719 Hits in 3.2 sec

Blind minutiae selection for standard minutiae templates

Z. Yao, B. Vibert, C. Charrier, C. Rosenberger
2015 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)  
This paper presents several simple yet efficient no-image minutiae selection approaches (NIMS) for the standard minutiae templates (ISO/IEC 19794-2).  ...  The embedded applications of fingerprint proposed so far are chiefly based on the minutiae template.  ...  In stead of choosing minutiae in terms of the image information, this paper made efforts to achieve a blind selection of minutiae from the original template.  ... 
doi:10.1109/isba.2015.7126367 dblp:conf/isba/YaoVCR15 fatcat:hp5i5tejk5alfarklbos26kjri

Minutiae Matching with Privacy Protection Based on the Combination of Garbled Circuit and Homomorphic Encryption

Mengxing Li, Quan Feng, Jian Zhao, Mei Yang, Lijun Kang, Lili Wu
2014 The Scientific World Journal  
Our goal is to provide protection for the security of template in storage and data privacy of two parties in transaction.  ...  In this paper we present a scheme achieving privacy-preserving fingerprint authentication between two parties, in which fingerprint minutiae matching algorithm is completed in the encrypted domain.  ...  Conflict of Interests We do not have a direct financial relation that might lead to a conflict of interests for any of the authors.  ... 
doi:10.1155/2014/525387 pmid:24711729 pmcid:PMC3953427 fatcat:kqd2oowznvbwjdmjx2gxq7slqa

DCT Watermarking Approach for Security Enhancement of Multimodal System

Mita Paunwala, S. Patnaik
2012 ISRN Signal Processing  
For our experimentation we have used iris and finger prints as the two templates which are watermarked into standard test images.  ...  Proposed technique embeds watermark in low frequency AC coefficients of selected 8 × 8 DCT blocks.  ...  [12] proposed a blind data hiding method, which is applicable to fingerprint images compressed with WSQ (Wavelet-packet Scalar Quantization) standard.  ... 
doi:10.5402/2012/781940 fatcat:kcghed3fu5g25fwp2xdczayz34

Fingerprint Quality Assessment Combining Blind Image Quality, Texture and Minutiae Features

Zhigang Yao, Jean-Marie Le Bars, Christophe Charrier, Christophe Rosenberger
2015 Proceedings of the 1st International Conference on Information Systems Security and Privacy  
features which correspond to the most used information for matching.  ...  complementary aspects: 1) Image quality assessment without any reference which is consistent with human conception of inspecting quality, 2) Textural features related to the fingerprint image and 3) minutiae  ...  Such a result demonstrates the significance of minutiae template.  ... 
doi:10.5220/0005268403360343 dblp:conf/icissp/YaoBCR15a fatcat:uqbbjzvvtrhwljkxpwnnol7duy

A Novel EMD based Watermarking of Fingerprint Biometric Using GEP

Anil Kumar Shaw, Swanirbhar Majumder, Souvik Sarkar, Subir Kumar Sarkar
2013 Procedia Technology - Elsevier  
Robust watermarking of biometric information of the user in the host data may be used for this purpose. Fingerprints are the most popular and noninvasive biometric data used most widely.  ...  Here GeneXpro software does that automatically to select the relevant IMF of the fingerprint. Thus, for each person, a standard IMF is chosen via GEP [41] [42].  ...  The selected standard IMFs are seen to follow a particular type of pattern out here, based on which they can be differentiated.  ... 
doi:10.1016/j.protcy.2013.12.350 fatcat:33kx5kes4rcfdkvn4n3isguune

Ranking-Based Locality Sensitive Hashing-Enabled Cancelable Biometrics: Index-of-Max Hashing

Zhe Jin, Jung Yeon Hwang, Yen-Lung Lai, Soohyung Kim, Andrew Beng Jin Teoh
2018 IEEE Transactions on Information Forensics and Security  
In this paper, we propose a ranking based locality sensitive hashing inspired two-factor cancelable biometrics, dubbed "Index-of-Max" (IoM) hashing for biometric template protection.  ...  Thirdly, the magnitude-independence trait of IoM hashing makes the hash codes being scale-invariant, which is critical for matching and feature alignment.  ...  Thus, MLC may reduce the effort of brute force attack but difficult to recover the minutiae set. Wang and Hu [15] proposed a blind system identification approach to protect biometric template.  ... 
doi:10.1109/tifs.2017.2753172 fatcat:tf73zfpkhjct5pewzzyxo33lva

Secure Biometric Cryptosystem for Distributed System

Manish Manoria, Ajit Kumar Shrivastava, Satyendra Singh Thakur, Debu Sinha
2011 International Journal of Communication Networks and Security  
determination of appropriate key sizes with security issues and determines the matching performance using MATLAB and JDK1.6, performance of this system is more than 86.7% and when combines this with blind  ...  The RSA cryptosystem is the de facto standard for public-key encryption and signature worldwide.  ...  BLIND AUTHENTICATION In the field of Information Technology the Blind Authentication is the basis for a new class of authentication schemes.  ... 
doi:10.47893/ijcns.2011.1016 fatcat:zg3fstfwjzf7hizke32bd6r3de

An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures

Wencheng Yang, Jiankun Hu, Song Wang, Milos Stojmenovic
2014 Pattern Recognition  
the alignment process can cause significant singular point deviation and minutiae changes.  ...  Moreover, most existing bio-cryptosystems rely on the accurate detection of singular points for fingerprint image prealignment, which is very hard to achieve, and the image rotation transformation during  ...  Moreover, the similarity measure for query and template minutia sets is limited [6] .  ... 
doi:10.1016/j.patcog.2013.10.001 fatcat:qhqd4i6zzrgcxgaxhpphnk44su

Biometrics Based Privacy-Preserving Authentication and Mobile Template Protection

Wencheng Yang, Jiankun Hu, Song Wang, Qianhong Wu
2018 Wireless Communications and Mobile Computing  
Experimental results on public databases and security analysis show the validity of the proposed cancelable template.  ...  However, the negative effect of nonlinear distortion will usually degrade the matching performance significantly, which is a nontrivial factor when designing a cancelable template.  ...  For all the databases, the 1VS1 matching protocol and standard FVC matching protocol [42] were utilized in the experiments.  ... 
doi:10.1155/2018/7107295 fatcat:2pj5qjywsndtjompcsqrvfutye

Enhanced Secure Algorithm for Fingerprint Recognition [article]

Amira Mohammad Abdel-Mawgoud Saleh
2014 arXiv   pre-print
Fingerprint recognition requires a minimal effort from the user, does not capture other information than strictly necessary for the recognition process, and provides relatively good performance.  ...  A new minutiae-based fingerprint matching technique is proposed. The main idea is that each fingerprint is represented by a minutiae table of just two columns in the database.  ...  Usually, a set of filters is pre-computed and one of them is selected for each image region.  ... 
arXiv:1402.4936v1 fatcat:kqi3mbsrozdujgmon3lw5cogoq

A Review of Cancelable Biometric Authentication Methods

Mamatha R
2018 Journal of Biometrics & Biostatistics  
Biometric analysis for identity verification is becoming a widespread reality.  ...  In order to prevent the theft of biometric patterns, it is desired to modify them through revocable and non-invertible transformations to produce Cancelable biometric templates.  ...  [23] extend a blind system identification approach to the development of alignment free cancelable fingerprint templates.  ... 
doi:10.4172/2155-6180.1000398 fatcat:s7ckxwvosfa5jcqnh24fhkaktq

Generating Cancelable Fingerprint Templates

Nalini K. Ratha, Sharat Chikkerur, Jonathan H. Connell, Ruud M. Bolle
2007 IEEE Transactions on Pattern Analysis and Machine Intelligence  
Hence, if a biometric identifier is compromised, it is lost forever and possibly for every application where the biometric is used.  ...  We empirically compare the performance of several algorithms such as Cartesian, polar, and surface folding transformations of the minutiae positions.  ...  Watson Research Center for valuable suggestions and constructive criticisms during our work.  ... 
doi:10.1109/tpami.2007.1004 pmid:17299214 fatcat:i73pgh24zrbmfkq4ggrbo76vzu

Reducing computational complexity in fingerprint matching

2020 Turkish Journal of Electrical Engineering and Computer Sciences  
The performance of cross-correlation functions can decrease computational complexity under optimal fingerprint feature selection.  ...  Minutiae points are extracted and alignment is performed on the basis of their spatial locations and orientation fields.  ...  For template image:M i = x i , y i , ϑ i and i = 1, 2, 3, , mFor input image:M j = x j , y j , ϑ j and j = 1, 2, 3, , nwhere m and n are numbers of minutiae points in T and I, respectively [17] .  ... 
doi:10.3906/elk-1907-113 fatcat:wd3yshbdzrc47pxhfb6gpclj7u

Certificateless Digital Signature Technology for e-Governance Solutions

Shuchi Dhir, Dr. Sumithra Devi K.A
2019 Computer Science  
Although many solutions which provide certificateless technology exist, to date there have been no practical implementation for using biometrics for implementing the solution.  ...  In order to understand the reasons for low-level acceptance of the technology, authors performed a detailed study of a famous e-governance initiative of India.  ...  The standards prescribed by the National Institute of Standards and Technology (NIST) through its fingerprint minutiae viewer (FpMV) has been used for minutiae extraction (see Figure 2 ).  ... 
doi:10.7494/csci.2019.20.4.3179 fatcat:ksahixdp2ba5tecxxitmtr3aby

Fingerprints, Iris and DNA Features based Multimodal Systems: A Review

Prakash Chandra Srivastava, Anupam Agrawal, Kamta Nath Mishra, P. K. Ojha, R. Garg
2013 International Journal of Information Technology and Computer Science  
The d irect ions of future research work for robust personal identification is outlined.  ...  The feature extraction and subset selection based techniques for iris identification were used by [4] .  ...  A cryptographic key is generated fro m the bio metric templates and encrypted minutiae templates of iris are stored in the database [75] .  ... 
doi:10.5815/ijitcs.2013.02.10 fatcat:2u4rlwbt3vbmze4sfwvj4ufuyq
« Previous Showing results 1 — 15 out of 719 results