References
- W. Stallings, Cryptography and Network Security, Pearson Ed. Inc., 2003.
- S. Prabhakar, S. Pankanti and A. Jain, "Biometric recognition: security and privacy concerns," in Proc. of IEEE Security and Privacy, vol. 1, no. 2, pp. 33-42, 2003. https://doi.org/10.1109/MSECP.2003.1193209
- K. Y. Shin, B. J. Kang and K. R. Park, "Super-resolution iris image restoration using single image for iris recognition," in Proc. of Transactions on Internet and Information Systems, vol. 4, no. 2, pp. 117-137, 2010.
- D. Maltoni, D. Maio, A.K. Jain and S.Prabhakar, Handbook of Fingerprint Recognition, Springer, 2003.
- R. Bolle, J. Connell and N. Ratha, "Biometric perils and patches," in Proc. of the Pattern Recognition, vol. 35, pp. 2727-2738, 2002. https://doi.org/10.1016/S0031-3203(01)00247-3
- B. Schneier, "The uses and abuses of biometrics," in Proc. of the Communications of the ACM, vol. 42, no. 8, pp. 136, 1999. https://doi.org/10.1145/310930.310988
- A. Juels and M. Sudan, "A fuzzy vault scheme," in Proc. of Symp. on Information Theory, pp. 408, 2002.
- T. Clancy, N. Kiyavash and D. Lin, "Secure smartcard-based fingerprint authentication," in Proc. of ACM SIGMM Multim., Biom. Met. & App., pp. 45-52, 2003.
- U. Uludag, S. Pankanti and A. Jain, "Fuzzy vault for fingerprints," LNCS 3546, pp. 310-319, 2005.
- Y. Chung, D. Moon, S. Lee, S. Jung, T. Kim and D. Ahn, "Automatic alignment of fingerprint features for fuzzy fingerprint vault," LNCS 3822, pp. 358-369, 2005.
- D. Moon, S. Lee, Y. Chung, S. B. Pan and K. Moon, "Implementation of automatic fuzzy fingerprint vault," in Proc. of the Machine Learning and Cybernetics, vol. 7, pp. 3781-3786, 2008.
- D. Moon, S. Lee, S. Jung, Y. Chung, M. Park and O. Yi, "Fingerprint template protection using fuzzy vault," LNCS 4707, pp. 1141-1151, 2007.
- Y. Chung, D. Moon, S. Pan, M. Kim and K. Kim, "A hardware implementation of fingerprint verification for secure biometric authentication," LNCS 3212, pp. 770-777, 2004.
- H. Wolfson and I. Rigoutsos, "Geometric hashing: an overview," in Proc. of the IEEE Computational Science and Engineering, vol. 4, no. 4, pp. 10-21, 1997. https://doi.org/10.1109/99.641604
- W. Scheirer and T. Boult, "Cracking fuzzy vaults and biometric encryption," in Proc. of IEEE Biometrics Research Symposium at the National Biometrics Consortium Conf., pp. 1-16, 2007.
- [16] K. Nandakumar, A. Nagar and A. K. Jain, "Hardening fingerprint fuzzy vault using password," LNCS 4642, pp. 927-937, 2007.
- P. Li, x. Yang, K. Cao, P. shi and J. Tian, "Security-enhanced fuzzy fingerprint vault based on minutiae's local ridge information," LNCS 5558, pp. 930-939, 2009.
- A. Juels and M, Wattenberg, "A fuzzy commitment scheme," in Proc. of ACM Conf. on Computer and Comm. Security, pp. 28-36, 1999.
- Y. Lamdan and H. Wolfson, "Geometric hashing: A general and efficient model-based recognition scheme," in Proc. of 2nd International Conf. Computer Vision, pp. 238-249, 1998.
- Y. Wang, J. Hu and D. Philips, "A fingerprint orientation model based on 2D Fourier Expansion (FOMFE) and its application to singular-point detection and fingerprint Indexing," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 573-585, 2007. https://doi.org/10.1109/TPAMI.2007.1003
- S. Lim, S. Chae, D. Moon, Y. Chung, N. Lee and S. B. Pan "VLSI architecture for the fuzzy fingerprint vault with automatic alignment module," in Proc. International Conf. FGCN, vol. 56, pp. 470-476, 2009.