메뉴 건너뛰기




Volumn 38, Issue 5, 2008, Pages 1302-1313

A new method for generating an invariant iris private key based on the fuzzy vault system

Author keywords

Biometric encryption; Fuzzy vault scheme; Independent component analysis; Pattern clustering; Reed Solomon coding

Indexed keywords

CRYPTOGRAPHY; DATABASE SYSTEMS; INFORMATION SERVICES; KEYS (FOR LOCKS); SECURITY OF DATA;

EID: 52349122571     PISSN: 10834419     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSMCB.2008.927261     Document Type: Article
Times cited : (80)

References (43)
  • 4
    • 36348986198 scopus 로고    scopus 로고
    • Fingerprint-based fuzzy vault: Implementation and performance
    • Dec
    • K. Nandakumar, A. K. Jain, and A. Pankanti, "Fingerprint-based fuzzy vault: Implementation and performance," IEEE Trans. Inf. Forensics Secur., vol. 2, no. 4, pp. 744-757, Dec. 2007.
    • (2007) IEEE Trans. Inf. Forensics Secur , vol.2 , Issue.4 , pp. 744-757
    • Nandakumar, K.1    Jain, A.K.2    Pankanti, A.3
  • 5
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometrics-based authentication systems
    • Mar
    • N. K. Ratha, J. H. Connell, and R. M. Bolle, "Enhancing security and privacy in biometrics-based authentication systems," IBM Syst. J. vol. 40, no. 3, pp. 614-634, Mar. 2001.
    • (2001) IBM Syst. J , vol.40 , Issue.3 , pp. 614-634
    • Ratha, N.K.1    Connell, J.H.2    Bolle, R.M.3
  • 7
    • 84937704662 scopus 로고    scopus 로고
    • Secure smartcard-based fingerprint authentication
    • T. C. Clancy, N. Kiyavash, and D. J. Lin, "Secure smartcard-based fingerprint authentication," in Proc. ACM SIGMM WBMA, 2003, pp. 45-52.
    • (2003) Proc. ACM SIGMM WBMA , pp. 45-52
    • Clancy, T.C.1    Kiyavash, N.2    Lin, D.J.3
  • 8
    • 33845532978 scopus 로고    scopus 로고
    • Securing fingerprint template: Fuzzy vault with helper data
    • New York
    • U. Uludag and A. K. Jain, "Securing fingerprint template: Fuzzy vault with helper data," in Proc. CVPR Workshop Privacy Res. Vis., New York, 2006, pp. 163-170.
    • (2006) Proc. CVPR Workshop Privacy Res. Vis , pp. 163-170
    • Uludag, U.1    Jain, A.K.2
  • 10
    • 27644521507 scopus 로고    scopus 로고
    • Automatic secure fingerprint verification system based on fuzzy vault scheme
    • Philadelphia, PA
    • S. Yang and I. Verbauwhede, "Automatic secure fingerprint verification system based on fuzzy vault scheme," in Proc. IEEE ICASSP, Philadelphia, PA, 2005, vol. 5, pp. 609-612.
    • (2005) Proc. IEEE ICASSP , vol.5 , pp. 609-612
    • Yang, S.1    Verbauwhede, I.2
  • 12
    • 33845514726 scopus 로고    scopus 로고
    • Protecting face biometric data on smartcard with Reed-Solomon code
    • New York, Jun
    • Y. C. Feng and P. C. Yuen, "Protecting face biometric data on smartcard with Reed-Solomon code," in Proc. CVPR Workshop Privacy Res. Vis. New York, Jun. 2006.
    • (2006) Proc. CVPR Workshop Privacy Res. Vis
    • Feng, Y.C.1    Yuen, P.C.2
  • 14
    • 29144501251 scopus 로고    scopus 로고
    • A new iris recognition method using independent component analysis
    • Nov
    • S. I. Noh, K. H. Bae, K. R. Park, and J. Kim, "A new iris recognition method using independent component analysis," IEICE Trans. Inf. Syst., vol. E88-D, no. 11, pp. 2573-2581, Nov. 2005.
    • (2005) IEICE Trans. Inf. Syst , vol.E88-D , Issue.11 , pp. 2573-2581
    • Noh, S.I.1    Bae, K.H.2    Park, K.R.3    Kim, J.4
  • 15
    • 52349100661 scopus 로고    scopus 로고
    • Invariant biometric key extraction based on iris code
    • Seoul, Korea
    • Y. J. Lee, H. G. Lee, K. R. Park, and J. Kim, "Invariant biometric key extraction based on iris code," in Proc. IEEK Fall Conf., Seoul, Korea, 2005, vol. 28. no. 2.
    • (2005) Proc. IEEK Fall Conf , vol.28 , Issue.2
    • Lee, Y.J.1    Lee, H.G.2    Park, K.R.3    Kim, J.4
  • 16
    • 52349101813 scopus 로고    scopus 로고
    • Invariant iris code extraction for generating cryptographic key based on fuzzy vault
    • Seoul, Korea
    • Y. J. Lee, K. R. Park, and J. Kim, "Invariant iris code extraction for generating cryptographic key based on fuzzy vault," in Proc. IEEK Summer Conf., Seoul, Korea, 2006, vol. 29. no. 1.
    • (2006) Proc. IEEK Summer Conf , vol.29 , Issue.1
    • Lee, Y.J.1    Park, K.R.2    Kim, J.3
  • 17
    • 37849013877 scopus 로고    scopus 로고
    • Biometric key binding: Fuzzy vault based on iris images
    • Y. J. Lee, K. H. Bae, S. J. Lee, K. R. Park, and J. Kim, "Biometric key binding: Fuzzy vault based on iris images," in Proc. 2nd Int. Conf. Biom., 2007, vol. 4642, pp. 800-808.
    • (2007) Proc. 2nd Int. Conf. Biom , vol.4642 , pp. 800-808
    • Lee, Y.J.1    Bae, K.H.2    Lee, S.J.3    Park, K.R.4    Kim, J.5
  • 23
    • 0036037919 scopus 로고    scopus 로고
    • Private key generation from on-line handwritten signatures
    • F. Hao and C. W. Chan, "Private key generation from on-line handwritten signatures," Inf. Manag. Comput. Secur., vol. 10, no. 4, pp. 159-164, 2002.
    • (2002) Inf. Manag. Comput. Secur , vol.10 , Issue.4 , pp. 159-164
    • Hao, F.1    Chan, C.W.2
  • 24
    • 0031651014 scopus 로고    scopus 로고
    • On enabling secure applications through off-line biometric identification
    • G. I. Davida, Y. Frankel, and B. J. Matt, "On enabling secure applications through off-line biometric identification," in Proc. IEEE Symp. Privacy Secur., 1998, pp. 148-157.
    • (1998) Proc. IEEE Symp. Privacy Secur , pp. 148-157
    • Davida, G.I.1    Frankel, Y.2    Matt, B.J.3
  • 25
    • 8844234621 scopus 로고    scopus 로고
    • On the relation of error correction and cryptography to an offline biometric based identification scheme
    • G. I. Davida, Y. Frankel, B. J. Matt, and R. Peralta, "On the relation of error correction and cryptography to an offline biometric based identification scheme," in Proc. WCC, 1999, pp. 129-138.
    • (1999) Proc. WCC , pp. 129-138
    • Davida, G.I.1    Frankel, Y.2    Matt, B.J.3    Peralta, R.4
  • 27
    • 34147129600 scopus 로고    scopus 로고
    • Cryptographic key generation from biometric data using lattice mapping
    • G. Zhang, W. Li, and C. Zhan, "Cryptographic key generation from biometric data using lattice mapping," in Proc. 18th ICPR, 2006, pp. 513-516.
    • (2006) Proc. 18th ICPR , pp. 513-516
    • Zhang, G.1    Li, W.2    Zhan, C.3
  • 28
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noise data
    • New York: Springer-Verlag
    • Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noise data," in Advances in Cryptology-Eurocrypt, vol. 3027. New York: Springer-Verlag, 2004, pp. 523-540.
    • (2004) Advances in Cryptology-Eurocrypt , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 30
    • 52349124522 scopus 로고    scopus 로고
    • F. Hao, R. Anderson, and J. Daugman, Combining cryptography with biometrics effectively, Comput. Lab., Univ. Cambridge, Cambridge, U.K., Tech. Rep. UCAM-CL-TR-640, 2005.
    • F. Hao, R. Anderson, and J. Daugman, "Combining cryptography with biometrics effectively," Comput. Lab., Univ. Cambridge, Cambridge, U.K., Tech. Rep. UCAM-CL-TR-640, 2005.
  • 32
    • 35048893974 scopus 로고    scopus 로고
    • Multi-unit iris recognition by image checking algorithm
    • Jul
    • J. Jang, K. R. Park, J. Son, and Y. B. Lee, "Multi-unit iris recognition by image checking algorithm," in Proc. ICBA, Jul. 2004, vol. 3072, pp. 450-457.
    • (2004) Proc. ICBA , vol.3072 , pp. 450-457
    • Jang, J.1    Park, K.R.2    Son, J.3    Lee, Y.B.4
  • 34
    • 78651243350 scopus 로고    scopus 로고
    • Jan, accessed on .5.21, Online, Available
    • J. Sylvester, Reed-Solomon Codes, Jan. 2001. (accessed on 2008.5.21). [Online]. Available: http://www.elektrobit.co.uk
    • (2001) Reed-Solomon Codes
    • Sylvester, J.1
  • 35
    • 33846984345 scopus 로고    scopus 로고
    • accessed on .5.21, Online, Available
    • B. Sklar, Reed-Solomon Codes. (accessed on 2008.5.21). [Online]. Available: http://www.informit.com/content/images/art_sklar7_reedsolomon/ elementLinks/art_sklar7_reed-solomon.pdf
    • (2008) Reed-Solomon Codes
    • Sklar, B.1
  • 38
    • 52349103831 scopus 로고    scopus 로고
    • Biometrics Engineering Research Center, Accessed on 2008.5.21, Online, Available
    • Biometrics Engineering Research Center, Iris database (version 1). Accessed on 2008.5.21. [Online]. Available: http://berc.yonsei.ac.kr
    • Iris database (version 1)
  • 39
    • 52349094288 scopus 로고    scopus 로고
    • Online, Available
    • Accessed on 2008.5.21. [Online]. Available: http://www.sinobiometrics.com
    • (2008) Accessed on , vol.5 , Issue.21
  • 40
    • 52349089753 scopus 로고    scopus 로고
    • Online, Available
    • Accessed on 2008.5.21. [Online]. Available: http://www.cbsr.ia.ac.cn/ IrisDatabase.htm
    • (2008) Accessed on , vol.5 , Issue.21
  • 41
    • 0036856989 scopus 로고    scopus 로고
    • Face recognition by independent component analysis
    • Nov
    • M. S. Barlett, J. R. Movellan, and T. J. Sejnowski, "Face recognition by independent component analysis," IEEE Trans. Neural Netw., vol. 13, no. 6, pp. 1450-1454, Nov. 2002.
    • (2002) IEEE Trans. Neural Netw , vol.13 , Issue.6 , pp. 1450-1454
    • Barlett, M.S.1    Movellan, J.R.2    Sejnowski, T.J.3
  • 42
    • 52349100449 scopus 로고    scopus 로고
    • Y. K. Jang, B. J. Kang, and K. R. Park, Robust eyelid detection for iris recognition, J. IEEK, 44, no. SP 1, pp. 94-104, Jan. 2007.
    • Y. K. Jang, B. J. Kang, and K. R. Park, "Robust eyelid detection for iris recognition," J. IEEK, vol. 44, no. SP 1, pp. 94-104, Jan. 2007.
  • 43
    • 34447329266 scopus 로고    scopus 로고
    • A robust eyelash detection based on iris focus assessment
    • Oct
    • B. J. Kang and K. R. Park, "A robust eyelash detection based on iris focus assessment," Pattern Recognit. Lett., vol. 28, no. 13, pp. 1630-1639, Oct. 2007.
    • (2007) Pattern Recognit. Lett , vol.28 , Issue.13 , pp. 1630-1639
    • Kang, B.J.1    Park, K.R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.