Sheng et al., 2015 - Google Patents
A biometric key generation method based on semisupervised data clusteringSheng et al., 2015
- Document ID
- 10158318266019744251
- Author
- Sheng W
- Chen S
- Xiao G
- Mao J
- Zheng Y
- Publication year
- Publication venue
- IEEE Transactions on Systems, Man, and Cybernetics: Systems
External Links
Snippet
Storing biometric templates and/or encryption keys, as adopted in traditional biometrics- based authentication methods, has raised a matter of serious concern. To address such a concern, biometric key generation, which derives encryption keys directly from statistical …
- 238000004422 calculation algorithm 0 abstract description 29
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
- G06K9/627—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches based on distances between the pattern to be recognised and training or reference patterns
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6279—Classification techniques relating to the number of classes
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sheng et al. | A biometric key generation method based on semisupervised data clustering | |
Dinca et al. | The fall of one, the rise of many: a survey on multi-biometric fusion methods | |
Bolle et al. | Biometric perils and patches | |
Natgunanathan et al. | Protection of privacy in biometric data | |
Jain et al. | Biometrics: a tool for information security | |
Zhao et al. | Negative iris recognition | |
US20080235788A1 (en) | Haptic-based graphical password | |
Ouda et al. | Bioencoding: A reliable tokenless cancelable biometrics scheme for protecting iriscodes | |
Sheng et al. | Template-free biometric-key generation by means of fuzzy genetic clustering | |
Tran et al. | A multi-filter fingerprint matching framework for cancelable template design | |
CN101924750A (en) | Biometric authentication method, client terminal for biometric authentication, authentication server | |
KR100749380B1 (en) | Unique biocode generation method of encryption biometric system | |
Neha et al. | Biometric re-authentication: An approach towards achieving transparency in user authentication | |
KR102181340B1 (en) | Method and system for generating cryptographic key using biometrics and fuzzy vault | |
Ahmad et al. | Improving the performance of projection-based cancelable fingerprint template method | |
Dash et al. | Privacy preserving unique identity generation from multimodal biometric data for privacy and security applications | |
Al-Assam et al. | Multi-Factor Biometrics for Authentication: A false sense of security | |
Ghouzali | Multimodal biometric watermarking-based transfer learning authentication | |
Sonkar et al. | Cancelable iris biometric: A review | |
Choudhary et al. | Secured Automated Certificate Creation Based on Multimodal Biometric Verification | |
Le et al. | Protecting biometric features by periodic function-based transformation and fuzzy vault | |
Pandiaraja et al. | An Overview of Joint Biometric Identification for Secure Online Voting with Blockchain Technology | |
Ohana et al. | HoneyFaces: Increasing the security and privacy of authentication using synthetic facial images | |
Aldosary et al. | A Robust Multimodal Biometric Security System Using the Polynomial Curve Technique within Shamir's Secret Sharing Algorithm | |
Kümmel et al. | Handwriting biometric hash attack: A genetic algorithm with user interaction for raw data reconstruction |