메뉴 건너뛰기




Volumn 28, Issue 16, 2007, Pages 2427-2436

Symmetric hash functions for secure fingerprint biometric systems

Author keywords

Biometrics; Cancelable biometrics; Fingerprints; Hashing; Security

Indexed keywords

AUTHENTICATION; CHARACTER RECOGNITION; DATABASE SYSTEMS; ERROR ANALYSIS;

EID: 35148829897     PISSN: 01678655     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.patrec.2007.08.008     Document Type: Article
Times cited : (85)

References (23)
  • 1
    • 35148888299 scopus 로고    scopus 로고
    • ANSI/INCITS 378-2004, 2004. Information Technology - Finger Minutiae Format for Data. Interchange, InterNational Committee for Information Technology Standards.
  • 2
    • 84937704662 scopus 로고    scopus 로고
    • Clancy, T., Lin, D., Kiyavash, N., 2003. Secure smartcard-based fingerprint authentication. In: ACM Workshop on Biometric Methods and Applications (WBMA 2003).
  • 3
    • 0031651014 scopus 로고    scopus 로고
    • Davida, G., Frankel, Y., Matt, B., 1998. On enabling secure applications through on-line biometric identification. In: Proc. IEEE 1998 Symp. on Security and Privacy, Oakland, CA.
  • 4
    • 0031250434 scopus 로고    scopus 로고
    • Fingerprint matching using transformation parameter clustering
    • Germain R., Califano A., and Colville S. Fingerprint matching using transformation parameter clustering. IEEE Comput. Sci. Eng. 4 4 (1997) 42-49
    • (1997) IEEE Comput. Sci. Eng. , vol.4 , Issue.4 , pp. 42-49
    • Germain, R.1    Califano, A.2    Colville, S.3
  • 5
    • 8844254070 scopus 로고    scopus 로고
    • Jea, T.-Y., Chavan, V.S., Govindaraju, V., Schneider, J.K., 2004. Security and matching of partial fingerprint recognition systems. In: SPIE Defense and Security Symposium.
  • 6
    • 0036350106 scopus 로고    scopus 로고
    • Juels, A., Sudan, M., 2002. A fuzzy vault scheme. In: IEEE Internat. Symposium on Information Theory.
  • 7
    • 0033281339 scopus 로고    scopus 로고
    • Juels, A., Wattenberg, M., 1999. A fuzzy commitment scheme. In: ACM Conf. on Computer and Communications Security.
  • 8
    • 33750954911 scopus 로고    scopus 로고
    • Kevenaar, T., Schrijen, G., Veen, M., Akkermans, A., Zuo, F., 2005. Face recognition with renewable and privacy preserving binary templates. In: Auto ID 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies.
  • 9
    • 33750947671 scopus 로고    scopus 로고
    • Kuan, Y., Goh, A., Ngo, D., Teoh, A., 2005. Cryptogrpahic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability. In: Auto ID 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies.
  • 10
    • 35148818054 scopus 로고    scopus 로고
    • Linnartz, J., Tuyls, P., 2003. New shielding functions to enhance privacy and prevent misuse of biometric templates. In: Proc. of the 4th Internat. Conference on Audio and Video-based Biometric Person Authentication, Guildford, UK.
  • 12
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometrics-based authentication system
    • Ratha N.K., Connell J.H., and Bolle R. Enhancing security and privacy in biometrics-based authentication system. IBM Systems J. 40 3 (2001) 614-634
    • (2001) IBM Systems J. , vol.40 , Issue.3 , pp. 614-634
    • Ratha, N.K.1    Connell, J.H.2    Bolle, R.3
  • 15
    • 35148884880 scopus 로고    scopus 로고
    • Second International Fingerprint Verification Competition. .
  • 17
    • 12344259813 scopus 로고    scopus 로고
    • Biohashing: Two factor authentication featuring fingerprint data and tokenised random number
    • Teoh A., Ngo D., and Goh A. Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition 37 11 (2004) 2245-2255
    • (2004) Pattern Recognition , vol.37 , Issue.11 , pp. 2245-2255
    • Teoh, A.1    Ngo, D.2    Goh, A.3
  • 18
    • 35148870213 scopus 로고    scopus 로고
    • Tulyakov, S., Farooq, F., Govindaraju, V., 2005. Symmetric hash functions for fingerprint minutiae. In: Internat. Workshop on Pattern Recognition for Crime Prevention, Security and Surveillance, Bath, UK.
  • 19
    • 35148896004 scopus 로고    scopus 로고
    • Tuyls, P., Akkermans, A.H.M., Kevenaar, T.A.M., Schrijen, G.J., Bazen, A.M., Veldhuis, R.N.J., 2005. Practical biometric authentication with template protection. In: Proc. 5th Internat. Conf. on Audio and Video-based Biometric Person Authentication, Rye Town, NY.
  • 20
    • 8844228915 scopus 로고    scopus 로고
    • Uludag, U., Jain, A., 2004. Attacks on biometric systems: A case study in fingerprints. In: SPIE-EI 2004, Security, Steganography and Watermarking of Multimedia Contents VI.
  • 21
    • 33845532978 scopus 로고    scopus 로고
    • Uludag, U., Jain, A., 2006. Securing fingerprint template: Fuzzy vault with helper data. In: Proc. IEEE Workshop on Privacy Research In Vision, New York.
  • 22
    • 10044222391 scopus 로고    scopus 로고
    • Biometric cryptosystems: Issues and challenges
    • Uludag U., Pankanti S., Prabhakar S., and Jain A.K. Biometric cryptosystems: Issues and challenges. Proc. IEEE 92 6 (2004) 948-960
    • (2004) Proc. IEEE , vol.92 , Issue.6 , pp. 948-960
    • Uludag, U.1    Pankanti, S.2    Prabhakar, S.3    Jain, A.K.4
  • 23
    • 35148890432 scopus 로고    scopus 로고
    • Uludag, U., Pankanthi, S., Jain, A., 2005. Fuzzy vault for fingerprints. In: Proc. 5th Internat. Conf. on Audio and Video-based Biometric Person Authentication, Rye Town, NY.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.