A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Blind minutiae selection for standard minutiae templates
2015
IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015)
This paper presents several simple yet efficient no-image minutiae selection approaches (NIMS) for the standard minutiae templates (ISO/IEC 19794-2). ...
The embedded applications of fingerprint proposed so far are chiefly based on the minutiae template. ...
In stead of choosing minutiae in terms of the image information, this paper made efforts to achieve a blind selection of minutiae from the original template. ...
doi:10.1109/isba.2015.7126367
dblp:conf/isba/YaoVCR15
fatcat:hp5i5tejk5alfarklbos26kjri
Minutiae Matching with Privacy Protection Based on the Combination of Garbled Circuit and Homomorphic Encryption
2014
The Scientific World Journal
Our goal is to provide protection for the security of template in storage and data privacy of two parties in transaction. ...
In this paper we present a scheme achieving privacy-preserving fingerprint authentication between two parties, in which fingerprint minutiae matching algorithm is completed in the encrypted domain. ...
Conflict of Interests We do not have a direct financial relation that might lead to a conflict of interests for any of the authors. ...
doi:10.1155/2014/525387
pmid:24711729
pmcid:PMC3953427
fatcat:kqd2oowznvbwjdmjx2gxq7slqa
DCT Watermarking Approach for Security Enhancement of Multimodal System
2012
ISRN Signal Processing
For our experimentation we have used iris and finger prints as the two templates which are watermarked into standard test images. ...
Proposed technique embeds watermark in low frequency AC coefficients of selected 8 × 8 DCT blocks. ...
[12] proposed a blind data hiding method, which is applicable to fingerprint images compressed with WSQ (Wavelet-packet Scalar Quantization) standard. ...
doi:10.5402/2012/781940
fatcat:kcghed3fu5g25fwp2xdczayz34
Fingerprint Quality Assessment Combining Blind Image Quality, Texture and Minutiae Features
english
2015
Proceedings of the 1st International Conference on Information Systems Security and Privacy
english
features which correspond to the most used information for matching. ...
complementary aspects: 1) Image quality assessment without any reference which is consistent with human conception of inspecting quality, 2) Textural features related to the fingerprint image and 3) minutiae ...
Such a result demonstrates the significance of minutiae template. ...
doi:10.5220/0005268403360343
dblp:conf/icissp/YaoBCR15a
fatcat:uqbbjzvvtrhwljkxpwnnol7duy
A Novel EMD based Watermarking of Fingerprint Biometric Using GEP
2013
Procedia Technology - Elsevier
Robust watermarking of biometric information of the user in the host data may be used for this purpose. Fingerprints are the most popular and noninvasive biometric data used most widely. ...
Here GeneXpro software does that automatically to select the relevant IMF of the fingerprint. Thus, for each person, a standard IMF is chosen via GEP [41] [42]. ...
The selected standard IMFs are seen to follow a particular type of pattern out here, based on which they can be differentiated. ...
doi:10.1016/j.protcy.2013.12.350
fatcat:33kx5kes4rcfdkvn4n3isguune
Ranking-Based Locality Sensitive Hashing-Enabled Cancelable Biometrics: Index-of-Max Hashing
2018
IEEE Transactions on Information Forensics and Security
In this paper, we propose a ranking based locality sensitive hashing inspired two-factor cancelable biometrics, dubbed "Index-of-Max" (IoM) hashing for biometric template protection. ...
Thirdly, the magnitude-independence trait of IoM hashing makes the hash codes being scale-invariant, which is critical for matching and feature alignment. ...
Thus, MLC may reduce the effort of brute force attack but difficult to recover the minutiae set. Wang and Hu [15] proposed a blind system identification approach to protect biometric template. ...
doi:10.1109/tifs.2017.2753172
fatcat:tf73zfpkhjct5pewzzyxo33lva
Secure Biometric Cryptosystem for Distributed System
2011
International Journal of Communication Networks and Security
determination of appropriate key sizes with security issues and determines the matching performance using MATLAB and JDK1.6, performance of this system is more than 86.7% and when combines this with blind ...
The RSA cryptosystem is the de facto standard for public-key encryption and signature worldwide. ...
BLIND AUTHENTICATION In the field of Information Technology the Blind Authentication is the basis for a new class of authentication schemes. ...
doi:10.47893/ijcns.2011.1016
fatcat:zg3fstfwjzf7hizke32bd6r3de
An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures
2014
Pattern Recognition
the alignment process can cause significant singular point deviation and minutiae changes. ...
Moreover, most existing bio-cryptosystems rely on the accurate detection of singular points for fingerprint image prealignment, which is very hard to achieve, and the image rotation transformation during ...
Moreover, the similarity measure for query and template minutia sets is limited [6] . ...
doi:10.1016/j.patcog.2013.10.001
fatcat:qhqd4i6zzrgcxgaxhpphnk44su
Biometrics Based Privacy-Preserving Authentication and Mobile Template Protection
2018
Wireless Communications and Mobile Computing
Experimental results on public databases and security analysis show the validity of the proposed cancelable template. ...
However, the negative effect of nonlinear distortion will usually degrade the matching performance significantly, which is a nontrivial factor when designing a cancelable template. ...
For all the databases, the 1VS1 matching protocol and standard FVC matching protocol [42] were utilized in the experiments. ...
doi:10.1155/2018/7107295
fatcat:2pj5qjywsndtjompcsqrvfutye
Enhanced Secure Algorithm for Fingerprint Recognition
[article]
2014
arXiv
pre-print
Fingerprint recognition requires a minimal effort from the user, does not capture other information than strictly necessary for the recognition process, and provides relatively good performance. ...
A new minutiae-based fingerprint matching technique is proposed. The main idea is that each fingerprint is represented by a minutiae table of just two columns in the database. ...
Usually, a set of filters is pre-computed and one of them is selected for each image region. ...
arXiv:1402.4936v1
fatcat:kqi3mbsrozdujgmon3lw5cogoq
A Review of Cancelable Biometric Authentication Methods
2018
Journal of Biometrics & Biostatistics
Biometric analysis for identity verification is becoming a widespread reality. ...
In order to prevent the theft of biometric patterns, it is desired to modify them through revocable and non-invertible transformations to produce Cancelable biometric templates. ...
[23] extend a blind system identification approach to the development of alignment free cancelable fingerprint templates. ...
doi:10.4172/2155-6180.1000398
fatcat:s7ckxwvosfa5jcqnh24fhkaktq
Generating Cancelable Fingerprint Templates
2007
IEEE Transactions on Pattern Analysis and Machine Intelligence
Hence, if a biometric identifier is compromised, it is lost forever and possibly for every application where the biometric is used. ...
We empirically compare the performance of several algorithms such as Cartesian, polar, and surface folding transformations of the minutiae positions. ...
Watson Research Center for valuable suggestions and constructive criticisms during our work. ...
doi:10.1109/tpami.2007.1004
pmid:17299214
fatcat:i73pgh24zrbmfkq4ggrbo76vzu
Reducing computational complexity in fingerprint matching
2020
Turkish Journal of Electrical Engineering and Computer Sciences
The performance of cross-correlation functions can decrease computational complexity under optimal fingerprint feature selection. ...
Minutiae points are extracted and alignment is performed on the basis of their spatial locations and orientation fields. ...
For template image:M i = x i , y i , ϑ i and i = 1, 2, 3, , mFor input image:M j = x j , y j , ϑ j and j = 1, 2, 3, , nwhere m and n are numbers of minutiae points in T and I, respectively [17] . ...
doi:10.3906/elk-1907-113
fatcat:wd3yshbdzrc47pxhfb6gpclj7u
Certificateless Digital Signature Technology for e-Governance Solutions
2019
Computer Science
Although many solutions which provide certificateless technology exist, to date there have been no practical implementation for using biometrics for implementing the solution. ...
In order to understand the reasons for low-level acceptance of the technology, authors performed a detailed study of a famous e-governance initiative of India. ...
The standards prescribed by the National Institute of Standards and Technology (NIST) through its fingerprint minutiae viewer (FpMV) has been used for minutiae extraction (see Figure 2 ). ...
doi:10.7494/csci.2019.20.4.3179
fatcat:ksahixdp2ba5tecxxitmtr3aby
Fingerprints, Iris and DNA Features based Multimodal Systems: A Review
2013
International Journal of Information Technology and Computer Science
The d irect ions of future research work for robust personal identification is outlined. ...
The feature extraction and subset selection based techniques for iris identification were used by [4] . ...
A cryptographic key is generated fro m the bio metric templates and encrypted minutiae templates of iris are stored in the database [75] . ...
doi:10.5815/ijitcs.2013.02.10
fatcat:2u4rlwbt3vbmze4sfwvj4ufuyq
« Previous
Showing results 1 — 15 out of 719 results