메뉴 건너뛰기




Volumn 40, Issue 3, 2010, Pages 525-538

Cancelable templates for sequence-based biometrics with application to on-line signature recognition

Author keywords

Biometrics; Cancelable biometrics; Hidden Markov model (HMM); Security; Signature verification; Template protection

Indexed keywords

AUTHENTICATION; HIDDEN MARKOV MODELS; MARKOV PROCESSES; METADATA;

EID: 77951209095     PISSN: 10834427     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSMCA.2010.2041653     Document Type: Article
Times cited : (140)

References (57)
  • 2
    • 0742302036 scopus 로고    scopus 로고
    • Biometric recognition: Security and privacy concerns
    • Mar./Apr.
    • S. Prabhakar, S. Pankanti, and A. K. Jain, "Biometric recognition: Security and privacy concerns," IEEE Security Privacy, vol.1, no.2, pp. 33-42, Mar./Apr. 2003.
    • (2003) IEEE Security Privacy , vol.1 , Issue.2 , pp. 33-42
    • Prabhakar, S.1    Pankanti, S.2    Jain, A.K.3
  • 4
  • 5
    • 35148827336 scopus 로고    scopus 로고
    • HMM-based on-line signature verification: Feature extraction and signature modeling
    • DOI 10.1016/j.patrec.2007.07.012, PII S0167865507002395
    • J. Fierrez, J. Ortega-Garcia, D. Ramos, and J. Gonzalez-Rodriguez, "HMM-based on-line signature verification: Feature extraction and signature modeling," Pattern Recognit. Lett., vol.28, no.16, pp. 2325-2334, Dec. 2007. (Pubitemid 47538786)
    • (2007) Pattern Recognition Letters , vol.28 , Issue.16 , pp. 2325-2334
    • Fierrez, J.1    Ortega-Garcia, J.2    Ramos, D.3    Gonzalez-Rodriguez, J.4
  • 7
    • 33947521876 scopus 로고    scopus 로고
    • Biometrics from brain electrical activity: A machine learning approach
    • Apr.
    • R. Palaniappan and D. P. Mandic, "Biometrics from brain electrical activity: A machine learning approach," IEEE Trans. Pattern Anal. Mach. Intell., vol.29, no.4, pp. 738-742, Apr. 2007.
    • (2007) IEEE Trans. Pattern Anal. Mach. Intell. , vol.29 , Issue.4 , pp. 738-742
    • Palaniappan, R.1    Mandic, D.P.2
  • 8
    • 2142713919 scopus 로고    scopus 로고
    • Local intensity variation analysis for iris recognition
    • DOI 10.1016/j.patcog.2004.02.001, PII S0031320304000469
    • L. Ma, T. Tan, Y. Wang, and D. Zhang, "Local intensity variation analysis for iris recognition," Pattern Recognit., vol.37, no.6, pp. 1287-1298, Jun. 2004. (Pubitemid 38549826)
    • (2004) Pattern Recognition , vol.37 , Issue.6 , pp. 1287-1298
    • Ma, L.1    Tan, T.2    Wang, Y.3    Zhang, D.4
  • 9
    • 33751585800 scopus 로고    scopus 로고
    • Biometric hash based on statistical features of online signatures
    • C. Vielhauer, R. Steinmetz, and A. Mayerhöfer, "Biometric hash based on statistical features of online signatures," in Proc. ICPR, 2002, vol.1, pp. 123-126.
    • (2002) Proc. ICPR , vol.1 , pp. 123-126
    • Vielhauer, C.1    Steinmetz, R.2    Mayerhöfer, A.3
  • 15
    • 50249183581 scopus 로고    scopus 로고
    • Biometric signature authentication using Radon transform-based watermarking techniques
    • Baltimore, MD, Sep.
    • E. Maiorana, P. Campisi, and A. Neri, "Biometric signature authentication using Radon transform-based watermarking techniques," in Proc. IEEE Biometric Symp., Baltimore, MD, Sep. 2007, pp. 1-6.
    • (2007) Proc. IEEE Biometric Symp. , pp. 1-6
    • Maiorana, E.1    Campisi, P.2    Neri, A.3
  • 16
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy of biometric-based authentication systems
    • Mar.
    • N. K. Ratha, J. H. Connell, and R. Bolle, "Enhancing security and privacy of biometric-based authentication systems," IBM Syst. J., vol.40, no.3, pp. 614-634, Mar. 2001.
    • (2001) IBM Syst. J. , vol.40 , Issue.3 , pp. 614-634
    • Ratha, N.K.1    Connell, J.H.2    Bolle, R.3
  • 17
    • 33744742101 scopus 로고    scopus 로고
    • Can images be regenerated from biometric templates?
    • Arlington, VA, USA, Sep.
    • A. Adler, "Can images be regenerated from biometric templates?" in Biometrics Consortium Conference, Arlington, VA, USA, Sep. 2003.
    • (2003) Biometrics Consortium Conference
    • Adler, A.1
  • 21
    • 10044222391 scopus 로고    scopus 로고
    • Biometric cryptosystems: Issues and challenges
    • Jun.
    • U. Uludag, S. Pankanti, and A. K. Jain, "Biometric cryptosystems: Issues and challenges," Proc. IEEE, vol.92, no.6, pp. 948-960, Jun. 2004.
    • (2004) Proc. IEEE , vol.92 , Issue.6 , pp. 948-960
    • Uludag, U.1    Pankanti, S.2    Jain, A.K.3
  • 23
    • 30844458593 scopus 로고    scopus 로고
    • A fuzzy vault scheme
    • Feb.
    • A. Juels andM. Sudan, "A fuzzy vault scheme," Designs Codes Cryptogr., vol.38, no.2, pp. 237-257, Feb. 2006.
    • (2006) Designs Codes Cryptogr. , vol.38 , Issue.2 , pp. 237-257
    • Juels, A.1    Sudan, M.2
  • 24
    • 36348986198 scopus 로고    scopus 로고
    • Fingerprint-based fuzzy vault: Implementation and performance
    • Dec.
    • K. Nandakumar, A. K. Jain, and S. Pankanti, "Fingerprint-based fuzzy vault: Implementation and performance," IEEE Trans. Inf. Forensics Security, vol.2, no.4, pp. 744-757, Dec. 2007.
    • (2007) IEEE Trans. Inf. Forensics Security , vol.2 , Issue.4 , pp. 744-757
    • Nandakumar, K.1    Jain, A.K.2    Pankanti, S.3
  • 27
    • 34548074162 scopus 로고    scopus 로고
    • Protecting biometric templates with sketch: Theory and practice
    • Sep.
    • Y. Sutcu, Q. Li, and N. Memon, "Protecting biometric templates with sketch: Theory and practice," IEEE Trans. Inf. Forensics Security, vol.2, no.3, pp. 503-512, Sep. 2007.
    • (2007) IEEE Trans. Inf. Forensics Security , vol.2 , Issue.3 , pp. 503-512
    • Sutcu, Y.1    Li, Q.2    Memon, N.3
  • 28
    • 33947177191 scopus 로고    scopus 로고
    • Random multispace quantization as an analytic mechanism for BioHashing of biometric and random identity inputs
    • Dec.
    • A. B. J. Teoh, D. C. L. Ngo, and A. Goh, "Random multispace quantization as an analytic mechanism for BioHashing of biometric and random identity inputs," IEEE Trans. Pattern Anal. Mach. Intell., vol.28, no.12, pp. 1892-1901, Dec. 2006.
    • (2006) IEEE Trans. Pattern Anal. Mach. Intell. , vol.28 , Issue.12 , pp. 1892-1901
    • Teoh, A.B.J.1    Ngo, D.C.L.2    Goh, A.3
  • 32
    • 0036887662 scopus 로고    scopus 로고
    • Biometrics perils and patches
    • Dec.
    • R. M. Bolle, J. H. Connell, and K. K. Ratha, "Biometrics perils and patches," Pattern Recognit., vol.35, no.12, pp. 2727-2738, Dec. 2002.
    • (2002) Pattern Recognit. , vol.35 , Issue.12 , pp. 2727-2738
    • Bolle, R.M.1    Connell, J.H.2    Ratha, K.K.3
  • 36
    • 62349084871 scopus 로고    scopus 로고
    • Cracking cancelable fingerprint template of Ratha
    • Dec.
    • F. Quan, S. Fei, C. Anni, and Z. Feifei, "Cracking cancelable fingerprint template of Ratha," in Proc. ISCSCT, Dec. 2008, vol.2, pp. 572-575.
    • (2008) Proc. ISCSCT , vol.2 , pp. 572-575
    • Quan, F.1    Fei, S.2    Anni, C.3    Feifei, Z.4
  • 37
    • 67549112548 scopus 로고    scopus 로고
    • Generating registration-free cancelable fingerprint templates
    • Sep. 29-Oct.
    • S. Chikkerur, N. K. Ratha, J. H. Connell, and R. M. Bolle, "Generating registration-free cancelable fingerprint templates," in Proc. IEEE BTAS Conf., Sep. 29-Oct. 1, 2008, pp. 1-6.
    • (2008) Proc. IEEE BTAS Conf. , vol.1 , pp. 1-6
    • Chikkerur, S.1    Ratha, N.K.2    Connell, J.H.3    Bolle, R.M.4
  • 38
  • 41
    • 46649099649 scopus 로고    scopus 로고
    • A novel hybrid model framework to blind color image deconvolution
    • Jul.
    • Y. He, K. H. Yap, L. Chen, and L. P. Chau, "A novel hybrid model framework to blind color image deconvolution," IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol.38, no.4, pp. 867-880, Jul. 2008.
    • (2008) IEEE Trans. Syst., Man, Cybern. A, Syst., Humans , vol.38 , Issue.4 , pp. 867-880
    • He, Y.1    Yap, K.H.2    Chen, L.3    Chau, L.P.4
  • 42
    • 0002377851 scopus 로고
    • Automatic signature verification: The state of the art 1989-1993
    • F. Leclerc and R. Plamondon, "Automatic signature verification: The state of the art 1989-1993," Int. J. Pattern Recognit. Artif. Intell., vol.8, no.3, pp. 643-659, 1994.
    • (1994) Int. J. Pattern Recognit. Artif. Intell. , vol.8 , Issue.3 , pp. 643-659
    • Leclerc, F.1    Plamondon, R.2
  • 44
    • 69949166251 scopus 로고    scopus 로고
    • On-line signature verification
    • A. K. Jain, A. Ross, and P. Flynn, Eds. Berlin, Germany: Springer-Verlag
    • J. Fierrez and J. Ortega-Garcia, "On-line signature verification," in Handbook of Biometrics, A. K. Jain, A. Ross, and P. Flynn, Eds. Berlin, Germany: Springer-Verlag, 2008, pp. 189-209.
    • (2008) Handbook of Biometrics , pp. 189-209
    • Fierrez, J.1    Ortega-Garcia, J.2
  • 45
    • 2942592700 scopus 로고    scopus 로고
    • Handwriting: Feature correlation analysis for biometric hashes
    • Jan.
    • C. Vielhauer and R. Steinmetz, "Handwriting: Feature correlation analysis for biometric hashes," EURASIP J. Appl. Signal Process., vol.2004, no.4, pp. 542-558, Jan. 2004.
    • (2004) EURASIP J. Appl. Signal Process. , vol.2004 , Issue.4 , pp. 542-558
    • Vielhauer, C.1    Steinmetz, R.2
  • 46
    • 25844484205 scopus 로고    scopus 로고
    • Identity authentication using improved online signature verification method
    • DOI 10.1016/j.patrec.2005.04.017, PII S0167865505001376
    • A. Kholmatov and B. Yanikoglu, "Identity authentication using improved online signature verification method," Pattern Recognit. Lett., vol.26, no.15, pp. 2400-2408, Nov. 2005. (Pubitemid 41394296)
    • (2005) Pattern Recognition Letters , vol.26 , Issue.15 , pp. 2400-2408
    • Kholmatov, A.1    Yanikoglu, B.2
  • 47
    • 0029246903 scopus 로고
    • Application of hidden Markov models for signature verification
    • L. Yang, B. W. Widjaja, and R. Prasad, "Application of hidden Markov models for signature verification," Pattern Recognit., vol.28, no.2, pp. 161-170, 1995.
    • (1995) Pattern Recognit. , vol.28 , Issue.2 , pp. 161-170
    • Yang, L.1    Widjaja, B.W.2    Prasad, R.3
  • 48
    • 0036037919 scopus 로고    scopus 로고
    • Private key generation from on-line handwritten signatures
    • DOI 10.1108/09685220210436949
    • H. Feng and C.W. Chan, "Private key generation from on-line handwritten signatures," Inf. Manage. Comput. Security, vol.10, no.4, pp. 159-164, 2002. (Pubitemid 35010220)
    • (2002) Information Management and Computer Security , vol.10 , Issue.4 , pp. 159-164
    • Feng, H.1    Wah, C.C.2
  • 50
    • 33744964385 scopus 로고    scopus 로고
    • Generation of replaceable cryptographic keys from dynamic handwritten signatures
    • W. K. Yip, A. Goh, D. C. L. Ngo, and A. B. J. Teoh, "Generation of replaceable cryptographic keys from dynamic handwritten signatures," in Proc. ICB, 2006, pp. 509-515.
    • (2006) Proc. ICB , pp. 509-515
    • Yip, W.K.1    Goh, A.2    Ngo, D.C.L.3    Teoh, A.B.J.4
  • 51
    • 67549130623 scopus 로고    scopus 로고
    • User adaptive fuzzy commitment for signature templates protection and renewability
    • Mar.
    • E. Maiorana, P. Campisi, and A. Neri, "User adaptive fuzzy commitment for signature templates protection and renewability," J. Electron. Imag., vol.17, no.1, p. 011 011, Mar. 2008.
    • (2008) J. Electron. Imag. , vol.17 , Issue.1 , pp. 011011
    • Maiorana, E.1    Campisi, P.2    Neri, A.3
  • 52
    • 71349086903 scopus 로고    scopus 로고
    • On-line signature based authentication: Template security issues and countermeasures
    • N. V. Boulgouris, K. N. Plataniotis, and E. Micheli-Tzanakou, Eds. New York: Wiley
    • P. Campisi, E. Maiorana, and A. Neri, "On-line signature based authentication: Template security issues and countermeasures," in Biometrics: Theory, Methods, and Applications, N. V. Boulgouris, K. N. Plataniotis, and E. Micheli-Tzanakou, Eds. New York: Wiley, 2009.
    • (2009) Biometrics: Theory, Methods, and Applications
    • Campisi, P.1    Maiorana, E.2    Neri, A.3
  • 54
    • 0024610919 scopus 로고
    • A tutorial on hidden Markov models and selected applications in speech recognition
    • Feb.
    • L. R. Rabiner, "A tutorial on hidden Markov models and selected applications in speech recognition," Proc. IEEE, vol.77, no.2, pp. 257-286, Feb. 1989.
    • (1989) Proc. IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.R.1
  • 55
    • 35148845492 scopus 로고    scopus 로고
    • On using the Viterbi path along with HMM likelihood information for online signature verification
    • DOI 10.1109/TSMCB.2007.895323, Special Issue on Recent Advances in Biometric Systems
    • B. L. Van, S. Garcia Salicetti, and B. Dorizzi, "On using the Viterbi path along with HMM likelihood information for online signature verification," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol.37, no.5, pp. 1237-1247, Oct. 2007. (Pubitemid 47534589)
    • (2007) IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics , vol.37 , Issue.5 , pp. 1237-1247
    • Van, B.L.1    Garcia-Salicetti, S.2    Dorizzi, B.3
  • 56
    • 37849026158 scopus 로고    scopus 로고
    • A new forgery scenario based on regaining dynamics of signature
    • J. Hennebert, R. Loeffel, A. Humm, and R. Ingold, "A new forgery scenario based on regaining dynamics of signature," in Proc. IEEE ICB, 2007, pp. 366-375.
    • (2007) Proc. IEEE ICB , pp. 366-375
    • Hennebert, J.1    Loeffel, R.2    Humm, A.3    Ingold, R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.