Chung et al., 2005 - Google Patents
Automatic alignment of fingerprint features for fuzzy fingerprint vaultChung et al., 2005
- Document ID
- 17917367276109711568
- Author
- Chung Y
- Moon D
- Lee S
- Jung S
- Kim T
- Ahn D
- Publication year
- Publication venue
- International Conference on Information Security and Cryptology
External Links
Snippet
Biometrics-based user authentication has several advantages over traditional password- based systems for standalone authentication applications. This is also true for new authentication architectures known as crypto-biometric systems, where cryptography and …
- 238000000034 method 0 abstract description 33
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chung et al. | Automatic alignment of fingerprint features for fuzzy fingerprint vault | |
Lee et al. | Biometric key binding: Fuzzy vault based on iris images | |
Lee et al. | A new method for generating an invariant iris private key based on the fuzzy vault system | |
Natgunanathan et al. | Protection of privacy in biometric data | |
Sutcu et al. | Protecting biometric templates with sketch: Theory and practice | |
WO2008069475A1 (en) | Fingerprint data protection and authentication method using 3d fuzzy vault scheme, fingerprint data protection apparatus using 3d fuzzy vault scheme, and fingerprint data authentication system using 3d fuzzy vault scheme | |
Tams | Unlinkable minutiae‐based fuzzy vault for multiple fingerprints | |
Sadhya et al. | Review of key‐binding‐based biometric data protection schemes | |
Jin et al. | A Revocable Fingerprint Template for Security and Privacy Preserving. | |
Baghel et al. | Generation of secure fingerprint template using DFT for consumer electronics devices | |
Moon et al. | Biometrics information protection using fuzzy vault scheme | |
Hu | Mobile fingerprint template protection: Progress and open issues | |
Moon et al. | Fingerprint template protection using fuzzy vault | |
Moon et al. | A practical implementation of fuzzy fingerprint vault for smart cards | |
Kumar et al. | A palmprint-based cryptosystem using double encryption | |
Machado et al. | Securing ATM pins and passwords using Fingerprint based Fuzzy Vault System | |
Lee et al. | Protecting secret keys with fuzzy fingerprint vault based on a 3d geometric hash table | |
Moon et al. | Implementation of automatic fuzzy fingerprint vault | |
Kerschbaum et al. | Private fingerprint verification without local storage | |
Riaz et al. | ExpressionHash: Securing Telecare Medical Information Systems Using BioHashing. | |
Razaque et al. | Multi-biometric system using fuzzy vault | |
Bansal et al. | Fingerprint fuzzy vault using Hadamard transformation | |
Liu et al. | Is fuzzy vault scheme very effective for key binding in biometric cryptosystems? | |
Han | Fingerprint Authentication Schemes for Mobile Devices | |
Jegede et al. | State of the art in biometric key binding and key generation schemes |