Ang et al., 2005 - Google Patents
Cancelable key-based fingerprint templatesAng et al., 2005
View PDF- Document ID
- 13615813767955526158
- Author
- Ang R
- Safavi-Naini R
- McAven L
- Publication year
- Publication venue
- Australasian conference on information security and privacy
External Links
Snippet
Biometric based authentication can provide strong security guarantee about the identity of users. Security of biometric data is particularly important as compromise of the data will be permanent. Cancelable biometrics store a non–invertible transformed version of the …
- 230000001131 transforming 0 abstract description 31
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00067—Preprocessing; Feature extraction (minutiae)
- G06K9/00073—Extracting features related to minutiae and pores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00087—Matching; Classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00288—Classification, e.g. identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Ang et al. | Cancelable key-based fingerprint templates | |
| US12200133B2 (en) | System and method for producing a unique stable biometric code for a biometric hash | |
| Nandakumar et al. | Biometric template protection: Bridging the performance gap between theory and practice | |
| Sutcu et al. | Protecting biometric templates with sketch: Theory and practice | |
| Ahmad et al. | Pair-polar coordinate-based cancelable fingerprint templates | |
| Boult et al. | Revocable fingerprint biotokens: Accuracy and security analysis | |
| US20230246839A1 (en) | System and method for complex confirmation of biometric information without stored biometric data | |
| Li et al. | Fuzzy extractors for asymmetric biometric representations | |
| CN101136749A (en) | Encryption key generation and restoration method and personal authentication system | |
| Bhartiya et al. | Biometric authentication systems: security concerns and solutions | |
| Sutcu et al. | Feature transformation of biometric templates for secure biometric systems based on error correcting codes | |
| Belguechi et al. | An integrated framework combining Bio-Hashed minutiae template and PKCS15 compliant card for a better secure management of fingerprint cancelable templates | |
| Sutcu et al. | A geometric transformation to protect minutiae-based fingerprint templates | |
| Gupta et al. | Non-deterministic approach to allay replay attack on iris biometric | |
| Nair et al. | An approach to improve the match-on-card fingerprint authentication system security | |
| Sheng et al. | Reliable and secure encryption key generation from fingerprints | |
| Liu et al. | Palmprint based multidimensional fuzzy vault scheme | |
| Ameh et al. | Securing cardless automated teller machine transactions using bimodal authentication system | |
| Tian et al. | Fingerprint-based identity authentication and digital media protection in network environment | |
| Champaneria et al. | A cancelable biometric authentication scheme based on geometric transformation | |
| Merkle et al. | Security capacity of the fuzzy fingerprint vault | |
| Moi et al. | Error correction on iris biometric template using reed solomon codes | |
| Cimato et al. | Biometrics and privacy | |
| Merkle et al. | Performance of the fuzzy vault for multiple fingerprints (extended version) | |
| Bhargav-Spantzel et al. | Biometrics-based identifiers for digital identity management |