메뉴 건너뛰기




Volumn 2, Issue , 2008, Pages 572-575

Cracking cancelable fingerprint template of Ratha

Author keywords

Cancelable biometrics; Fingerprint template; Minutiae; Privacy; Security

Indexed keywords

AUTHENTICATION; DATA PRIVACY;

EID: 62349084871     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/iscsct.2008.226     Document Type: Conference Paper
Times cited : (108)

References (19)
  • 1
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing Security and Privacy in Biometrics-Based Authentication System
    • Mar, doi: 10.1147/sj.403.0614
    • N. K. Ratha, J. H. Connell, and R. Bolle, "Enhancing Security and Privacy in Biometrics-Based Authentication System," IBM Systems J., vol. 40, no. 3, Mar. 2001, pp. 614-634, doi: 10.1147/sj.403.0614.
    • (2001) IBM Systems J , vol.40 , Issue.3 , pp. 614-634
    • Ratha, N.K.1    Connell, J.H.2    Bolle, R.3
  • 3
    • 10044284550 scopus 로고    scopus 로고
    • Cancelable biometric filters for face recognition
    • Nov, doi: 10.1109/ICPR.2004.1334679
    • M. Savvides, B. V. K. V. Kumar, and P. K. Khosla, "Cancelable biometric filters for face recognition," in Proc. 17th ICPR, vol. 3, Nov. 2004, pp. 922-925, doi: 10.1109/ICPR.2004.1334679.
    • (2004) Proc. 17th ICPR , vol.3 , pp. 922-925
    • Savvides, M.1    Kumar, B.V.K.V.2    Khosla, P.K.3
  • 4
    • 12344259813 scopus 로고    scopus 로고
    • BioHashing: Two factor authentication featuring fingerprint data and tokenised random number
    • doi:10.1016/j.patcog.2004.04.011
    • A. Teoh, D. Ngo, and A. Goh, "BioHashing: Two factor authentication featuring fingerprint data and tokenised random number," Pattern Recognit., vol. 37, no. 11, 2004, pp. 2245-2255, doi:10.1016/j.patcog.2004.04.011.
    • (2004) Pattern Recognit , vol.37 , Issue.11 , pp. 2245-2255
    • Teoh, A.1    Ngo, D.2    Goh, A.3
  • 5
    • 33947177191 scopus 로고    scopus 로고
    • Random Multispace Quantization As an Analytic Mechanism for Biohashing of Biometric and Random Identity Inputs
    • Dec, doi: 10.1109/TPAMI.2006.250
    • A. Teoh, M. Goh, D. Ngo, "Random Multispace Quantization As an Analytic Mechanism for Biohashing of Biometric and Random Identity Inputs," IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 28, no. 12, Dec. 2006, pp. 1892-1901, doi: 10.1109/TPAMI.2006.250.
    • (2006) IEEE Transactions on Pattern Analysis and Machine Intelligence , vol.28 , Issue.12 , pp. 1892-1901
    • Teoh, A.1    Goh, M.2    Ngo, D.3
  • 6
    • 8344273612 scopus 로고    scopus 로고
    • Personalised cryptographic key generation based on FaceHashing
    • Oct
    • A. B. J. Teoh, D. C. L. Ngo, and A. Goh, "Personalised cryptographic key generation based on FaceHashing," Comput. Security, vol. 23, no. 7, Oct. 2004, pp. 606-614.
    • (2004) Comput. Security , vol.23 , Issue.7 , pp. 606-614
    • Teoh, A.B.J.1    Ngo, D.C.L.2    Goh, A.3
  • 7
    • 12844255931 scopus 로고    scopus 로고
    • PalmHashing: A novel approach for dual-factor authentication
    • doi:10.1016/j.cose.2004.06.002
    • T. Connie, A. Teoh, M. Goh, and D. Ngo, "PalmHashing: A novel approach for dual-factor authentication," Pattern Anal. Appl., vol. 7, no. 3, 2004, pp. 255-268, doi:10.1016/j.cose.2004.06.002.
    • (2004) Pattern Anal. Appl , vol.7 , Issue.3 , pp. 255-268
    • Connie, T.1    Teoh, A.2    Goh, M.3    Ngo, D.4
  • 8
  • 9
    • 34547103253 scopus 로고    scopus 로고
    • Alignment-Free Cancelable Fingerprint Templates Based on Local Minutiae Information
    • Aug, doi: 10.1109/TSMCB.2007.896999
    • C. Lee, J.-Y. Choi, K.-A Toh, S. Lee, and J. Kim, "Alignment-Free Cancelable Fingerprint Templates Based on Local Minutiae Information," IEEE Transactions on Systems, Man and Cybernetics, Part B, Vol. 37, no. 4, Aug. 2007, pp. 980-992, doi: 10.1109/TSMCB.2007.896999.
    • (2007) IEEE Transactions on Systems, Man and Cybernetics, Part B , vol.37 , Issue.4 , pp. 980-992
    • Lee, C.1    Choi, J.-Y.2    Toh, K.-A.3    Lee, S.4    Kim, J.5
  • 11
    • 33646095185 scopus 로고    scopus 로고
    • An analysis of BioHashing and its variants
    • Jul. 27, doi:10.1016/j.patcog.2005.10.025
    • A. Kong, K. Cheung, D. Zhang, M. Kamel, and J. You, "An analysis of BioHashing and its variants," Pattern Recognit., vol. 39, no. 7, Jul. 27, 2006, pp. 1359-1368, doi:10.1016/j.patcog.2005.10.025.
    • (2006) Pattern Recognit , vol.39 , Issue.7 , pp. 1359-1368
    • Kong, A.1    Cheung, K.2    Zhang, D.3    Kamel, M.4    You, J.5
  • 12
    • 14844335721 scopus 로고    scopus 로고
    • Reusable Cryptographic Fuzzy Extractors
    • doi: 10.1145/1030083.1030096
    • X. Boyen, "Reusable Cryptographic Fuzzy Extractors," in ACM Conf. on Computer and Communications Security, 2004, pp. 82-91, doi: 10.1145/1030083.1030096.
    • (2004) ACM Conf. on Computer and Communications Security , pp. 82-91
    • Boyen, X.1
  • 13
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • doi: 10.1007/b97182
    • Y. Dodis, L. Reyzin, A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," Eurocrypt2004, 2004, pp. 523-540, doi: 10.1007/b97182.
    • (2004) Eurocrypt , vol.2004 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 18
    • 33751580079 scopus 로고    scopus 로고
    • FVC2002: Second fingerprint verification competition
    • Aug, doi: doi/10.1109/ICPR.2002.1048144
    • D. Maio, D. Maltoni, J. L. Wayman, and A. K. Jain, "FVC2002: Second fingerprint verification competition," in Proc. Int. Conf. Pattern Recognition, Aug. 2002, pp. 811-814, doi: doi/10.1109/ICPR.2002.1048144.
    • (2002) Proc. Int. Conf. Pattern Recognition , pp. 811-814
    • Maio, D.1    Maltoni, D.2    Wayman, J.L.3    Jain, A.K.4
  • 19
    • 35048881611 scopus 로고    scopus 로고
    • A Robust Fingerprint Minutiae Matching Algorithm Based on the Support Model
    • July, doi: 10.1007/b98225
    • Xiaohui Xie, Fei Su, Anni Cai. "A Robust Fingerprint Minutiae Matching Algorithm Based on the Support Model," International Conference on Biometric Authentication, ICBA2004, July, 2004, pp. 316-323, doi: 10.1007/b98225.
    • (2004) International Conference on Biometric Authentication, ICBA2004 , pp. 316-323
    • Xie, X.1    Su, F.2    Cai, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.