메뉴 건너뛰기




Volumn , Issue , 2010, Pages

A privacy-compliant fingerprint recognition system based on homomorphic encryption and fingercode templates

Author keywords

[No Author keywords available]

Indexed keywords

BIOMETRIC DATA; BIOMETRIC MATCHING; BIOMETRIC SYSTEMS; COMPUTATIONAL TIME; CONCEPTUAL FRAMEWORKS; CRYPTOSYSTEMS; DESIGN METHODOLOGY; FINGERPRINT RECOGNITION SYSTEMS; HOMOMORPHIC-ENCRYPTIONS; PRIVACY COMPLIANCE; PRIVACY PROTECTION; RESEARCH TOPICS; SINGLE USERS;

EID: 78650313296     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/BTAS.2010.5634527     Document Type: Conference Paper
Times cited : (94)

References (31)
  • 2
    • 85008014515 scopus 로고    scopus 로고
    • Biometric security solutions
    • K. W. Webb, "Biometric security solutions," IEEE Security and Privacy, vol. 3, p. 7, 2005.
    • (2005) IEEE Security and Privacy , vol.3 , pp. 7
    • Webb, K.W.1
  • 5
    • 33947177191 scopus 로고    scopus 로고
    • Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs
    • dec.
    • A. Teoh, A. Goh, and D. Ngo, "Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs," Pattern Analysis and Machine Intelligence, IEEE Transactions on, vol. 28, no. 12, pp. 1892-1901, dec. 2006.
    • (2006) Pattern Analysis and Machine Intelligence, IEEE Transactions on , vol.28 , Issue.12 , pp. 1892-1901
    • Teoh, A.1    Goh, A.2    Ngo, D.3
  • 6
    • 33748422480 scopus 로고    scopus 로고
    • Empirical tests on biohashing
    • L. Nanni and A. Lumini, "Empirical tests on biohashing," Neurocomputing, vol. 69, no. 16-18, pp. 2390 - 2395, 2006.
    • (2006) Neurocomputing , vol.69 , Issue.16-18 , pp. 2390-2395
    • Nanni, L.1    Lumini, A.2
  • 12
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," SIAM Journal on Computing, vol. 38, no. 1, pp. 97-139, 2008.
    • (2008) SIAM Journal on Computing , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3    Smith, A.4
  • 14
    • 70450245646 scopus 로고    scopus 로고
    • Multibiometric cryptosystem: Model structure and performance analysis
    • dec.
    • B. Fu, S. Yang, J. Li, and D. Hu, "Multibiometric cryptosystem: Model structure and performance analysis," Information Forensics and Security, IEEE Transactions on, vol. 4, no. 4, pp. 867-882, dec. 2009.
    • (2009) Information Forensics and Security, IEEE Transactions on , vol.4 , Issue.4 , pp. 867-882
    • Fu, B.1    Yang, S.2    Li, J.3    Hu, D.4
  • 16
    • 77955557689 scopus 로고    scopus 로고
    • Cancellable biometrics and userdependent multi-state discretization in biohash
    • A. Teoh, W. Yip, and K.-A. Toh, "Cancellable biometrics and userdependent multi-state discretization in biohash," Pattern Analysis & Applications.
    • Pattern Analysis & Applications
    • Teoh, A.1    Yip, W.2    Toh, K.-A.3
  • 21
    • 78650411084 scopus 로고    scopus 로고
    • B. V. K. V. Kumar, S. Prabhakar, and A. A. Ross, Eds., SPIE
    • A. Stoianov, "Cryptographically secure biometrics," B. V. K. V. Kumar, S. Prabhakar, and A. A. Ross, Eds., vol. 7667, no. 1. SPIE, 2010, p. 76670C.
    • (2010) Cryptographically Secure Biometrics , vol.7667 , Issue.1
    • Stoianov, A.1
  • 28
    • 84942550998 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in EUROCRYPT, 1999, pp. 223-238.
    • (1999) EUROCRYPT , pp. 223-238
    • Paillier, P.1
  • 29
    • 85032883059 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. El Gamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," in Proceedings of CRYPTO 84 on Advances in cryptology, 1985, pp. 10-18.
    • (1985) Proceedings of CRYPTO 84 on Advances in Cryptology , pp. 10-18
    • El Gamal, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.