메뉴 건너뛰기




Volumn 38, Issue 4, 2011, Pages 173-180

Improved cancelable fingerprint fuzzy vault system

Author keywords

Biometric encryption; Cancelable biometric; Fingerprint recognition; Fuzzy vault; Two factor authentication

Indexed keywords

BIOMETRIC ENCRYPTION; CANCELABLE BIOMETRICS; FINGERPRINT RECOGNITION; FUZZY VAULT; TWO FACTOR AUTHENTICATION;

EID: 80053099833     PISSN: 10012400     EISSN: None     Source Type: Journal    
DOI: 10.3969/j.issn.1001-2400.2011.04.031     Document Type: Article
Times cited : (8)

References (22)
  • 1
    • 38149030200 scopus 로고    scopus 로고
    • Biometric Encryption: a Positive-sum Technology That Achieves Strong Authentication, Security and Privacy
    • [2010-05-20]
    • Cavoukian A, Stoianov A. Biometric Encryption: a Positive-sum Technology That Achieves Strong Authentication, Security and Privacy [R/OL]. [2010-05-20]. http://www.ipc.on.ca.
    • Cavoukian, A.1    Stoianov, A.2
  • 2
    • 33947506091 scopus 로고
    • Method for Producing a Digital Signature with Aid of a Biometric Feature
    • German Patent DE 42 43 908 A1. [2010-05-20]
    • Bodo A. Method for Producing a Digital Signature with Aid of a Biometric Feature. German Patent DE 42 43 908 A1 [P/OL]. 1994[2010-05-20]. http://depatisnet.dpma.de/ipc/recherchex.do
    • (1994)
    • Bodo, A.1
  • 4
    • 52149117439 scopus 로고    scopus 로고
    • Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
    • Dodis Y, Ostrovsky R, Reyzin L, et al. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data [J]. SIAM Journal on Computing, 2008, 38(1): 97-139.
    • (2008) SIAM Journal on Computing , vol.38 , Issue.1 , pp. 97-139
    • Dodis, Y.1    Ostrovsky, R.2    Reyzin, L.3
  • 5
    • 35248839355 scopus 로고    scopus 로고
    • New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates
    • New York: Springer-Verlag
    • Linnartz J P, Tuyls P. New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates [C]//4th Conference on Audio and Video Based Person Authentication. New York: Springer-Verlag, 2003: 393-402.
    • (2003) 4th Conference on Audio and Video Based Person Authentication , pp. 393-402
    • Linnartz, J.P.1    Tuyls, P.2
  • 6
    • 33747624401 scopus 로고    scopus 로고
    • Combining Crypto with Biometrics Effectively
    • Hao F, Anderson R, Daugman J. Combining Crypto with Biometrics Effectively [J]. IEEE Trans on Computers, 2006, 55(9): 1081-1088.
    • (2006) IEEE Trans on Computers , vol.55 , Issue.9 , pp. 1081-1088
    • Hao, F.1    Anderson, R.2    Daugman, J.3
  • 10
  • 14
    • 34147097906 scopus 로고    scopus 로고
    • Biometrics Based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme
    • Washington DC: IEEE Computer Society
    • Nagar A, Chaudhury S. Biometrics Based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme [C]//Proceedings of the 18th International Conference on Pattern Recognition. Washington DC: IEEE Computer Society, 2006: 537-540.
    • (2006) Proceedings of the 18th International Conference on Pattern Recognition , pp. 537-540
    • Nagar, A.1    Chaudhury, S.2
  • 16
    • 50249107013 scopus 로고    scopus 로고
    • Cracking Fuzzy Vaults and Biometric Encryption
    • Baltimore: IEEE
    • Scheirer W J, Boult T E. Cracking Fuzzy Vaults and Biometric Encryption [C]//Biometrics Symposium. Baltimore: IEEE, 2007: 1-6.
    • (2007) Biometrics Symposium , pp. 1-6
    • Scheirer, W.J.1    Boult, T.E.2
  • 18
    • 56749120040 scopus 로고    scopus 로고
    • The Fuzzy Vault for Fingerprints is Vulnerable to Brute Force Attack
    • [2010-06-03]
    • Mihailescu P. The Fuzzy Vault for Fingerprints is Vulnerable to Brute Force Attack [J/OL]. [2010-06-03]. http://www.uni-math.gwdg.de/preda/mihailescu-papers/vault.pdf.
    • Mihailescu, P.1
  • 22
    • 32644449022 scopus 로고    scopus 로고
    • A Chaincode Based Scheme for Fingerprint Feature Extraction
    • Shi Z, Govindaraju V. A Chaincode Based Scheme for Fingerprint Feature Extraction [J]. Pattern Recognition Letters, 2006, 27(5): 462-468.
    • (2006) Pattern Recognition Letters , vol.27 , Issue.5 , pp. 462-468
    • Shi, Z.1    Govindaraju, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.