Results 1 - 10
of
642
unknown title
"... Abstract-Biometrics authentication provides highest level of security. It allows the user to get authenticated using his or her own physical or behavioral characteristics. Unimodal biometrics have several problems such as noisy data, spoof attacks etc. which cause data insecure. To overcome these pr ..."
Abstract
- Add to MetaCart
to make it more secure. The template is finally stored in database. Keywords-Biometric template protection, multimodal biometrics, biometric cryptosystem, hybrid approach for biometric template protection. I.
Security capacity of the fuzzy fingerprint vault
- International Journal on Advances in Security, 3(3 & 4):146–168
, 2010
"... Abstract—We investigate the security of a privacy enhancing technique for fingerprint authentication known as fuzzy fingerprint vault. This technique is based on the fuzzy vault of Jules and Sudan, a scheme that allows error tolerant authentication, while pre-serving the privacy of the reference dat ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
parameters. Keywords-biometric template protection; finger-print; fuzzy vault; polynomial reconstruction I.
Biometric template security,”
- EURASIP,
, 2008
"... Biometric recognition offers a reliable solution to the problem of user authentication in identity management systems. With the widespread deployment of biometric systems in various applications, there are increasing concerns about the security and privacy of biometric technology. Public acceptance ..."
Abstract
-
Cited by 132 (11 self)
- Add to MetaCart
proposed to address these vulnerabilities. In particular, we focus on biometric template security which is an important issue because, unlike passwords and tokens, compromised biometric templates cannot be revoked and reissued. Protecting the template is a challenging task due to intrauser variability
Biometric mobile template protection: a composite feature based fingerprint fuzzy vault
- IEEE International Conference on Communications
, 2009
"... Abstract—Biometric authentication is emerging as the promising solution to conventional cryptography based authentication technologies. However, protecting users ’ biometric templates stored in a mobile device in a secure way is a challenge issue and has attracted many attentions. As one of the poss ..."
Abstract
-
Cited by 3 (2 self)
- Add to MetaCart
improve verification performance significantly. Keywords—Fuzzy Vault; fingerprint; biometric security; template protection
Paper The Template Selection in Biometric Systems Based on Binary Iris Codes
"... Abstract—Since the variability of data within readings from the same person is intrinsic property of every biometric sys-tem, the problem of finding a good representative – the tem-plate – was recognized and present since the beginning of biometrics. This problem was solved differently for different ..."
Abstract
- Add to MetaCart
. This is an im-portant fact, which can significantly improve a performance of biometric template protection methods for iris. Keywords—binary iris codes, biometric template selection, iris biometrics. 1.
Capacity and Examples of Template-Protecting Biometric Authentication Systems
- In ECCV Workshop BioAW
, 2004
"... In this paper, we formulate the requirements for privacy protecting biometric authentication systems. The secrecy capacity C s is investigated for the discrete and the continuous case. We present, furthermore, a general algorithm that meets the requirements and achieves C s as well as C id (the ..."
Abstract
-
Cited by 47 (1 self)
- Add to MetaCart
In this paper, we formulate the requirements for privacy protecting biometric authentication systems. The secrecy capacity C s is investigated for the discrete and the continuous case. We present, furthermore, a general algorithm that meets the requirements and achieves C s as well as C id (the
Paper Probabilistic Issues in Biometric Template Design
"... Abstract—Since the notion of biometric template is not well defined, various concepts are used in biometrics practice. In this paper we present a systematic view on a family of template concepts based on the L1 or L2 dissimilarities. In particular, for sample vectors of independent components we fin ..."
Abstract
- Add to MetaCart
find out how likely it is for the median code to be a sample vector. Keywords—biometrics, sample median, template. 1.
How to Protect Biometric Templates
"... In addition to the inherent qualities that biometrics posses, powerful signal processing tools enabled widespread deployment of the biometric-based identification/verification systems. However, due to the nature of biometric data, well-established cryptographic tools (such as hashing, encryption, et ..."
Abstract
- Add to MetaCart
, etc.) are not sufficient for solving one of the most important problems related to biometric systems, namely, template security. In this paper, we examine and show how to apply a recently proposed secure sketch scheme in order to protect the biometric templates. We consider face biometrics and study
On fingerprint template synthesis
- in Proceedings of Sixth International Conference on Control, Automation, Robotics and Vision (ICARCV
, 2000
"... In this paper, we address the false rejection problem due to small solid state sensor area available for fingerprint image capture. We propose a minutiae data synthesis approach to circumvent this problem. Main advantages of this approach over existing image mosaicing approach include low memory sto ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
of synthesis with an example using physical fingerprint images. The proposed synthesis system is also found to improve (lower) the number of false rejects due to the use of different fingerprint regions for matching. keywords:-Biometrics, image database, fingerprint identification, fingerprint verification
Extracting Discriminative Binary Template for Face Template Protection
"... This paper addresses the security issues of the face bio-metric templates stored in a database. In order to improve the security level of the stored face templates, cryptographic techniques are commonly employed. Since most of such techniques require a binary input, thresholding is usually employed ..."
Abstract
- Add to MetaCart
This paper addresses the security issues of the face bio-metric templates stored in a database. In order to improve the security level of the stored face templates, cryptographic techniques are commonly employed. Since most of such techniques require a binary input, thresholding is usually employed
Results 1 - 10
of
642