메뉴 건너뛰기




Volumn 7, Issue 1 PART 2, 2012, Pages 255-268

Multibiometric cryptosystems based on feature-level fusion

Author keywords

Biometric cryptosystem; fusion; fuzzy commitment; fuzzy vault; multibiometrics; template security

Indexed keywords

BIOMETRIC APPLICATIONS; BIOMETRIC TEMPLATE; ERROR RATE; FEATURE LEVEL; FUZZY COMMITMENT; FUZZY VAULT; MATCHING PERFORMANCE; MULTIBIOMETRIC SYSTEMS; MULTIBIOMETRICS; MULTIMODAL DATABASE; PRACTICAL IMPLEMENTATION; SECURE SKETCH; SYSTEM SECURITY; TEMPLATE SECURITY; USER PRIVACY;

EID: 84855973748     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2011.2166545     Document Type: Article
Times cited : (234)

References (50)
  • 8
    • 70450232005 scopus 로고    scopus 로고
    • Biometric systems: Privacy and secrecy aspects
    • Dec.
    • T. Ignatenko and F. M. J. Willems, "Biometric systems: Privacy and secrecy aspects," IEEE Trans. Inf. Forensics Security, vol. 4, no. 4, pp. 956-973, Dec. 2009.
    • (2009) IEEE Trans. Inf. Forensics Security , vol.4 , Issue.4 , pp. 956-973
    • Ignatenko, T.1    Willems, F.M.J.2
  • 9
  • 11
    • 56749150770 scopus 로고    scopus 로고
    • Bio-cryptographic protocols with bipartite biotokens
    • Tampa, FL
    • W. Scheirer and T. Boult, "Bio-cryptographic protocols with bipartite biotokens," in Proc. Biometric Symp., Tampa, FL, 2008.
    • (2008) Proc. Biometric Symp.
    • Scheirer, W.1    Boult, T.2
  • 12
    • 37849009414 scopus 로고    scopus 로고
    • Hardening fingerprint fuzzy vault using password
    • Seoul, South Korea, Aug.
    • K. Nandakumar, A. Nagar, and A. K. Jain, "Hardening fingerprint fuzzy vault using password," in Proc. Second Int. Conf. Biometrics, Seoul, South Korea, Aug. 2007, pp. 927-937.
    • (2007) Proc. Second Int. Conf. Biometrics , pp. 927-937
    • Nandakumar, K.1    Nagar, A.2    Jain, A.K.3
  • 13
    • 0026065565 scopus 로고
    • Eigenfaces for recognition
    • M. Turk and A. Pentland, "Eigenfaces for recognition," J. Cognitive NeuroSci., vol. 3, no. 1, pp. 71-86, 1991.
    • (1991) J. Cognitive NeuroSci. , vol.3 , Issue.1 , pp. 71-86
    • Turk, M.1    Pentland, A.2
  • 15
    • 0002736715 scopus 로고    scopus 로고
    • Recognizing persons by their iris patterns
    • A. K. Jain, R. Bolle, and S. Pankanti, Eds. London, U.K.: Kluwer
    • J. Daugman, "Recognizing persons by their iris patterns," in Biometrics: Personal Identification in Networked Society, A. K. Jain, R. Bolle, and S. Pankanti, Eds. London, U.K.: Kluwer, 1999, pp. 103-122.
    • (1999) Biometrics: Personal Identification in Networked Society , pp. 103-122
    • Daugman, J.1
  • 16
    • 70450245646 scopus 로고    scopus 로고
    • Multibiometric cryptosystem: Model structure and performance analysis
    • Dec.
    • B. Fu, S. X. Yang, J. Li, and D. Hu, "Multibiometric cryptosystem: Model structure and performance analysis," IEEE Trans. Inf. Forensics Security, vol. 4, no. 4, pp. 867-882, Dec. 2009.
    • (2009) IEEE Trans. Inf. Forensics Security , vol.4 , Issue.4 , pp. 867-882
    • Fu, B.1    Yang, S.X.2    Li, J.3    Hu, D.4
  • 18
    • 27644521507 scopus 로고    scopus 로고
    • Automatic secure fingerprint verification system based on fuzzy vault scheme
    • Philadelphia, PA, Mar.
    • S.Yang and I.Verbauwhede, "Automatic secure fingerprint verification system based on fuzzy vault scheme," in Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, Philadelphia, PA, Mar. 2005, vol. 5, pp. 609-612.
    • (2005) Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing , vol.5 , pp. 609-612
    • Yang, S.1    Verbauwhede, I.2
  • 20
    • 33845514726 scopus 로고    scopus 로고
    • Protecting face biometric data on smartcard with Reed-Solomon code
    • New York, Jun.
    • Y. C. Feng and P. C. Yuen, "Protecting face biometric data on smartcard with Reed-Solomon code," in Proc. CVPR Workshop on Biometrics, New York, Jun. 2006.
    • (2006) Proc. CVPR Workshop on Biometrics
    • Feng, Y.C.1    Yuen, P.C.2
  • 21
    • 37849013877 scopus 로고    scopus 로고
    • Biometric key binding: Fuzzy vault based on iris images
    • Seoul, South Korea, Aug.
    • Y. J. Lee, K. Bae, S. J. Lee, K. R. Park, and J. Kim, "Biometric key binding: Fuzzy vault based on iris images," in Proc. Second Int. Conf. Biometrics, Seoul, South Korea, Aug. 2007, pp. 800-808.
    • (2007) Proc. Second Int. Conf. Biometrics , pp. 800-808
    • Lee, Y.J.1    Bae, K.2    Lee, S.J.3    Park, K.R.4    Kim, J.5
  • 25
    • 33747624401 scopus 로고    scopus 로고
    • Combining crypto with biometrics effectively
    • DOI 10.1109/TC.2006.138
    • F. Hao, R. Anderson, and J. Daugman, "Combining crypto with biometrics effectively," IEEE Trans. Comput., vol. 55, no. 9, pp. 1081-1088, Sep. 2006. (Pubitemid 44263808)
    • (2006) IEEE Transactions on Computers , vol.55 , Issue.9 , pp. 1081-1088
    • Hao, F.1    Anderson, R.2    Daugman, J.3
  • 26
    • 78149261619 scopus 로고    scopus 로고
    • Fuzzy commitment for function based signature template protection
    • Mar
    • E. Maiorana and P. Campisi, "Fuzzy commitment for function based signature template protection," IEEE Signal Process. Lett., vol. 17, no. 3, pp. 249-252, Mar. 2010.
    • (2010) IEEE Signal Process. Lett. , vol.17 , Issue.3 , pp. 249-252
    • Maiorana, E.1    Campisi, P.2
  • 27
    • 50249107013 scopus 로고    scopus 로고
    • Cracking fuzzy vaults and biometric encryption
    • Baltimore, MD, Sep.
    • W. J. Scheirer and T. E. Boult, "Cracking fuzzy vaults and biometric encryption," in Proc. Biometrics Symp., Baltimore, MD, Sep. 2007.
    • (2007) Proc. Biometrics Symp.
    • Scheirer, W.J.1    Boult, T.E.2
  • 28
    • 70350569787 scopus 로고    scopus 로고
    • Biometric keys: Suitable use cases and achievable information content
    • R. Plaga, "Biometric keys: Suitable use cases and achievable information content," Int. J. Inf. Security, vol. 8, pp. 447-454, 2009.
    • (2009) Int. J. Inf. Security , vol.8 , pp. 447-454
    • Plaga, R.1
  • 29
    • 35148846059 scopus 로고    scopus 로고
    • Secure biometric templates from fingerprint-face features
    • Minneapolis, MN, Jun.
    • Y. Sutcu, Q. Li, and N. Memon, "Secure biometric templates from fingerprint-face features," in Proc. CVPR Workshop Biometrics, Minneapolis, MN, Jun. 2007.
    • (2007) Proc. CVPR Workshop Biometrics
    • Sutcu, Y.1    Li, Q.2    Memon, N.3
  • 33
    • 0036581041 scopus 로고    scopus 로고
    • Methods for binary multidimensional scaling
    • D. Rhodes, "Methods for binary multidimensional scaling," Neural Computation, vol. 14, pp. 1195-1232, 2002.
    • (2002) Neural Computation , vol.14 , pp. 1195-1232
    • Rhodes, D.1
  • 34
    • 38749118638 scopus 로고    scopus 로고
    • Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions
    • DOI 10.1109/FOCS.2006.49, 4031381, 47th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2006
    • A. Andoni and P. Indyk, "Near-optimal hashing algorithms for approximate nearest neighbor in high dimensions," in IEEE Symp. Foundations Computer Science, 2006, pp. 459-468. (Pubitemid 351175534)
    • (2006) Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS , pp. 459-468
    • Andoni, A.1    Indyk, P.2
  • 36
    • 69949132178 scopus 로고    scopus 로고
    • Binary biometric representation through pairwise polar quantization
    • C. Chen and R. Veldhuis, "Binary biometric representation through pairwise polar quantization," in Proc. Int. Conf. Biometrics, 2009, pp. 72-81.
    • (2009) Proc. Int. Conf. Biometrics , pp. 72-81
    • Chen, C.1    Veldhuis, R.2
  • 41
    • 3543115398 scopus 로고    scopus 로고
    • Online. Available:
    • J. I. Hall, Notes on Coding Theory 2001 [Online]. Available: http://www.mth.msu.edu/~jhall/classes/codenotes/GRS.pdf
    • (2001) Notes on Coding Theory
    • Hall, J.I.1
  • 43
    • 67349227385 scopus 로고    scopus 로고
    • Robustness of multimodal biometric fusion methods against spoof attacks
    • R. N. Rodrigues, L. L. Ling, and V. Govindaraju, "Robustness of multimodal biometric fusion methods against spoof attacks," J. Vis. Lang. Comput., vol. 20, no. 3, pp. 169-179, 2009.
    • (2009) J. Vis. Lang. Comput. , vol.20 , Issue.3 , pp. 169-179
    • Rodrigues, R.N.1    Ling, L.L.2    Govindaraju, V.3
  • 46
    • 0036487317 scopus 로고    scopus 로고
    • The importance of being random: Statistical principles of iris recognition
    • J. Daugman, "The importance of being random: Statistical principles of iris recognition," Pattern Recognit., vol. 36, pp. 279-291, 2003.
    • (2003) Pattern Recognit. , vol.36 , pp. 279-291
    • Daugman, J.1
  • 49
    • 52949099082 scopus 로고    scopus 로고
    • Master's Thesis, Department of Computer Science and Electrical Engineering,West Virginia University,Morgantown, WV
    • S. Shah, "Enhanced Iris Recognition: Algorithms for Segmentation, Matching and Synthesis," Master's Thesis, Department of Computer Science and Electrical Engineering,West Virginia University,Morgantown, WV, 2006.
    • (2006) Enhanced Iris Recognition: Algorithms for Segmentation Matching and Synthesis
    • Shah, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.