메뉴 건너뛰기




Volumn 20, Issue 12, 2016, Pages 4907-4918

High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia

Author keywords

Biometric encryption; Fuzzy information; High dimension space projection quantization; Threshold (t, n)

Indexed keywords

BIOMETRICS; CRYPTOGRAPHY;

EID: 84991778564     PISSN: 14327643     EISSN: 14337479     Source Type: Journal    
DOI: 10.1007/s00500-015-1778-2     Document Type: Article
Times cited : (26)

References (33)
  • 1
    • 77952049139 scopus 로고    scopus 로고
    • Key generation in a voice based template free biometric security system. In: Biometric ID management and multimodal communication, Springer
    • Atah JA, Howells G (2009) Key generation in a voice based template free biometric security system. In: Biometric ID management and multimodal communication, Springer, pp 170–177
    • (2009) pp 170–177
    • Atah, J.A.1    Howells, G.2
  • 2
    • 33947506091 scopus 로고
    • Method for producing a digital signature with aid of a biometric feature
    • Bodo A (1994) Method for producing a digital signature with aid of a biometric feature. German Patent DE 42(43):908
    • (1994) German Patent DE , vol.42 , Issue.43 , pp. 908
    • Bodo, A.1
  • 5
    • 38149030200 scopus 로고    scopus 로고
    • Biometric encryption: a positive-sum technology that achieves strong authentication
    • Cavoukian A, Stoianov A (2007) Biometric encryption: a positive-sum technology that achieves strong authentication. Secur Priv, p 15
    • (2007) Secur Priv , pp. 15
    • Cavoukian, A.1    Stoianov, A.2
  • 6
    • 84865727735 scopus 로고    scopus 로고
    • Service-oriented architecture based on biometric using random features and incremental neural networks
    • Choi K, Toh KA, Uh Y, Byun H (2012) Service-oriented architecture based on biometric using random features and incremental neural networks. Soft Comput 16(9):1539–1553
    • (2012) Soft Comput , vol.16 , Issue.9 , pp. 1539-1553
    • Choi, K.1    Toh, K.A.2    Uh, Y.3    Byun, H.4
  • 7
    • 84937704662 scopus 로고    scopus 로고
    • Secure smartcardbased fingerprint authentication
    • ACM SIGMM workshop on biometrics methods and applications, ACM
    • Clancy TC, Kiyavash N, Lin DJ (2003) Secure smartcardbased fingerprint authentication. In: Proceedings of the 2003 ACM SIGMM workshop on biometrics methods and applications, ACM, pp 45–52
    • (2003) Proceedings of the , vol.2003 , pp. 45-52
    • Clancy, T.C.1    Kiyavash, N.2    Lin, D.J.3
  • 8
    • 84888842651 scopus 로고    scopus 로고
    • Interconnecting federated clouds by using publish-subscribe service
    • Esposito C, Ficco M, Palmieri F, Castiglione A (2013) Interconnecting federated clouds by using publish-subscribe service. Clust Comput 16(4):887–903
    • (2013) Clust Comput , vol.16 , Issue.4 , pp. 887-903
    • Esposito, C.1    Ficco, M.2    Palmieri, F.3    Castiglione, A.4
  • 10
    • 79960768737 scopus 로고    scopus 로고
    • Efficient cancelable biometric key generation scheme for cryptography
    • Gaddam SV, Lal M (2010) Efficient cancelable biometric key generation scheme for cryptography. IJ Netw Secur 11(2):61–69
    • (2010) IJ Netw Secur , vol.11 , Issue.2 , pp. 61-69
    • Gaddam, S.V.1    Lal, M.2
  • 11
    • 16244386253 scopus 로고    scopus 로고
    • Feasibility of generating biometric encryption keys
    • Hoque S, Fairhurst M, Howells G, Deravi F (2005) Feasibility of generating biometric encryption keys. Electron Lett 41(6):309–311
    • (2005) Electron Lett , vol.41 , Issue.6 , pp. 309-311
    • Hoque, S.1    Fairhurst, M.2    Howells, G.3    Deravi, F.4
  • 13
    • 84910124384 scopus 로고    scopus 로고
    • Secure biometric template generation for multi-factor authentication
    • Khan SH, Akbar MA, Shahzad F, Farooq M, Khan Z (2015) Secure biometric template generation for multi-factor authentication. Pattern Recognit 48(2):458–472
    • (2015) Pattern Recognit , vol.48 , Issue.2 , pp. 458-472
    • Khan, S.H.1    Akbar, M.A.2    Shahzad, F.3    Farooq, M.4    Khan, Z.5
  • 14
    • 77952878891 scopus 로고    scopus 로고
    • Privacy-preserving similarity evaluation and application to remote biometrics authentication
    • Kikuchi H, Nagai K, Ogata W, Nishigaki M (2010) Privacy-preserving similarity evaluation and application to remote biometrics authentication. Soft Comput 14(5):529–536
    • (2010) Soft Comput , vol.14 , Issue.5 , pp. 529-536
    • Kikuchi, H.1    Nagai, K.2    Ogata, W.3    Nishigaki, M.4
  • 15
    • 76549089793 scopus 로고    scopus 로고
    • Hidden attribute-based signatures without anonymity revocation
    • Li J, Kim K (2010) Hidden attribute-based signatures without anonymity revocation. Inf Sci 180(9):1681–1689
    • (2010) Inf Sci , vol.180 , Issue.9 , pp. 1681-1689
    • Li, J.1    Kim, K.2
  • 16
    • 77953308681 scopus 로고    scopus 로고
    • Fuzzy keyword search over encrypted data in cloud computing
    • Proceedings IEEE, IEEE
    • Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010a) Fuzzy keyword search over encrypted data in cloud computing. In: INFOCOM, 2010 Proceedings IEEE, IEEE, pp 1–5
    • (2010) INFOCOM , vol.2010 , pp. 1-5
    • Li, J.1    Wang, Q.2    Wang, C.3    Cao, N.4    Ren, K.5    Lou, W.6
  • 17
    • 80053563168 scopus 로고    scopus 로고
    • Enhancing attribute-based encryption with attribute hierarchy
    • Li J, Wang Q, Wang C, Ren K (2011) Enhancing attribute-based encryption with attribute hierarchy. Mob Netw Appl 16(5):553–561
    • (2011) Mob Netw Appl , vol.16 , Issue.5 , pp. 553-561
    • Li, J.1    Wang, Q.2    Wang, C.3    Ren, K.4
  • 18
    • 84894634556 scopus 로고    scopus 로고
    • Securely outsourcing attribute-based encryption with checkability
    • Li J, Huang X, Li J, Chen X, Xiang Y (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210
    • (2014) IEEE Trans Parallel Distrib Syst , vol.25 , Issue.8 , pp. 2201-2210
    • Li, J.1    Huang, X.2    Li, J.3    Chen, X.4    Xiang, Y.5
  • 19
    • 77951206096 scopus 로고    scopus 로고
    • An alignment-free fingerprint cryptosystem based on fuzzy vault scheme
    • Li P, Yang X, Cao K, Tao X, Wang R, Tian J (2010b) An alignment-free fingerprint cryptosystem based on fuzzy vault scheme. J Netw Comput Appl 33(3):207–220
    • (2010) J Netw Comput Appl , vol.33 , Issue.3 , pp. 207-220
    • Li, P.1    Yang, X.2    Cao, K.3    Tao, X.4    Wang, R.5    Tian, J.6
  • 20
    • 84862815756 scopus 로고    scopus 로고
    • An effective biometric cryptosystem combining fingerprints with error correction codes
    • Li P, Yang X, Qiao H, Cao K, Liu E, Tian J (2012) An effective biometric cryptosystem combining fingerprints with error correction codes. Expert Syst Appl 39(7):6562–6574
    • (2012) Expert Syst Appl , vol.39 , Issue.7 , pp. 6562-6574
    • Li, P.1    Yang, X.2    Qiao, H.3    Cao, K.4    Liu, E.5    Tian, J.6
  • 21
    • 84855909777 scopus 로고    scopus 로고
    • An efficient dynamic reliability-dependent bit allocation for biometric discretization
    • Lim MH, Teoh ABJ, Toh KA (2012) An efficient dynamic reliability-dependent bit allocation for biometric discretization. Pattern Recognit 45(5):1960–1971
    • (2012) Pattern Recognit , vol.45 , Issue.5 , pp. 1960-1971
    • Lim, M.H.1    Teoh, A.B.J.2    Toh, K.A.3
  • 22
    • 77951867410 scopus 로고    scopus 로고
    • Alignment and bit extraction for secure fingerprint biometrics. In: IS&T/SPIE electronic imaging, international society for optics and photonics
    • Nagar A, Rane S, Vetro A (2010) Alignment and bit extraction for secure fingerprint biometrics. In: IS&T/SPIE electronic imaging, international society for optics and photonics, pp 75,410N–75,410N
    • (2010) pp 75,410N–75,410N
    • Nagar, A.1    Rane, S.2    Vetro, A.3
  • 23
  • 24
    • 84879085385 scopus 로고    scopus 로고
    • A survey on biometric cryptosystems and cancelable biometrics
    • Rathgeb C, Uhl A (2011) A survey on biometric cryptosystems and cancelable biometrics. EURASIP J Inf Secur 1:1–25
    • (2011) EURASIP J Inf Secur , vol.1 , pp. 1-25
    • Rathgeb, C.1    Uhl, A.2
  • 25
    • 84893178035 scopus 로고    scopus 로고
    • Iris-biometric fuzzy commitment schemes under image compression. In: Progress in pattern recognition, image analysis, computer vision, and applications, Springer
    • Rathgeb C, Uhl A, Wild P (2013) Iris-biometric fuzzy commitment schemes under image compression. In: Progress in pattern recognition, image analysis, computer vision, and applications, Springer, pp 374–381
    • (2013) pp 374–381
    • Rathgeb, C.1    Uhl, A.2    Wild, P.3
  • 26
    • 84991804229 scopus 로고    scopus 로고
    • Cracking fuzzy vaults and biometric encryption. In: Biometrics symposium, 2007, IEEE
    • Scheirer WJ, Boult TE (2007) Cracking fuzzy vaults and biometric encryption. In: Biometrics symposium, 2007, IEEE, pp 1–6
    • (2007) pp 1–6
    • Scheirer, W.J.1    Boult, T.E.2
  • 27
    • 44049084315 scopus 로고    scopus 로고
    • Template-free biometric-key generation by means of fuzzy genetic clustering
    • Sheng W, Howells G, Fairhurst M, Deravi F (2008) Template-free biometric-key generation by means of fuzzy genetic clustering. IEEE Trans Inf Forensics Secur 3(2):183–191
    • (2008) IEEE Trans Inf Forensics Secur , vol.3 , Issue.2 , pp. 183-191
    • Sheng, W.1    Howells, G.2    Fairhurst, M.3    Deravi, F.4
  • 28
    • 51849094958 scopus 로고    scopus 로고
    • Sutcu Y, Rane S, Yedidia JS, Draper SC, Vetro A (2008) Feature transformation of biometric templates for secure biometric systems based on error correcting codes. In: Computer vision and pattern recognition workshops, 2008. CVPRW’08. IEEE on computer society conference, IEEE, pp 1–6
    • Sutcu Y, Rane S, Yedidia JS, Draper SC, Vetro A (2008) Feature transformation of biometric templates for secure biometric systems based on error correcting codes. In: Computer vision and pattern recognition workshops, 2008. CVPRW’08. IEEE on computer society conference, IEEE, pp 1–6
  • 30
    • 26444525625 scopus 로고    scopus 로고
    • Fuzzy vault for fingerprints. In: Audio-and video-based biometric person authentication, Springer
    • Uludag U, Pankanti S, Jain AK (2005) Fuzzy vault for fingerprints. In: Audio-and video-based biometric person authentication, Springer, pp 310–319
    • (2005) pp 310–319
    • Uludag, U.1    Pankanti, S.2    Jain, A.K.3
  • 31
    • 84947071237 scopus 로고    scopus 로고
    • A new proxy re-encryption scheme for protecting critical information systems
    • Wang XA, Ma J, Yang X (2015) A new proxy re-encryption scheme for protecting critical information systems. J Ambient Intell Humaniz Comput pp 1–13. doi:10.1007/s12652-015-0261-3
    • (2015) J Ambient Intell Humaniz Comput , pp. 1-13
    • Wang, X.A.1    Ma, J.2    Yang, X.3
  • 32
    • 80053099833 scopus 로고    scopus 로고
    • Improved cancelable fingerprint fuzzy vault system
    • Zhang R, Liu E, Zhao H, Pang L (2011) Improved cancelable fingerprint fuzzy vault system. J Xidian Univ 38(4):173–180
    • (2011) J Xidian Univ , vol.38 , Issue.4 , pp. 173-180
    • Zhang, R.1    Liu, E.2    Zhao, H.3    Pang, L.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.