IBM Systems Journal - End-to-end security
Cancelable Biometric Filters for Face Recognition
ICPR '04 Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04) Volume 3 - Volume 03
PalmHashing: a novel approach for cancelable biometrics
Information Processing Letters
A secure biometric authentication scheme based on robust hashing
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Impact of Singular Point Detection on Fingerprint Matching Performance
AUTOID '05 Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies
Cancelable Biometrics: A Case Study in Fingerprints
ICPR '06 Proceedings of the 18th International Conference on Pattern Recognition - Volume 04
New shielding functions to enhance privacy and prevent misuse of biometric templates
AVBPA'03 Proceedings of the 4th international conference on Audio- and video-based biometric person authentication
Cancelable key-based fingerprint templates
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Practical biometric authentication with template protection
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Symmetric hash functions for secure fingerprint biometric systems
Pattern Recognition Letters
EURASIP Journal on Advances in Signal Processing
The best of both worlds: Applying secure sketches to cancelable biometrics
Science of Computer Programming
Template Protection for On-Line Signature-Based Recognition Systems
Biometrics and Identity Management
Efficient Biometric Verification in Encrypted Domain
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
A Biometric Key-Binding and Template Protection Framework Using Correlation Filters
ICB '09 Proceedings of the Third International Conference on Advances in Biometrics
Exploring an evolutionary medical analytic wallet
Proceedings of the 11th Annual Conference Companion on Genetic and Evolutionary Computation Conference: Late Breaking Papers
Protecting DCT Templates for a Face Verification System by Means of Pseudo-random Permutations
IWANN '09 Proceedings of the 10th International Work-Conference on Artificial Neural Networks: Part I: Bio-Inspired Systems: Computational and Ambient Intelligence
A Security Analysis of Biometric Template Protection Schemes
ICIAR '09 Proceedings of the 6th International Conference on Image Analysis and Recognition
Geometric-Aligned Cancelable Fingerprint Templates
ICIAP '09 Proceedings of the 15th International Conference on Image Analysis and Processing
Secure speech template protection in speaker verification system
Speech Communication
Biometric cryptosystem using function based on-line signature recognition
Expert Systems with Applications: An International Journal
Face Verification Based on DCT Templates with Pseudo-Random Permutations
Proceedings of the 2009 conference on Neural Nets WIRN09: Proceedings of the 19th Italian Workshop on Neural Nets, Vietri sul Mare, Salerno, Italy, May 28--30 2009
Secure Minutiae-Based Fingerprint Templates Using Random Triangle Hashing
IVIC '09 Proceedings of the 1st International Visual Informatics Conference on Visual Informatics: Bridging Research and Practice
Expert Systems with Applications: An International Journal
Template protection for dynamic time warping based biometric signature authentication
DSP'09 Proceedings of the 16th international conference on Digital Signal Processing
Biometric systems: privacy and secrecy aspects
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
Multi-biometrics based cryptographic key regeneration scheme
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
Parameterized geometric alignment for minutiae-based fingerprint template protection
BTAS'09 Proceedings of the 3rd IEEE international conference on Biometrics: Theory, applications and systems
A performance driven methodology for cancelable face templates generation
Pattern Recognition
An evaluation of direct attacks using fake fingers generated from ISO templates
Pattern Recognition Letters
A hybrid biometric cryptosystem for securing fingerprint minutiae templates
Pattern Recognition Letters
A hybrid approach for generating secure and discriminating face template
IEEE Transactions on Information Forensics and Security
Biometric recognition: overview and recent advances
CIARP'07 Proceedings of the Congress on pattern recognition 12th Iberoamerican conference on Progress in pattern recognition, image analysis and applications
Individual identification using personality traits
Journal of Network and Computer Applications
An alignment-free fingerprint cryptosystem based on fuzzy vault scheme
Journal of Network and Computer Applications
Cancelable fingerprint templates using minutiae-based bit-strings
Journal of Network and Computer Applications
Classification based revocable biometric identity code generation
BioID_MultiComm'09 Proceedings of the 2009 joint COST 2101 and 2102 international conference on Biometric ID management and multimodal communication
Cancelable templates for sequence-based biometrics with application to on-line signature recognition
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans - Special issue on recent advances in biometrics
Blind authentication: a secure crypto-biometric verification protocol
IEEE Transactions on Information Forensics and Security
Information Sciences: an International Journal
eSketch: a privacy-preserving fuzzy commitment scheme for authentication using encrypted biometrics
Proceedings of the 12th ACM workshop on Multimedia and security
An analysis of random projection for changeable and privacy-preserving biometric verification
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Ensemble-based methods for cancellable biometrics
ICANN'10 Proceedings of the 20th international conference on Artificial neural networks: Part I
A novel algorithm of fingerprint encryption using minutiae-based transformation
Pattern Recognition Letters
Contextual biometric-based authentication for ubiquitous services
UIC'10 Proceedings of the 7th international conference on Ubiquitous intelligence and computing
Eigen-model projections for protected on-line signature recognition
BioID'11 Proceedings of the COST 2101 European conference on Biometrics and ID management
IWCF'10 Proceedings of the 4th international conference on Computational forensics
Pair-polar coordinate-based cancelable fingerprint templates
Pattern Recognition
An evaluation of indirect attacks and countermeasures in fingerprint verification systems
Pattern Recognition Letters
Dual-key-binding cancelable palmprint cryptosystem for palmprint protection and information security
Journal of Network and Computer Applications
Multi-biometrics based crypto-biometric session key generation and sharing protocol
Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
Enhancing the privacy of electronic passports
International Journal of Information Technology and Management
Identities, forgeries and disguises
International Journal of Information Technology and Management
Fingerprint template protection with minutiae-based bit-string for security and privacy preserving
Expert Systems with Applications: An International Journal
An effective biometric cryptosystem combining fingerprints with error correction codes
Expert Systems with Applications: An International Journal
Privacy protection in high security biometrics applications
ICEB'10 Proceedings of the Third international conference on Ethics and Policy of Biometrics and International Data Sharing
Biometric Security from an Information-Theoretical Perspective
Foundations and Trends in Communications and Information Theory
Hardening fingerprint Fuzzy vault using password
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
Biometric authentication on a mobile device: a study of user effort, error and task disruption
Proceedings of the 28th Annual Computer Security Applications Conference
A taxonomy of biometric system vulnerabilities and defences
International Journal of Biometrics
Enhanced multi-line code for minutiae-based fingerprint template protection
Pattern Recognition Letters
Cancelable fusion using social network analysis
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Towards standardizing trusted evidence of identity
Proceedings of the 2013 ACM workshop on Digital identity management
Journal of Intelligent Manufacturing
Hi-index | 0.15 |
Biometrics-based authentication systems offer obvious usability advantages over traditional password and token-based authentication schemes. However, biometrics raises several privacy concerns. A biometric is permanently associated with a user and cannot be changed. Hence, if a biometric identifier is compromised, it is lost forever and possibly for every application where the biometric is used. Moreover, if the same biometric is used in multiple applications, a user can potentially be tracked from one application to the next by cross-matching biometric databases. In this paper, we demonstrate several methods to generate multiple cancelable identifiers from fingerprint images to overcome these problems. In essence, a user can be given as many biometric identifiers as needed by issuing a new transformation "key.” The identifiers can be cancelled and replaced when compromised. We empirically compare the performance of several algorithms such as Cartesian, polar, and surface folding transformations of the minutiae positions. It is demonstrated through multiple experiments that we can achieve revocability and prevent cross-matching of biometric databases. It is also shown that the transforms are noninvertible by demonstrating that it is computationally as hard to recover the original biometric identifier from a transformed version as by randomly guessing. Based on these empirical results and a theoretical analysis we conclude that feature-level cancelable biometric construction is practicable in large biometric deployments.