메뉴 건너뛰기




Volumn 3, Issue 2, 2008, Pages 183-191

Template-free biometric-key generation by means of fuzzy genetic clustering

Author keywords

Biometric authentication; Clustering; Feature evaluation; Handwritten signatures; Security

Indexed keywords

CLUSTERING ALGORITHMS; CRYPTOGRAPHY; FEATURE EXTRACTION; FUZZY CLUSTERING; GENETIC ALGORITHMS; SECURITY OF DATA;

EID: 44049084315     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2008.922056     Document Type: Article
Times cited : (43)

References (38)
  • 1
    • 33947506091 scopus 로고
    • Method for producing a digital signature with aid of a biometric feature,
    • German Patent DE 4243908A1
    • A. Bodo, "Method for producing a digital signature with aid of a biometric feature," German Patent DE 4243908A1, 1994.
    • (1994)
    • Bodo, A.1
  • 2
    • 44049099485 scopus 로고    scopus 로고
    • J. Boiling, A window to your health, Special Issue: Retinal Diseases: Capacity and Examples, Jacksonville Medicine, 51, 2000.
    • J. Boiling, "A window to your health," Special Issue: Retinal Diseases: Capacity and Examples, Jacksonville Medicine, vol. 51, 2000.
  • 5
    • 0031651014 scopus 로고    scopus 로고
    • On enabling secure applications through off-line biometric identification
    • G. I. Davida, Y. Frankel, and B. J. Matt, "On enabling secure applications through off-line biometric identification," in Proc. IEEE Symp. Privacy Security, 1998, pp. 148-157.
    • (1998) Proc. IEEE Symp. Privacy Security , pp. 148-157
    • Davida, G.I.1    Frankel, Y.2    Matt, B.J.3
  • 6
    • 8844234621 scopus 로고    scopus 로고
    • On the relation of error correction and cryptography to an offline biometric-based identification scheme
    • G. I. Davida, Y. Frankel, B. J. Matt, and R. Peralta, "On the relation of error correction and cryptography to an offline biometric-based identification scheme," in Proc. Workshop Coding and Cryptography, 1999, pp. 129-138.
    • (1999) Proc. Workshop Coding and Cryptography , pp. 129-138
    • Davida, G.I.1    Frankel, Y.2    Matt, B.J.3    Peralta, R.4
  • 9
    • 26444498516 scopus 로고    scopus 로고
    • An on-line signature verification system based on fusion of local and global information
    • Proc. AVBPA
    • J. Fierrez-Aguilar, L. Nanni, J. Lopez-Penalba, and J. M. Ortega-GarciaD, "An on-line signature verification system based on fusion of local and global information," in Proc. AVBPA, 2005, pp. 523-532, Lecture Notes Comput. Sci. 3546.
    • (2005) Lecture Notes Comput. Sci , vol.3546 , pp. 523-532
    • Fierrez-Aguilar, J.1    Nanni, L.2    Lopez-Penalba, J.3    Ortega-GarciaD, J.M.4
  • 13
    • 0034517479 scopus 로고    scopus 로고
    • On-Line signature verification based on altitude and direction of pen movement
    • S. Hangai, S. Yamanaka, and T. Hamamoto, "On-Line signature verification based on altitude and direction of pen movement," in Proc. IEEE Int. Conf. Multimedia Expo, 2000, vol. 1, pp. 489-492.
    • (2000) Proc. IEEE Int. Conf. Multimedia Expo , vol.1 , pp. 489-492
    • Hangai, S.1    Yamanaka, S.2    Hamamoto, T.3
  • 14
    • 0036037919 scopus 로고    scopus 로고
    • Private key generation from on-line handwritten signatures
    • F. Hao and C. W. Chan, "Private key generation from on-line handwritten signatures," Inf. Manage. Comput. Security, vol. 10, no. 4, pp. 159-164, 2002.
    • (2002) Inf. Manage. Comput. Security , vol.10 , Issue.4 , pp. 159-164
    • Hao, F.1    Chan, C.W.2
  • 17
    • 0035780544 scopus 로고    scopus 로고
    • Novel biometric digital signatures for internet-based applications
    • P. K. Janbandhu and M. Y. Siyal, "Novel biometric digital signatures for internet-based applications," Inf. Manage. Comput. Security, vol. 9, no. 5, pp. 205-212, 2001.
    • (2001) Inf. Manage. Comput. Security , vol.9 , Issue.5 , pp. 205-212
    • Janbandhu, P.K.1    Siyal, M.Y.2
  • 18
    • 0036350106 scopus 로고    scopus 로고
    • A fuzzy vault scheme
    • A. Juels and M. Sudan, A. Lapidoth and E. Teletar, Eds
    • A. Juels and M. Sudan, A. Lapidoth and E. Teletar, Eds., "A fuzzy vault scheme," in Proc. IEEE Int. Symp. Information Theory, 2002, p. 408.
    • (2002) Proc. IEEE Int. Symp. Information Theory , pp. 408
  • 22
    • 0029696153 scopus 로고    scopus 로고
    • A simple scheme to make passwords based on one-way functions much harder to crack
    • U. Manber, "A simple scheme to make passwords based on one-way functions much harder to crack," Comput. Security, vol. 15, no. 2, pp. 171-176, 1996.
    • (1996) Comput. Security , vol.15 , Issue.2 , pp. 171-176
    • Manber, U.1
  • 23
    • 84936893490 scopus 로고
    • Vital signs of identity
    • Feb
    • B. Miller, "Vital signs of identity," IEEE Spectr., vol. 31, no. 2, pp. 22-30, Feb. 1994.
    • (1994) IEEE Spectr , vol.31 , Issue.2 , pp. 22-30
    • Miller, B.1
  • 26
    • 0029360028 scopus 로고
    • On cluster validity for the fuzzy c-means model
    • Aug
    • N. R. Pal and J. C. Bezdìk, "On cluster validity for the fuzzy c-means model," IEEE Trans. Fuzzy Syst., vol. 3, no. 3, pp. 370-379, Aug. 1995.
    • (1995) IEEE Trans. Fuzzy Syst , vol.3 , Issue.3 , pp. 370-379
    • Pal, N.R.1    Bezdìk, J.C.2
  • 27
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometrics-based authentication systems
    • N. K. Ratha, J. H. Connell, and R. M. Bolle, "Enhancing security and privacy in biometrics-based authentication systems," IBM Syst. J., vol. 40, no. 3, pp. 614-634, 2001.
    • (2001) IBM Syst. J , vol.40 , Issue.3 , pp. 614-634
    • Ratha, N.K.1    Connell, J.H.2    Bolle, R.M.3
  • 28
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 31
    • 10044222391 scopus 로고    scopus 로고
    • Biometric cryptosystems: Issues and challenges
    • Jun
    • U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, "Biometric cryptosystems: Issues and challenges," Proc. IEEE, vol. 92, no. 6, pp. 948-960, Jun. 2004.
    • (2004) Proc. IEEE , vol.92 , Issue.6 , pp. 948-960
    • Uludag, U.1    Pankanti, S.2    Prabhakar, S.3    Jain, A.K.4
  • 33
    • 2942592700 scopus 로고    scopus 로고
    • Handwriting: Feature correlation analysis for biometric hashes
    • C. Vielhauer and R. Steinmetz, "Handwriting: Feature correlation analysis for biometric hashes," EURASIP J. Appl. Signal Process., vol. 4, pp. 542-558, 2004.
    • (2004) EURASIP J. Appl. Signal Process , vol.4 , pp. 542-558
    • Vielhauer, C.1    Steinmetz, R.2
  • 36
    • 0026204245 scopus 로고
    • A validity measure for fuzzy clustering
    • Aug
    • X. L. Xie and G. Beni, "A validity measure for fuzzy clustering," IEEE Trans. Pattern Anal. Mach. Intell., vol. 13, no. 8, pp. 841-847, Aug. 1991.
    • (1991) IEEE Trans. Pattern Anal. Mach. Intell , vol.13 , Issue.8 , pp. 841-847
    • Xie, X.L.1    Beni, G.2
  • 37
    • 0035394221 scopus 로고    scopus 로고
    • A secure communication system using biometric identity verification
    • Y. Yamazaki and N. Komatsu, "A secure communication system using biometric identity verification," IEICE Trans. Inf. Syst., vol. E84-D, no. 7, pp. 879-884, 2001.
    • (2001) IEICE Trans. Inf. Syst , vol.E84-D , Issue.7 , pp. 879-884
    • Yamazaki, Y.1    Komatsu, N.2
  • 38
    • 33749240177 scopus 로고    scopus 로고
    • Generalized optimal thresholding for biometric key generation using face images
    • W. Zhang and T. Chen, "Generalized optimal thresholding for biometric key generation using face images," in Proc. Int. Conf. Image Processing, 2005, vol. 3, pp. 784-787.
    • (2005) Proc. Int. Conf. Image Processing , vol.3 , pp. 784-787
    • Zhang, W.1    Chen, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.