A Survey on Biometric Template Protection Using Hybrid Approaches
Abstract
Keywords
Full Text:
PDFReferences
Abishek Nagar, Karthick Nanda Kumar, Anil K.Jain , Hybrid Biometric Cryptosystem For Securing Fingerprint Minutiae Templates, Pattern Recognition Letters Volume 31 , Issue 8, June 2010, Pages: 733-741 ,2010 , ISSN:0167-8655
Anil. K. Jain, A. Ross, and S. Pankanti, “Biometrics: A Tool for Information Security,” IEEE Transactions on Information Forensics and Security, vol. 1, no. 2, pp. 125–143, June 2006.
Anil K. Jain, Karthik Nanda Kumar and Abhishek Nagar, “Biometric Template Security” EURASIP Journal on Advancing Signal Processing, special issue on Biometrics, January 2008.
Julien Bringer, Herve Chabanne, Bruno Kindarji, and The best of both worlds: Applying secure sketches to cancelable biometrics, Science of Computer Programming V.74 n. 1- p.43-51, December, 2008.
Karthik Nandakumar, Abhishek Nagar and Anil K.Jain, “Hardening Fingerprint Fuzzy Vault using Password”, International conference on Biometrics, 2007.
K.NandaKumar, “Multibiometric Systems: Fusion Strategies and Template Security”, PhD Thesis, Department of Computer Science and Engineering, Michigan State University, January 2008.
L. Nanni, E. Maiorana, A. Lumini and P. Campisi, "Combining local, regional and global matchers for a template protected on-line signature verification system", Expert Systems With Applications, vol.37, no.5, pp.3676-3684, May 2010.
L. Nanni and A. Lumini, "A multi-modal method based on the competitors of FVC2004 and on Palm data combined with tokenised random numbers", Pattern Recognition Letters, vol.29, no.9, pp.1344-1350, July 2008
N. Ratha, J. Connell, and R. Bolle, “Enhancing security and privacy in biometrics-based authentication systems,” IBM Syst. J., vol. 40, no. 3 pp. 614–634, 2001.
A. Ross, J. Shah, and A. K. Jain, “Towards reconstructing fingerprints from minutiae points,” in Proc.SPIE, Biometric Technology for Human Identification II, vol. 5779, pp. 68–80, (Orlando, FL), March 2005.
O. T. Song, A. B. J. Teoh, and D. C. L. Ngo, "Application-specific key release scheme from biometrics," International Journal of Network Security, vol. 6, no. 2, pp. 127-133, 2008.
E.Srinivasa Reddy, I. Ramesh Babu, “Performance of Iris Based Hard Fuzzy Vault”, Proceedings of IEEE 8th International conference on computers and Information technology workshops, pp. 248 – 253, 2008
Yi C. Feng , Pong C. Yuen , Anil K. Jain, A hybrid approach for generating secure and discriminating face template, IEEE Transactions on Information Forensics and Security, v.5 n.1, p.103-117, March 2010
F. Monrose, M. K. Reiter, and S. Wetzel, Password Hardening Based on Keystroke Dynamics. In Proceedings of Sixth ACM Conference on Computer and Communications Security, pages 73 - 82, 1999.
F. Monrose, M.K. Reiter, Q. Li, and S. Wetzel. Cryptographic Key Generation from Voice. In Proceedings of IEEE Symposium on Security and Privacy, pages 202 - 213, Oakland, USA, May 2001.
Boult, T.E., Scheirer, W.J., Woodworth, R., 2007. Fingerprint revocable biotokens: Accuracy and security analysis. In: Proc. CVPR. Minneapolis, pp. 1-8.
A. Vetro and N. Memon. Biometric System Security. Tutorial presented at Second International Conference on Biometrics, Seoul, South Korea, and August 2007.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.