Filters








13 Hits in 2.1 sec

Biometric Template Protection: Bridging the performance gap between theory and practice

Karthik Nandakumar, Anil K. Jain
2015 IEEE Signal Processing Magazine  
Design of invariant biometric representations remains a fundamental problem, despite recent attempts to address this issue through feature adaptation schemes.  ...  An example of this latter approach is the Minutia Cylinder Code (MCC) [35] .  ...  A unary coding scheme solves this problem, but it does not produce a compact representation. The LSSC method attempts to generalize the idea of unary coding.  ... 
doi:10.1109/msp.2015.2427849 fatcat:5st7zg5xzbhm7nfr45x2mw6nym

Random Hash Code Generation for Cancelable Fingerprint Templates using Vector Permutation and Shift-order Process [article]

Sani M. Abdullahi, Sun Shuifa
2021 arXiv   pre-print
The generated hash codes are resilient to different security and privacy attacks whilst fulfilling the major revocability and unlinkability requirements.  ...  Proposed scheme First, the minutiae feature descriptor, popularly known as Minutiae Cylinder Code (MCC) [3] is employed to extract fingerprint vector features, and a fixed length representation technique  ...  An example of such descriptor is the state-of-the-art minutiae cylinder code (MCC) [3] which is known for its superior matching performance.  ... 
arXiv:2105.10227v1 fatcat:yuiiawclffgmjolzmn3fohtbhq

A Brief Overview of Hybrid Schemes for Biometric Fingerprint Template Security

Edwin T. L. Rampine, Cynthia H. Ngejane
2016 Proceedings of the 2nd International Conference on Information Systems Security and Privacy  
Minutiae Cylinder Code and Random Key A hybrid scheme combining a transformation and a user key was proposed by (Mirmohamadsadeghi and Drygajlo, 2013) to provide the MCC-based fingerprint representation  ...  They used a baseline fingerprint descriptor by employing minutiae cylinder code which provides rotation and translation invariant descriptors for accurate recognition.  ... 
doi:10.5220/0005730503400346 dblp:conf/icissp/RampineN16 fatcat:2nfffkvhivcwne2czaf6iso3x4

Biometric template security

Abhishek Nagar
2009 SPIE Newsroom  
Binary Minutiae Cylinder Codes Minutia Cylinder Codes (MCC) were proposed as minutia descriptors for fingerprint matching in [23] .  ...  2.4 graphically depicts a minutia cylinder and the corresponding minutia cylinder code.  ...  B.1 Minutiae Template Transforms A minutiae based fingerprint template, say T , consists of a collection of n minutiae i.e. T = {(x 1 , y 1 , θ 1 ), (x 2 , y 2 , θ 2 ), ..., (x n , y n , θ n )}.  ... 
doi:10.1117/2.1200911.001590 fatcat:3uykbccxwnfcpcodymfook557y

Biometric Template Security

Anil K Jain, Karthik Nandakumar, Abhishek Nagar
2008 EURASIP Journal on Advances in Signal Processing  
Binary Minutiae Cylinder Codes Minutia Cylinder Codes (MCC) were proposed as minutia descriptors for fingerprint matching in [23] .  ...  2.4 graphically depicts a minutia cylinder and the corresponding minutia cylinder code.  ...  B.1 Minutiae Template Transforms A minutiae based fingerprint template, say T , consists of a collection of n minutiae i.e. T = {(x 1 , y 1 , θ 1 ), (x 2 , y 2 , θ 2 ), ..., (x n , y n , θ n )}.  ... 
doi:10.1155/2008/579416 fatcat:rrogtu2eh5d3dpyftnwm5dd2m4

Ranking-Based Locality Sensitive Hashing-Enabled Cancelable Biometrics: Index-of-Max Hashing

Zhe Jin, Jung Yeon Hwang, Yen-Lung Lai, Soohyung Kim, Andrew Beng Jin Teoh
2018 IEEE Transactions on Information Forensics and Security  
The discrete indices representation nature of IoM hashed codes enjoy serveral merits. Firstly, IoM hashing empowers strong concealment to the biometric information.  ...  With externally generated random parameters, IoM hashing transforms a real-valued biometric feature vector into discrete index (max ranked) hashed code.  ...  Minutiae descriptor extraction, : Minutia Cylinder-Code (MCC) [12] is considered.  ... 
doi:10.1109/tifs.2017.2753172 fatcat:tf73zfpkhjct5pewzzyxo33lva

Fingerprint Template Protection: From Theory to Practice [chapter]

Anil K. Jain, Karthik Nandakumar, Abhishek Nagar
2013 Security and Privacy in Biometrics  
First, we need to select an appropriate representation scheme that captures most of the discriminatory information, but is sufficiently invariant to changes in finger placement and can be secured using  ...  Another interesting structure is the Minutia Cylinder Code proposed by Cappelli et al. [6] .  ...  The concept of pre-image resistance is also related to one-way or noninvertible mathematical functions.  ... 
doi:10.1007/978-1-4471-5230-9_8 fatcat:l3gyhxcq3jbc3jyiy2ec6js5zu

Biometrics and Privacy-preservation: How Do They Evolve

Quang Tran, Benjamin Turnbull, Jiankun Hu
2021 IEEE Open Journal of the Computer Society  
Among all the works that have been proposed, Minutia Cylinder Code (MCC), introduced by Cappelli et al. [15] is the current stateof-the-art algorithm.  ...  Hence, applying error code correction, k is successfully recovered.  ... 
doi:10.1109/ojcs.2021.3068385 fatcat:rjm3fob7rvdddhlkpwbxjblrxq

Privacy-Preserving Fingerprint Authentication Using D-H Key Exchange and Secret Sharing

Huiyong Wang, Mingjun Luo, Yong Ding, Savio Sciancalepore
2021 Security and Communication Networks  
, the Minutia Cylinder-Code (MCC) [32] , a representation based on 3D data structures (called cylinders) and the DeepPrint [33] , a fixedlength fingerprint representation of only 200 bytes.  ...  [27] proposed a noninvertible cancellable fingerprint template generation scheme based on information extracted from the Delaunay triangulation of minutiae points system in 2020.  ... 
doi:10.1155/2021/5344696 fatcat:ggozrczeknfhhhofvflyn7cst4

A Symmetric Keyring Encryption Scheme for Biometric Cryptosystems [article]

Yen-Lung Lai, Jung-Yeon Hwang, Zhe Jin, Soohyong Kim, Sangrae Cho and Andrew Beng Jin Teoh
2018 arXiv   pre-print
The conversion process consists of two sequential stages, i.e. generation of the minutia cylinder-code [33] [36] (subset DB 1).  ...  The fuzzy commitment scheme is conceptually simple and its error tolerance mechanism solely relies on error correction codes (ECCs) such as Bose-Chaudhuri-Hocquenghem (BCH), Reed-Solomon codes etc.  ... 
arXiv:1809.11045v1 fatcat:6eg773vv6zeevao3oppjeerzwy

A non-invertible cancelable fingerprint template generation based on ridge feature transformation [article]

Rudresh Dwivedi, Somnath Dey
2018 pre-print
Recent approaches towards cancelable fingerprint generation either rely on aligning minutiae points with respect to singular points (core/delta) or utilize the absolute coordinate positions of minutiae  ...  The nearest neighbor minutiae in each sector are identified, and ridge-based features are computed.  ...  [16] introduced a state-of-the-art Minutiae Cylinder Code (MCC) based fingerprint representation which outperforms the most of the existing methods.  ... 
doi:10.1117/1.jei.27.5.053031 arXiv:1805.10853v1 fatcat:lp4xdpekxvgita7435rjdgnlxm

Biometrics for Internet-of-Things Security: A Review

Wencheng Yang, Song Wang, Nor Masri Sahri, Nickson M Karie, Mohiuddin Ahmed, Craig Valli
2021
To achieve good recognition accuracy, the authors adopted and improved the well-known fingerprint minutia descriptor, Minutia Cylinder-Code (MCC).  ...  Minutiae and creases are common feature representations that are extracted for authentication purposes [50] .  ... 
doi:10.26181/615cdf6566c18 fatcat:gky4ov7v4behlhor45jduoxlvq

Cancelable Biometric System Based on Deep Learning [article]

Tanuja Sudhakar, University Of Calgary, Marina L. Gavrilova
2020
For example, position and orientation of fingerprint minutia points, striations in the iris, and fingervein vascular pattern are unique feature representations of a user.  ...  Cylinder Code Support Vector Machine K v.acc FTE MFCC TanH User key Validation accuracy of CNN Failure To Enroll Mel Frequency Cepstral Coefficient Hyperbolic Tangent l v.loss FVS MIHBL TMIS Left iris  ... 
doi:10.11575/prism/38262 fatcat:qozwha6fenbcdpsuo2wg2s4qz4