134 Hits in 12.1 sec

Security and Accuracy of Fingerprint-Based Biometrics: A Review

Wencheng Yang, Song Wang, Jiankun Hu, Guanglou Zheng, Craig Valli
2019 Symmetry  
In this paper, a comprehensive review is presented to shed light on the latest developments in the study of fingerprint-based biometrics covering these two aspects with a view to improving system security  ...  Based on a thorough analysis and discussion, limitations of existing research work are outlined and suggestions for future work are provided.  ...  [47] presented a secure fingerprint matching approach, named P-MCC-PUFs, which contains two factors based on P-MCC and PUFs (Physically Unclonable Functions).  ... 
doi:10.3390/sym11020141 fatcat:dbhglykcqnbr3hp6tupq6ssdqu

Ranking-Based Locality Sensitive Hashing-Enabled Cancelable Biometrics: Index-of-Max Hashing

Zhe Jin, Jung Yeon Hwang, Yen-Lung Lai, Soohyung Kim, Andrew Beng Jin Teoh
2018 IEEE Transactions on Information Forensics and Security  
In this paper, we propose a ranking based locality sensitive hashing inspired two-factor cancelable biometrics, dubbed "Index-of-Max" (IoM) hashing for biometric template protection.  ...  We demonstrate two realizations from IoM hashing notion, namely Gaussian Random Projection based and Uniformly Random Permutation based hashing schemes.  ...  A two-factor protection scheme on P-MCC, namely 2P-MCC [13] is hence put forward to make the P-MCC be cancellable.  ... 
doi:10.1109/tifs.2017.2753172 fatcat:tf73zfpkhjct5pewzzyxo33lva

Generating protected fingerprint template utilizing coprime mapping transformation [article]

Rudresh Dwivedi, Somnath Dey
2018 arXiv   pre-print
In this paper, a coprime transformation scheme has been proposed to derive a protected fingerprint template.  ...  Then, ridge features for all neighboring minutiae points are computed and mapped onto co-prime positions of a random matrix to generate the cancelable template.  ...  [19] presented two-factor protected Minutiae Cylinder-Code (2P-MCC) where partial permutation is performed using a secret key over the cylinders in P-MCC. Recently, Rathgeb et al.  ... 
arXiv:1805.10108v1 fatcat:3cr4ggs2fjafhi5bbly3h7noym

Random Hash Code Generation for Cancelable Fingerprint Templates using Vector Permutation and Shift-order Process [article]

Sani M. Abdullahi, Sun Shuifa
2021 arXiv   pre-print
Cancelable biometric techniques have been used to prevent the compromise of biometric data by generating and using their corresponding cancelable templates for user authentication.  ...  In this paper, we propose a non-invertible distance preserving scheme based on vector permutation and shift-order process.  ...  MCC is a prominent fingerprint recognition technique based on minutiae template.  ... 
arXiv:2105.10227v1 fatcat:yuiiawclffgmjolzmn3fohtbhq

Biometrics and Privacy-preservation: How Do They Evolve

Quang Tran, Benjamin Turnbull, Jiankun Hu
2021 IEEE Open Journal of the Computer Society  
This paper contributes to the understanding of the field from following perspectives: (1) It proposes a novel and comprehensive taxonomy of privacy-preserving biometrics for the classification of the knowledge  ...  Such system-level knowledge organization will help produce excellent self-contained contents of reference materials for researchers in both the biometrics community and cryptography community who would  ...  The authors of MCC proposed P-MCC [51] as a template protection scheme in which a KL projection [52] is applied on the MCC vector. However, this projection is not revocable.  ... 
doi:10.1109/ojcs.2021.3068385 fatcat:rjm3fob7rvdddhlkpwbxjblrxq

Fingerprint shell: Secure representation of fingerprint template

Chouaib Moujahdi, George Bebis, Sanaa Ghouzali, Mohammed Rziza
2014 Pattern Recognition Letters  
In this paper, we present a new approach for fingerprint template protection.  ...  Fingerprint is a popular biometric modality which is used extensively in several applications for person authentication, providing high uniqueness and acceptable performance.  ...  Acknowledgment The first author is a fulbright visiting scholar, to University of Nevada-Reno, of the Moroccan-American Commission for Educational and Cultural Exchange.  ... 
doi:10.1016/j.patrec.2014.04.001 fatcat:ddleelqb3bclnejpvk52horn5a

Biometric Template Protection: Bridging the performance gap between theory and practice

Karthik Nandakumar, Anil K. Jain
2015 IEEE Signal Processing Magazine  
Numerous techniques have been proposed for biometric template protection over the last 20 years.  ...  Design of invariant biometric representations remains a fundamental problem, despite recent attempts to address this issue through feature adaptation schemes.  ...  Fig. 4 . 4 There are two broad approaches for biometric template protection: (a) feature transformation and (b) biometric cryptosystem.  ... 
doi:10.1109/msp.2015.2427849 fatcat:5st7zg5xzbhm7nfr45x2mw6nym

Biometrics Based Privacy-Preserving Authentication and Mobile Template Protection

Wencheng Yang, Jiankun Hu, Song Wang, Qianhong Wu
2018 Wireless Communications and Mobile Computing  
However, the negative effect of nonlinear distortion will usually degrade the matching performance significantly, which is a nontrivial factor when designing a cancelable template.  ...  Cancelable biometrics is a promising mechanism to provide authentication to mobile devices and protect biometric templates by applying a noninvertible transformation to raw biometric data.  ...  To address this issue, cancelable fingerprint templates [3] , among other biometric template protection schemes, have been proposed.  ... 
doi:10.1155/2018/7107295 fatcat:2pj5qjywsndtjompcsqrvfutye

Biometric Template Security

Anil K Jain, Karthik Nandakumar, Abhishek Nagar
2008 EURASIP Journal on Advances in Signal Processing  
Biometric Template Security By Abhishek Nagar With the proliferation of biometric recognition systems, an attacker's benefit in staging a system compromise is also increasing and thus is the need to ensure  ...  This dissertation provides a thorough analysis of the vulnera-  ...  [142] proposed two template transformation schemes for iris images.  ... 
doi:10.1155/2008/579416 fatcat:rrogtu2eh5d3dpyftnwm5dd2m4

Biometric template security

Abhishek Nagar
2009 SPIE Newsroom  
Biometric Template Security By Abhishek Nagar With the proliferation of biometric recognition systems, an attacker's benefit in staging a system compromise is also increasing and thus is the need to ensure  ...  This dissertation provides a thorough analysis of the vulnera-  ...  [142] proposed two template transformation schemes for iris images.  ... 
doi:10.1117/2.1200911.001590 fatcat:3uykbccxwnfcpcodymfook557y

Lightweight Biometric System for Internet of Things (IoT) Security

Mrs. S. Subhasini
2019 International Journal for Research in Applied Science and Engineering Technology  
In this article, we have proposed a lightweight biometric system for protected user authentication, which is particularly designed for resource limited IoT devices.  ...  As for future work, more efforts will be place into finding stable feature representations and manipulative secure template security algorithms in the mobile environment.  ...  mobile device ready with a fingerprint sensor.  ... 
doi:10.22214/ijraset.2019.4306 fatcat:c2m37hbghrbhtosndutgeqy46q

A survey on fingerprint minutiae-based local matching for verification and identification: Taxonomy and experimental evaluation

Daniel Peralta, Mikel Galar, Isaac Triguero, Daniel Paternain, Salvador García, Edurne Barrenechea, José M. Benítez, Humberto Bustince, Francisco Herrera
2015 Information Sciences  
Fingerprint recognition has found a reliable application for verification or identification of people in biometrics.  ...  This paper is devoted to review and categorize the vast number of fingerprint matching methods proposed in the specialized literature.  ...  After alignment, a matching score for the two fingerprints is calculated.  ... 
doi:10.1016/j.ins.2015.04.013 fatcat:4fq4tswnajdo5dnwv5433mipq4

Biometrics for Internet-of-Things Security: A Review

Wencheng Yang, Song Wang, Nor Masri Sahri, Nickson M. Karie, Mohiuddin Ahmed, Craig Valli
2021 Sensors  
The purpose of this review is to provide a comprehensive survey on the current biometrics research in IoT security, especially focusing on two important aspects, authentication and encryption.  ...  With an insight into the state-of-the-art research in biometrics for IoT security, this review paper helps advance the study in the field and assists researchers in gaining a good understanding of forward-looking  ...  [90] protected the cryptographic key stored in the unmanned IoT device with a novel two-factor fuzzy commitment.  ... 
doi:10.3390/s21186163 pmid:34577370 fatcat:urk3rlktjbahvdc5evaanqjn3y

On the Security Risk of Cancelable Biometrics [article]

Xingbo Dong and Zhe Jin and Andrew Beng Jin Teoh and Massimo Tistarelli and KokSheik Wong
2020 arXiv   pre-print
Over the years, a number of biometric template protection schemes, primarily based on the notion of "cancelable biometrics" (CB) have been proposed.  ...  The results examined on face, iris, and fingerprint revealed that the risks origin from the matching score computed from the distance/similarity of two cancelable templates jeopardize the security of cancelable  ...  Two-factor Protected Minutia Cylinder-Code (2PMCC) [14] is a template protection scheme based on Protected Minutia Cylinder-Code (PMCC) [19] and the Minutia Cylinder-Code (MCC) [20] for fingerprints  ... 
arXiv:1910.07770v3 fatcat:3f4fyxlrwffmnpz6eghhjdzdae

Fixed-length Bit-string Representation of Fingerprint by Normalized Local Structures [article]

Jun Beom Kho, Andrew B. J. Teoh, Wonjune Lee, Jaihie Kim
2018 arXiv   pre-print
The accuracy can be further improved by a finger-specific bit-training algorithm in which two criteria are leveraged to select useful bit positions for matching.  ...  Experiments are performed on Fingerprint Verification Competition (FVC) databases for comparison with existing techniques to show the superiority of the proposed method.  ...  protection scheme application remain unresolved.  ... 
arXiv:1811.11489v1 fatcat:cjjq3qjgzzejnhmzvuuasspeuq
« Previous Showing results 1 — 15 out of 134 results