메뉴 건너뛰기




Volumn 63, Issue 4, 2014, Pages 902-916

Design and analysis of a highly user-friendly, secure, privacy-preserving, and revocable authentication method

Author keywords

Authentication; BioCapsule (BC); biometric cryptosystem (BCS); cancelable biometrics (CB); privacy preserving; secure fusion

Indexed keywords

BIOMETRICS; CRYPTOGRAPHY;

EID: 84897140054     PISSN: 00189340     EISSN: None     Source Type: Journal    
DOI: 10.1109/TC.2013.25     Document Type: Article
Times cited : (29)

References (69)
  • 1
    • 85006528157 scopus 로고    scopus 로고
    • http://en.wikipedia.org/wiki/Usability, 2013.
    • (2013)
  • 2
    • 85006516467 scopus 로고    scopus 로고
    • http://iris.nist/gov/ice/, 2013.
    • (2013)
  • 3
    • 34547965365 scopus 로고    scopus 로고
    • A new biometrie technology based on mouse dynamics
    • DOI 10.1109/TDSC.2007.70207
    • A. Ahmed and I. Traore, "A New Biometric Technology Based on Mouse Dynamics, " IEEE Trans. Dependable and Secure Computing, vol. 4, no. 3, pp. 165-179, July/Sept. 2007. (Pubitemid 47274809)
    • (2007) IEEE Transactions on Dependable and Secure Computing , vol.4 , Issue.3 , pp. 165-179
    • Ahmed, A.A.E.1    Traore, I.2
  • 4
    • 33750799305 scopus 로고    scopus 로고
    • Robust distance measures for face-recognition supporting revocable biometric tokens
    • Apr.
    • T. Boult, "Robust Distance Measures for Face-Recognition Supporting Revocable Biometric Tokens, " Proc. Seventh Int'l Conf. Automatic Face and Gesture Recognition, pp. 560-566, Apr. 2006.
    • (2006) Proc. Seventh Int'l Conf. Automatic Face and Gesture Recognition , pp. 560-566
    • Boult, T.1
  • 11
    • 84897125375 scopus 로고    scopus 로고
    • CASIA-IrisV1
    • CASIA-IrisV1. http://biometrics.idealtest.org/, 2013.
    • (2013)
  • 16
    • 33645837429 scopus 로고    scopus 로고
    • High security iris verification system based on random secret integration
    • May
    • C. Chin, A. Jin, and D. Ling, "High Security Iris Verification System Based on Random Secret Integration, " Computer Vision and Image Understanding, vol. 102, no. 2, pp. 169-177, May 2006.
    • (2006) Computer Vision and Image Understanding , vol.102 , Issue.2 , pp. 169-177
    • Chin, C.1    Jin, A.2    Ling, D.3
  • 19
    • 79957590172 scopus 로고    scopus 로고
    • On ultralightweight rfid authentication protocols
    • July/Aug.
    • P. D'Arco and A. De Santis, "On Ultralightweight RFID Authentication Protocols, " IEEE Trans. Dependable and Secure Computing, vol. 8, no. 4, pp. 548-563, July/Aug. 2011.
    • (2011) IEEE Trans. Dependable and Secure Computing , vol.8 , Issue.4 , pp. 548-563
    • D'Arco, P.1    De Santis, A.2
  • 21
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data, " Proc. Advances in Cryptology (Eurocrypt), vol. 3027, pp. 523-540, 2004.
    • (2004) Proc. Advances in Cryptology (Eurocrypt) , vol.3027 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 22
    • 33748591067 scopus 로고    scopus 로고
    • Use of one-dimensional iris signatures to rank iris pattern similarities
    • Y. Du, R. Ives, D. Etter, and T. Welch, "Use of One-Dimensional Iris Signatures to Rank Iris Pattern Similarities, " Optical Eng., vol. 45, no. 3, 2006.
    • (2006) Optical Eng. , vol.45 , Issue.3
    • Du, Y.1    Ives, R.2    Etter, D.3    Welch, T.4
  • 23
    • 84858182438 scopus 로고    scopus 로고
    • Rational security: Modelling everyday password use
    • G. Duggan, H. Johnson, and B. Grawemeyer, "Rational Security: Modelling Everyday Password Use, " Int'l J. Human-Computer Studies, vol. 70, no. 6, pp. 415-431, 2012.
    • (2012) Int'l J. Human-Computer Studies , vol.70 , Issue.6 , pp. 415-431
    • Duggan, G.1    Johnson, H.2    Grawemeyer, B.3
  • 27
    • 33747624401 scopus 로고    scopus 로고
    • Combining crypto with biometrics effectively
    • DOI 10.1109/TC.2006.138
    • F. Hao, R. Anderson, and J. Daugman, "Combining Crypto with Biometrics Effectively, " IEEE Trans. Computers, vol. 55, no. 9, pp. 1081-1088, Sept. 2006. (Pubitemid 44263808)
    • (2006) IEEE Transactions on Computers , vol.55 , Issue.9 , pp. 1081-1088
    • Hao, F.1    Anderson, R.2    Daugman, J.3
  • 31
    • 12344259813 scopus 로고    scopus 로고
    • Biohashing: Two factor authentication featuring fingerprint data and tokenised random number
    • DOI 10.1016/j.patcog.2004.04.011, PII S0031320304001876
    • A. Jin, D Ling, and A. Goh, "Biohashing: Two Factor Authentication Featuring Fingerprint Data and Tokenized Random Number, " Elsevier Pattern Recognition, vol. 37, pp. 2245-2255, 2004. (Pubitemid 40134555)
    • (2004) Pattern Recognition , vol.37 , Issue.11 , pp. 2245-2255
    • Jin, A.T.B.1    Ling, D.N.C.2    Goh, A.3
  • 32
    • 30844458593 scopus 로고    scopus 로고
    • A fuzzy vault scheme
    • DOI 10.1007/s10623-005-6343-z
    • A. Juels and M. Sudan, "A Fuzzy Vault Scheme, " Designs, Codes and Cryptography, vol. 38, pp. 237-257, 2006. (Pubitemid 43102559)
    • (2006) Designs, Codes, and Cryptography , vol.38 , Issue.2 , pp. 237-257
    • Juels, A.1    Sudan, M.2
  • 34
    • 81355153773 scopus 로고    scopus 로고
    • Depth of capture volume extension by constrained least square-based image restoration, quantitative evaluation
    • H. Jung, K. Park, and J. Kim, "Depth of Capture Volume Extension by Constrained Least Square-Based Image Restoration, Quantitative Evaluation, " Optical Engineering, vol. 49, no. 4, pp. 047004-047004-13, 2010.
    • (2010) Optical Engineering , vol.49 , Issue.4 , pp. 047004-04700413
    • Jung, H.1    Park, K.2    Kim, J.3
  • 38
    • 33646095185 scopus 로고    scopus 로고
    • An analysis of biohashing and its variants
    • July
    • A. Kong, K. Cheung, D. Zhang, M. Kamel, and J. You, "An Analysis of Biohashing and Its Variants, " Pattern Recognition, vol. 39, no. 7, pp. 1359-1368, July 2006.
    • (2006) Pattern Recognition , vol.39 , Issue.7 , pp. 1359-1368
    • Kong, A.1    Cheung, K.2    Zhang, D.3    Kamel, M.4    You, J.5
  • 40
    • 77249172684 scopus 로고    scopus 로고
    • Requiring strong credentials: What's taking so long?
    • Jan./Feb.
    • H.G. Miller and J.L. Fisher, "Requiring Strong Credentials: What's Taking So Long?" IT Professional, vol. 12, no. 1, pp. 57-60, Jan./Feb. 2010.
    • (2010) IT Professional , vol.12 , Issue.1 , pp. 57-60
    • Miller, H.G.1    Fisher, J.L.2
  • 42
    • 77950367675 scopus 로고    scopus 로고
    • A hybrid biometric cryptosystem for securing fingerprint minutiae templates
    • June
    • A. Nagar, K. Nandakumar, and A. Jain, "A Hybrid Biometric Cryptosystem for Securing Fingerprint Minutiae Templates, " Pattern Recognition Letters, vol. 31, no. 8, pp. 733-741, June 2010.
    • (2010) Pattern Recognition Letters , vol.31 , Issue.8 , pp. 733-741
    • Nagar, A.1    Nandakumar, K.2    Jain, A.3
  • 45
    • 77956055373 scopus 로고    scopus 로고
    • BioEncoding: A reliable tokenless cancelable biometrics scheme for protecting iriscodes
    • July
    • O. Ouda, N. Tsumura, and T. Nakaguchi, "BioEncoding: A Reliable Tokenless Cancelable Biometrics Scheme for Protecting Iriscodes, " IEICE Trans. Information and Systems, vol. E93-D, no. 7, pp. 1878-1888, July 2010.
    • (2010) IEICE Trans. Information and Systems, Vol. E93-D , Issue.7 , pp. 1878-1888
    • Ouda, O.1    Tsumura, N.2    Nakaguchi, T.3
  • 47
    • 67549085131 scopus 로고    scopus 로고
    • The iris challenge evaluation 2005
    • IEEE Int'l Conf. Biometrics: Theory, Applications and Systems (BTAS '08) Oct.
    • P. Phillips, K. Bowyer, P. Flynn, X. Liu, and W. Scruggs, "The Iris Challenge Evaluation 2005, " Proc. Second IEEE Int'l Conf. Biometrics: Theory, Applications and Systems (BTAS '08), pp. 1-8, Oct. 2008.
    • (2008) Proc. Second , pp. 1-8
    • Phillips, P.1    Bowyer, K.2    Flynn, P.3    Liu, X.4    Scruggs, W.5
  • 48
    • 80054910703 scopus 로고    scopus 로고
    • Secure and robust iris recognition using random projections and sparse representations
    • Sept.
    • J. Pillai, V. Patel, R. Chellappa, and N. Ratha, "Secure and Robust Iris Recognition Using Random Projections and Sparse Representations, " IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 33, no. 9, pp. 1877-1893, Sept. 2011.
    • (2011) IEEE Trans. Pattern Analysis and Machine Intelligence , vol.33 , Issue.9 , pp. 1877-1893
    • Pillai, J.1    Patel, V.2    Chellappa, R.3    Ratha, N.4
  • 50
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometrics-based authentication systems
    • N. Ratha, J. Connell, and R. Bolle, "Enhancing Security and Privacy in Biometrics-Based Authentication Systems, " IBM Systems J., vol. 40, pp. 614-634, 2001. (Pubitemid 32933421)
    • (2001) IBM Systems Journal , vol.40 , Issue.3 , pp. 614-634
    • Ratha, N.K.1    Connell, J.H.2    Bolle, R.M.3
  • 55
    • 84879085385 scopus 로고    scopus 로고
    • A survey on biometric cryptosystems and cancelable biometrics
    • C. Rathgeb and A. Uhl, "A Survey on Biometric Cryptosystems and Cancelable Biometrics, " EURASIP J. Information Security, vol. 2011, no. 3, pp. 1-25, 2011.
    • (2011) EURASIP J. Information Security , vol.2011 , Issue.3 , pp. 1-25
    • Rathgeb, C.1    Uhl, A.2
  • 58
    • 33947492044 scopus 로고    scopus 로고
    • From template to image: Reconstructing fingerprints from minutiae points
    • DOI 10.1109/TPAMI.2007.1018, Special issue on Biometrics: Progress and Directions
    • A. Ross, J. Shah, and A. Jain, "From Template to Image: Reconstructing Fingerprints from Minutiae Points, " IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 544-560, Apr. 2007. (Pubitemid 46464396)
    • (2007) IEEE Transactions on Pattern Analysis and Machine Intelligence , vol.29 , Issue.4 , pp. 544-560
    • Ross, A.1    Shah, J.2    Jain, A.K.3
  • 59
    • 50249107013 scopus 로고    scopus 로고
    • Cracking fuzzy vaults and biometric encryption
    • Sept.
    • W. Scheirer and T. Boult, "Cracking Fuzzy Vaults and Biometric Encryption, " Proc. Biometrics Symp., pp. 1-6, Sept. 2007.
    • (2007) Proc. Biometrics Symp. , pp. 1-6
    • Scheirer, W.1    Boult, T.2
  • 63
    • 10044222391 scopus 로고    scopus 로고
    • Biometric cryptosystems: Issues and challenges
    • June
    • U. Uludag, S. Pankanti, S. Prabhakar, and A. Jain, "Biometric Cryptosystems: Issues and Challenges, " Proc. IEEE, vol. 92, no. 6, pp. 948-960, June 2004.
    • (2004) Proc. IEEE , vol.92 , Issue.6 , pp. 948-960
    • Uludag, U.1    Pankanti, S.2    Prabhakar, S.3    Jain, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.