메뉴 건너뛰기




Volumn 32, Issue 5, 2015, Pages 54-65

Cancelable biometrics: A review

Author keywords

[No Author keywords available]

Indexed keywords

SIGNAL PROCESSING;

EID: 85032751972     PISSN: 10535888     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2015.2434151     Document Type: Review
Times cited : (371)

References (66)
  • 1
    • 78650336968 scopus 로고    scopus 로고
    • Privacy protection in high security biometrics applications
    • A. Kumar and D. Zhang, Eds. Berlin, Germany: Springer
    • N. K. Ratha, "Privacy protection in high security biometrics applications," in Ethics and Policy of Biometrics, (Lecture Notes in Computer Science, vol. 6005), A. Kumar and D. Zhang, Eds. Berlin, Germany: Springer, 2010, pp. 62-69.
    • (2010) Ethics and Policy of Biometrics, (Lecture Notes in Computer Science( 6005) , pp. 62-69
    • Ratha, N.K.1
  • 2
    • 0031651014 scopus 로고    scopus 로고
    • On enabling secure applications through off-line biometric identification
    • G. I. Davida, Y. Frankel, and B. J. Matt, "On enabling secure applications through off-line biometric identification," in IEEE Symp. Security and Privacy, May 1998, pp. 148-157.
    • (1998) Symp. Security and Privacy, May , pp. 148-157
    • Davida, G.I.1    Frankel, Y.2    Matt, B.J.3
  • 3
    • 0034809453 scopus 로고    scopus 로고
    • Enhancing security and privacy in biometrics- based authentication systems
    • N. K. Ratha, J. H. Connel, and R. Bolle, "Enhancing security and privacy in biometrics- based authentication systems," IBM Syst. J., vol. 40, no. 3, pp. 614-634, 2001.
    • (2001) IBM Syst. J. , vol.40 , Issue.3 , pp. 614-634
    • Ratha, N.K.1    Connel, J.H.2    Bolle, R.3
  • 5
    • 0036887662 scopus 로고    scopus 로고
    • Biometrics perils and patches
    • R. M. Bolle, J. H. Connel, and N. K. Ratha, "Biometrics perils and patches," Pattern Recogn., vol. 35, no. 12, pp. 2727-2738, 2002.
    • (2002) Pattern Recogn. , vol.35 , Issue.12 , pp. 2727-2738
    • Bolle, R.M.1    Connel, J.H.2    Ratha, N.K.3
  • 6
    • 30844458593 scopus 로고    scopus 로고
    • A fuzzy vault scheme
    • Feb.
    • A. Juels and M. Sudan, "A fuzzy vault scheme," Designs, Codes Cryptogr., vol. 38, no. 2, pp. 237-257, Feb. 2006.
    • (2006) Designs, Codes Cryptogr. , vol.38 , Issue.2 , pp. 237-257
    • Juels, A.1    Sudan, M.2
  • 7
    • 34548074162 scopus 로고    scopus 로고
    • Protecting biometric templates with sketch: Theory and practice
    • Sept.
    • Y. Sutcu, Q. Li, and N. Memon, "Protecting biometric templates with sketch: Theory and practice," IEEE Trans. Inform. Forensics Security, vol. 2, no. 3, pp. 503-512, Sept. 2007.
    • (2007) IEEE Trans. Inform. Forensics Security , vol.2 , Issue.3 , pp. 503-512
    • Sutcu, Y.1    Li, Q.2    Memon, N.3
  • 9
    • 33947177191 scopus 로고    scopus 로고
    • Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs
    • Dec.
    • A. Teoh, A. Goh, and D. Ngo, "Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs," IEEE Trans. Pattern Anal. Mach. Intell., vol. 28, no. 12, pp. 1892-1901, Dec. 2006.
    • (2006) IEEE Trans. Pattern Anal. Mach. Intell. , vol.28 , Issue.12 , pp. 1892-1901
    • Teoh, A.1    Goh, A.2    Ngo, D.3
  • 10
    • 10044222391 scopus 로고    scopus 로고
    • Biometric cryptosystems: Issues and challenges
    • June
    • U. Uludag, S. Pankanti, S. Prabhakar, and A. Jain, "Biometric cryptosystems: issues and challenges," Proc. IEEE, vol. 92, no. 6, pp. 948-960, June 2004.
    • (2004) Proc. IEEE , vol.92 , Issue.6 , pp. 948-960
    • Uludag, U.1    Pankanti, S.2    Prabhakar, S.3    Jain, A.4
  • 13
    • 35048865463 scopus 로고    scopus 로고
    • Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    • Berlin, Germany: Springer
    • Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy extractors: How to generate strong keys from biometrics and other noisy data," in Advances in Cryptology-Eurocrypt 2004. Berlin, Germany: Springer, 2004, pp. 523-540.
    • (2004) Advances in Cryptology-Eurocrypt , vol.2004 , pp. 523-540
    • Dodis, Y.1    Reyzin, L.2    Smith, A.3
  • 14
    • 84879085385 scopus 로고    scopus 로고
    • A survey on biometric cryptosystems and cancelable biometrics
    • C. Rathgeb and A. Uhl, "A survey on biometric cryptosystems and cancelable biometrics," EURASIP J. Inform. Security, vol. 2011, no. 3, pp. 1-25, 2011.
    • (2011) EURASIP J. Inform. Security , vol.2011 , Issue.3 , pp. 1-25
    • Rathgeb, C.1    Uhl, A.2
  • 16
    • 70350406514 scopus 로고    scopus 로고
    • Cancelable iris biometrics using block re-mapping and image warping
    • P. Samarati, M. Yung, F. Martinelli, and C. Ardagna, Eds. Berlin, Germany: Springer
    • J. Hmmerle-Uhl, E. Pschernig, and A. Uhl, "Cancelable iris biometrics using block re-mapping and image warping," in Information Security (Lecture Notes in Computer Science, vol. 5735), P. Samarati, M. Yung, F. Martinelli, and C. Ardagna, Eds. Berlin, Germany: Springer, 2009, pp. 135-142.
    • (2009) Information Security (Lecture Notes in Computer Science, 5735) , pp. 135-142
    • Hmmerle-Uhl, J.1    Pschernig, E.2    Uhl, A.3
  • 18
    • 80054910703 scopus 로고    scopus 로고
    • Secure and robust iris recognition using random projections and sparse representations
    • Sept.
    • J. K. Pillai, V. M. Patel, R. Chellappa, and N. K. Ratha, "Secure and robust iris recognition using random projections and sparse representations," IEEE Trans. Pattern Anal. Mach. Intell., vol. 30, no. 9, pp. 1877-1893, Sept. 2011.
    • (2011) IEEE Trans. Pattern Anal. Mach. Intell. , vol.30 , Issue.9 , pp. 1877-1893
    • Pillai, J.K.1    Patel, V.M.2    Chellappa, R.3    Ratha, N.K.4
  • 20
    • 0037236821 scopus 로고    scopus 로고
    • An elementary proof of a theorem of Johnson and Lindenstrauss
    • Jan.
    • S. Dasgupta and A. Gupta, "An elementary proof of a theorem of Johnson and Lindenstrauss," Random Struct. Algorithms, vol. 22, no. 1, pp. 60-65, Jan. 2003.
    • (2003) Random Struct. Algorithms , vol.22 , Issue.1 , pp. 60-65
    • Dasgupta, S.1    Gupta, A.2
  • 21
    • 0038166193 scopus 로고    scopus 로고
    • Database-friendly
    • random projections: Johnson-Lindenstrauss with binary coins June
    • D. Achlioptas, "Database-friendly random projections: Johnson-Lindenstrauss with binary coins," J. Comput. Syst. Sci., vol. 66, no. 4, pp. 671-687, June 2003.
    • (2003) J. Comput. Syst. Sci. , vol.66 , Issue.4 , pp. 671-687
    • Achlioptas, D.1
  • 24
    • 78650944179 scopus 로고    scopus 로고
    • Cancelable biometrics with provable security and its application to fingerprint verification
    • K. Takahashi and S. Hirata, "Cancelable biometrics with provable security and its application to fingerprint verification," IEICE Trans. Fundam. Electron. Commun. Comput. Sci., vol. 94-A, no. 1, pp. 233-244, 2011.
    • (2011) IEICE Trans. Fundam. Electron. Commun. Comput. Sci. , vol.94-A , Issue.1 , pp. 233-244
    • Takahashi, K.1    Hirata, S.2
  • 25
    • 69949139028 scopus 로고    scopus 로고
    • Cancelable biometrics with perfect secrecy for correlation-based matching
    • M. Tistarelli and M. Nixon, Eds. Berlin, Germany: Springer
    • S. Hirata and K. Takahashi, " Cancelable biometrics with perfect secrecy for correlation-based matching," in Advances in Biometrics (Lecture Notes in Computer Science, vol. 5558), M. Tistarelli and M. Nixon, Eds. Berlin, Germany: Springer, 2009, pp. 868-878.
    • (2009) Advances in Biometrics (Lecture Notes in Computer Science 5558) , pp. 868-878
    • Hirata, S.1    Takahashi, K.2
  • 26
    • 77951209095 scopus 로고    scopus 로고
    • Cancelable templates for sequence-based biometrics with application to on-line signature recognition
    • May
    • E. Maiorana, P. Campisi, J. Fierrez, J. Ortega-Garcia, and A. Neri, "Cancelable templates for sequence-based biometrics with application to on-line signature recognition," IEEE Trans. Syst., Man Cybern. A, vol. 40, no. 3, pp. 525-538, May 2010.
    • (2010) IEEE Trans. Syst., Man Cybern. A , vol.40 , Issue.3 , pp. 525-538
    • Maiorana, E.1    Campisi, P.2    Fierrez, J.3    Ortega-Garcia, J.4    Neri, A.5
  • 27
    • 84910672204 scopus 로고    scopus 로고
    • On the application of bloom filters to iris biometrics
    • C. Rathgeb, F. Breitinger, C. Busch, and H. Baier, "On the application of bloom filters to iris biometrics," IET J. Biometrics, vol. 3, no. 4, pp. 207-218, 2014.
    • (2014) IET J. Biometrics , vol.3 , Issue.4 , pp. 207-218
    • Rathgeb, C.1    Breitinger, F.2    Busch, C.3    Baier, H.4
  • 28
    • 84893172355 scopus 로고    scopus 로고
    • Cancelable multi-biometrics: Mixing iris-codes based on adaptive bloom filters
    • C. Rathgeb and C. Busch, "Cancelable multi-biometrics: Mixing iris-codes based on adaptive bloom filters," Comput. Security, vol. 42, pp. 1-12, 2014.
    • (2014) Comput. Security , vol.42 , pp. 1-12
    • Rathgeb, C.1    Busch, C.2
  • 29
    • 84887501178 scopus 로고    scopus 로고
    • Alignment-free cancelable iris biometric templates based on adaptive bloom filters
    • June
    • C. Rathgeb, F. Breitinger, and C. Busch, "Alignment-free cancelable iris biometric templates based on adaptive bloom filters," in Proc. IAPR Int. Conf. Biometrics, June 2013, pp. 1-8.
    • (2013) Proc. IAPR Int. Conf. Biometrics , pp. 1-8
    • Rathgeb, C.1    Breitinger, F.2    Busch, C.3
  • 32
    • 35148885090 scopus 로고    scopus 로고
    • Cancelable biometrics realization with multispace
    • random projections
    • A. B. J. Teoh and C. T. Yuang, "Cancelable biometrics realization with multispace random projections," IEEE Trans. Syst., Man, Cybern. B, vol. 37, no. 5, pp. 1096-1106, 2007.
    • (2007) IEEE Trans. Syst., Man, Cybern. B , vol.37 , Issue.5 , pp. 1096-1106
    • Teoh, A.B.J.1    Yuang, C.T.2
  • 33
    • 38949203738 scopus 로고    scopus 로고
    • Cancellable biometrics and annotations on biohash
    • A. B. Teoh, Y. W. Kuan, and S. Lee, "Cancellable biometrics and annotations on biohash," Pattern Recogn., vol. 41, no. 6, pp. 2034-2044, 2008.
    • (2008) Pattern Recogn. , vol.41 , Issue.6 , pp. 2034-2044
    • Teoh, A.B.1    Kuan, Y.W.2    Lee, S.3
  • 34
    • 9944223229 scopus 로고    scopus 로고
    • Palmhashing: A novel approach for cancelable biometrics
    • T. Connie, A. Teoh, M. Goh, and D. Ngo, "Palmhashing: a novel approach for cancelable biometrics," Inform. Process. Lett., vol. 93, no. 1, pp. 1-5, 2005.
    • (2005) Inform. Process. Lett. , vol.93 , Issue.1 , pp. 1-5
    • Connie, T.1    Teoh, A.2    Goh, M.3    Ngo, D.4
  • 35
    • 12344259813 scopus 로고    scopus 로고
    • Biohashing: Two factor authentication featuring fingerprint data and tokenised
    • random number
    • A. Teoh, D. N. C. Ling, and A. Goh, "Biohashing: Two factor authentication featuring fingerprint data and tokenised random number," Pattern Recogn., vol. 37, no. 11, pp. 2245-2255, 2004.
    • (2004) Pattern Recogn. , vol.37 , Issue.11 , pp. 2245-2255
    • Teoh, A.1    Ling, D.N.C.2    Goh, A.3
  • 36
    • 33646095185 scopus 로고    scopus 로고
    • An analysis of biohashing and its variants
    • A. Kong, K.-H. Cheung, D. Zhang, M. Kamel, and J. You, "An analysis of biohashing and its variants," Pattern Recogn., vol. 39, no. 7, pp. 1359-1368, 2006.
    • (2006) Pattern Recogn. , vol.39 , Issue.7 , pp. 1359-1368
    • Kong, A.1    Cheung, K.-H.2    Zhang, D.3    Kamel, M.4    You, J.5
  • 37
    • 84875104858 scopus 로고    scopus 로고
    • Palmhash code vs. Palmphasor code
    • L. Leng and J. Zhang, "Palmhash code vs. palmphasor code," Neurocomputing, vol. 108, pp. 1-12, 2013.
    • (2013) Neurocomputing , vol.108 , pp. 1-12
    • Leng, L.1    Zhang, J.2
  • 38
    • 84894088356 scopus 로고    scopus 로고
    • Analysis of correlation of 2dPalmHash code and orientation range suitable for transposition
    • L. Leng, A. B. J. Teoh, M. Li, and M. K. Khan, "Analysis of correlation of 2dPalmHash code and orientation range suitable for transposition," Neurocomputing, vol. 131, pp. 377-387, 2014.
    • (2014) Neurocomputing , vol.131 , pp. 377-387
    • Leng, L.1    Teoh, A.B.J.2    Li, M.3    Khan, M.K.4
  • 41
    • 33750799305 scopus 로고    scopus 로고
    • Robust distance measures for face-recognition supporting revocable biometric tokens
    • Apr.
    • T. Boult, "Robust distance measures for face-recognition supporting revocable biometric tokens," in Proc. Int. Conf. Automatic Face and Gesture Recognition, Apr. 2006, pp. 560-566.
    • (2006) Proc. Int. Conf. Automatic Face and Gesture Recognition , pp. 560-566
    • Boult, T.1
  • 44
    • 84861649329 scopus 로고    scopus 로고
    • A robust alignment-free fingerprint hashing algorithm based on minimum distance graphs
    • P. Das, K. Karthik, and B. C. Garai, "A robust alignment-free fingerprint hashing algorithm based on minimum distance graphs," Pattern Recogn., vol. 45, no. 9, pp. 3373-3388, 2012.
    • (2012) Pattern Recogn. , vol.45 , Issue.9 , pp. 3373-3388
    • Das, P.1    Karthik, K.2    Garai, B.C.3
  • 45
    • 84888320881 scopus 로고    scopus 로고
    • Design of alignment-free cancelable fingerprint templates via curtailed circular convolution
    • S. Wang and J. Hu, "Design of alignment-free cancelable fingerprint templates via curtailed circular convolution," Pattern Recogn., vol. 47, no. 3, pp. 1321-1329, 2014.
    • (2014) Pattern Recogn. , vol.47 , Issue.3 , pp. 1321-1329
    • Wang, S.1    Hu, J.2
  • 48
    • 0141539639 scopus 로고    scopus 로고
    • Sample images can be independently restored from face recognition templates
    • A. Adler, "Sample images can be independently restored from face recognition templates," in Proc. IEEE Canadian Conf. Electrical and Computer Engineering, May 2003, vol. 2, pp. 1163-1166.
    • (2003) Proc. Canadian Conf. Electrical and Computer Engineering, May , vol.2 , pp. 1163-1166
    • Adler, A.1
  • 51
    • 70350173591 scopus 로고    scopus 로고
    • Dictionary attack on functional transform- based cancelable fingerprint templates
    • S. Shin, M.-K. Lee, D. Moon, and K. Moon, "Dictionary attack on functional transform- based cancelable fingerprint templates," ETRI J., vol. 31, no. 5, pp. 628-630, 2009.
    • (2009) ETRI J. , vol.31 , Issue.5 , pp. 628-630
    • Shin, S.1    Lee, M.-K.2    Moon, D.3    Moon, K.4
  • 52
    • 33750533142 scopus 로고    scopus 로고
    • An improved biohashing for human authentication
    • A. Lumini and L. Nanni, "An improved biohashing for human authentication," Pattern Recogn., vol. 40, no. 3, pp. 1057-1065, 2007.
    • (2007) Pattern Recogn. , vol.40 , Issue.3 , pp. 1057-1065
    • Lumini, A.1    Nanni, L.2
  • 57
    • 84872326434 scopus 로고    scopus 로고
    • Fingerprint combination for privacy protection
    • Feb.
    • S. Li and A. Kot, "Fingerprint combination for privacy protection," IEEE Trans. Inform. Forensics Security, vol. 8, no. 2, pp. 350-360, Feb. 2013.
    • (2013) IEEE Trans. Inform. Forensics Security , vol.8 , Issue.2 , pp. 350-360
    • Li, S.1    Kot, A.2
  • 58
    • 79951846238 scopus 로고    scopus 로고
    • Visual cryptography for biometric privacy
    • Mar
    • A. Ross and A. Othman, "Visual cryptography for biometric privacy," IEEE Trans. Inform. Forensics Security, vol. 6, no. 1, pp. 70-81, Mar. 2011.
    • (2011) IEEE Trans. Inform. Forensics Security , vol.6 , Issue.1 , pp. 70-81
    • Ross, A.1    Othman, A.2
  • 60
    • 84928781423 scopus 로고    scopus 로고
    • Privacy of facial soft biometrics: Suppressing gender but retaining identity
    • A. Othman and A. Ross, "Privacy of facial soft biometrics: Suppressing gender but retaining identity," in Proc. European Conf. Computer Vision Workshops, 2015, vol. 8926, pp. 682-696.
    • (2015) Proc. European Conf. Computer Vision Workshops , vol.8926 , pp. 682-696
    • Othman, A.1    Ross, A.2
  • 66
    • 84910038657 scopus 로고    scopus 로고
    • Standardization of biometric template protection
    • Oct.
    • S. Rane, "Standardization of biometric template protection," IEEE MultiMedia, vol. 21, no. 4, pp. 94-99, Oct. 2014.
    • (2014) IEEE MultiMedia , vol.21 , Issue.4 , pp. 94-99
    • Rane, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.