A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Security and Accuracy of Fingerprint-Based Biometrics: A Review
2019
Symmetry
In this paper, a comprehensive review is presented to shed light on the latest developments in the study of fingerprint-based biometrics covering these two aspects with a view to improving system security ...
Based on a thorough analysis and discussion, limitations of existing research work are outlined and suggestions for future work are provided. ...
[47] presented a secure fingerprint matching approach, named P-MCC-PUFs, which contains two factors based on P-MCC and PUFs (Physically Unclonable Functions). ...
doi:10.3390/sym11020141
fatcat:dbhglykcqnbr3hp6tupq6ssdqu
Ranking-Based Locality Sensitive Hashing-Enabled Cancelable Biometrics: Index-of-Max Hashing
2018
IEEE Transactions on Information Forensics and Security
In this paper, we propose a ranking based locality sensitive hashing inspired two-factor cancelable biometrics, dubbed "Index-of-Max" (IoM) hashing for biometric template protection. ...
We demonstrate two realizations from IoM hashing notion, namely Gaussian Random Projection based and Uniformly Random Permutation based hashing schemes. ...
A two-factor protection scheme on P-MCC, namely 2P-MCC [13] is hence put forward to make the P-MCC be cancellable. ...
doi:10.1109/tifs.2017.2753172
fatcat:tf73zfpkhjct5pewzzyxo33lva
Generating protected fingerprint template utilizing coprime mapping transformation
[article]
2018
arXiv
pre-print
In this paper, a coprime transformation scheme has been proposed to derive a protected fingerprint template. ...
Then, ridge features for all neighboring minutiae points are computed and mapped onto co-prime positions of a random matrix to generate the cancelable template. ...
[19] presented two-factor protected Minutiae Cylinder-Code (2P-MCC) where partial permutation is performed using a secret key over the cylinders in P-MCC. Recently, Rathgeb et al. ...
arXiv:1805.10108v1
fatcat:3cr4ggs2fjafhi5bbly3h7noym
Random Hash Code Generation for Cancelable Fingerprint Templates using Vector Permutation and Shift-order Process
[article]
2021
arXiv
pre-print
Cancelable biometric techniques have been used to prevent the compromise of biometric data by generating and using their corresponding cancelable templates for user authentication. ...
In this paper, we propose a non-invertible distance preserving scheme based on vector permutation and shift-order process. ...
MCC is a prominent fingerprint recognition technique based on minutiae template. ...
arXiv:2105.10227v1
fatcat:yuiiawclffgmjolzmn3fohtbhq
Biometrics and Privacy-preservation: How Do They Evolve
2021
IEEE Open Journal of the Computer Society
This paper contributes to the understanding of the field from following perspectives: (1) It proposes a novel and comprehensive taxonomy of privacy-preserving biometrics for the classification of the knowledge ...
Such system-level knowledge organization will help produce excellent self-contained contents of reference materials for researchers in both the biometrics community and cryptography community who would ...
The authors of MCC proposed P-MCC [51] as a template protection scheme in which a KL projection [52] is applied on the MCC vector. However, this projection is not revocable. ...
doi:10.1109/ojcs.2021.3068385
fatcat:rjm3fob7rvdddhlkpwbxjblrxq
Fingerprint shell: Secure representation of fingerprint template
2014
Pattern Recognition Letters
In this paper, we present a new approach for fingerprint template protection. ...
Fingerprint is a popular biometric modality which is used extensively in several applications for person authentication, providing high uniqueness and acceptable performance. ...
Acknowledgment The first author is a fulbright visiting scholar, to University of Nevada-Reno, of the Moroccan-American Commission for Educational and Cultural Exchange. ...
doi:10.1016/j.patrec.2014.04.001
fatcat:ddleelqb3bclnejpvk52horn5a
Biometric Template Protection: Bridging the performance gap between theory and practice
2015
IEEE Signal Processing Magazine
Numerous techniques have been proposed for biometric template protection over the last 20 years. ...
Design of invariant biometric representations remains a fundamental problem, despite recent attempts to address this issue through feature adaptation schemes. ...
Fig. 4 . 4 There are two broad approaches for biometric template protection: (a) feature transformation and (b) biometric cryptosystem. ...
doi:10.1109/msp.2015.2427849
fatcat:5st7zg5xzbhm7nfr45x2mw6nym
Biometrics Based Privacy-Preserving Authentication and Mobile Template Protection
2018
Wireless Communications and Mobile Computing
However, the negative effect of nonlinear distortion will usually degrade the matching performance significantly, which is a nontrivial factor when designing a cancelable template. ...
Cancelable biometrics is a promising mechanism to provide authentication to mobile devices and protect biometric templates by applying a noninvertible transformation to raw biometric data. ...
To address this issue, cancelable fingerprint templates [3] , among other biometric template protection schemes, have been proposed. ...
doi:10.1155/2018/7107295
fatcat:2pj5qjywsndtjompcsqrvfutye
Biometric Template Security
2008
EURASIP Journal on Advances in Signal Processing
Biometric Template Security By Abhishek Nagar With the proliferation of biometric recognition systems, an attacker's benefit in staging a system compromise is also increasing and thus is the need to ensure ...
This dissertation provides a thorough analysis of the vulnera- ...
[142] proposed two template transformation schemes for iris images. ...
doi:10.1155/2008/579416
fatcat:rrogtu2eh5d3dpyftnwm5dd2m4
Biometric template security
2009
SPIE Newsroom
Biometric Template Security By Abhishek Nagar With the proliferation of biometric recognition systems, an attacker's benefit in staging a system compromise is also increasing and thus is the need to ensure ...
This dissertation provides a thorough analysis of the vulnera- ...
[142] proposed two template transformation schemes for iris images. ...
doi:10.1117/2.1200911.001590
fatcat:3uykbccxwnfcpcodymfook557y
Lightweight Biometric System for Internet of Things (IoT) Security
2019
International Journal for Research in Applied Science and Engineering Technology
In this article, we have proposed a lightweight biometric system for protected user authentication, which is particularly designed for resource limited IoT devices. ...
As for future work, more efforts will be place into finding stable feature representations and manipulative secure template security algorithms in the mobile environment. ...
mobile device ready with a fingerprint sensor. ...
doi:10.22214/ijraset.2019.4306
fatcat:c2m37hbghrbhtosndutgeqy46q
A survey on fingerprint minutiae-based local matching for verification and identification: Taxonomy and experimental evaluation
2015
Information Sciences
Fingerprint recognition has found a reliable application for verification or identification of people in biometrics. ...
This paper is devoted to review and categorize the vast number of fingerprint matching methods proposed in the specialized literature. ...
After alignment, a matching score for the two fingerprints is calculated. ...
doi:10.1016/j.ins.2015.04.013
fatcat:4fq4tswnajdo5dnwv5433mipq4
Biometrics for Internet-of-Things Security: A Review
2021
Sensors
The purpose of this review is to provide a comprehensive survey on the current biometrics research in IoT security, especially focusing on two important aspects, authentication and encryption. ...
With an insight into the state-of-the-art research in biometrics for IoT security, this review paper helps advance the study in the field and assists researchers in gaining a good understanding of forward-looking ...
[90] protected the cryptographic key stored in the unmanned IoT device with a novel two-factor fuzzy commitment. ...
doi:10.3390/s21186163
pmid:34577370
fatcat:urk3rlktjbahvdc5evaanqjn3y
On the Security Risk of Cancelable Biometrics
[article]
2020
arXiv
pre-print
Over the years, a number of biometric template protection schemes, primarily based on the notion of "cancelable biometrics" (CB) have been proposed. ...
The results examined on face, iris, and fingerprint revealed that the risks origin from the matching score computed from the distance/similarity of two cancelable templates jeopardize the security of cancelable ...
Two-factor Protected Minutia Cylinder-Code (2PMCC) [14] is a template protection scheme based on Protected Minutia Cylinder-Code (PMCC) [19] and the Minutia Cylinder-Code (MCC) [20] for fingerprints ...
arXiv:1910.07770v3
fatcat:3f4fyxlrwffmnpz6eghhjdzdae
Fixed-length Bit-string Representation of Fingerprint by Normalized Local Structures
[article]
2018
arXiv
pre-print
The accuracy can be further improved by a finger-specific bit-training algorithm in which two criteria are leveraged to select useful bit positions for matching. ...
Experiments are performed on Fingerprint Verification Competition (FVC) databases for comparison with existing techniques to show the superiority of the proposed method. ...
protection scheme application remain unresolved. ...
arXiv:1811.11489v1
fatcat:cjjq3qjgzzejnhmzvuuasspeuq
« Previous
Showing results 1 — 15 out of 134 results