RN-ECC Based Fuzzy Vault for Protecting Fingerprint Templates |
Lee, Dae-Jong
(College of Electrical & Computer Engineering, Chungbuk National University)
Shin, Yong-Nyuo (Department of Computer Engineering, Hanyangcyber University) Park, Seon-Hong (College of Electrical & Computer Engineering, Chungbuk National University) Chun, Myung-Geun (College of Electrical & Computer Engineering, Chungbuk National University) |
1 | Chikkerur S., Govindaraju V. and Alexander N. Cartwright, "K-plet and Coupled BFS: A Graph-Based Fingerprint Representation and Matching Algorithm," Lecture Notes in Computer Science, Vol. 3832, pp. 309-315, 2006. |
2 | Asker M. Bazen and Sabih H. Gerez., "Fingerprint matching by thin-plate spline modeling of elastic deformations," Pattern Recognition, Vol. 36, pp. 1859-1867, 2003. DOI ScienceOn |
3 | Mi Kyeong You, Man-Jun Kwon, Sang Ho Lee and Myung Geun Chun, "Secure Binding of Identity Reference and Biometric Reference" Journal of Korean Institute of Intelligent Systems, Vol, 20, No. 5, pp. 610-616, 2010. 과학기술학회마을 DOI ScienceOn |
4 | Y. Shin, M. Kwon, Y. lee, J. Park, and M. Chun, "Biometric and Identity Reference Protection," Journal of Korean Institute of Intelligent Systems, Vol, 19, No. 2, pp. 160-167, 2009. 과학기술학회마을 DOI ScienceOn |
5 | N. Karthik, A. Jain, "Fingerprint-based fuzzy vault: implementation and performance," IEEE Trans on Information Forensics and Securities, Vol. 2, 2007. |
6 | A. Teoh, Y. Kuan, S. LEE Cancellable Biometrics and Annotations on BioHash, Pattern Recognition 41, 2008 |
7 | A. Kong and K. Cheung, D. Zhang, An Analysis of BioHashing and its invariants, Pattern Recognition 39, 2005 |
8 | Juels A and Sudan M, "A fuzzy vault scheme," Proceeding of IEEE Int. Symposium on Information Theory, 2002. |
9 | P. Li and J. Tian, An alignment-free fingerprint cryptosysten based on fuzzy vault scheme, Journal of Network and Computer Applications, 2010. |
10 | Y. Wang and K. N. Plataniotis, "Fuzzy vault for face based cryptographic key generation," in Proc. Biometrics Symposium 2007, |
11 | F. Thomas, Z. Xuebing, B. Christoph, Fuzzy Vault for 3D face recognition systems, Int. Conf. on Intelligent information hiding and multimedia signal processing, 2008 |
12 | A. Kumar and A. Makur, Improved coding-theoretic and subspace-based decoding algorithms for a wider class of DCT and DST codes, IEEE Trans. on Signal Processing, Vol. 58, 2010. |
13 | L. Yiun Joo, P. Kang Ryong, L. Sung Joo, B. Kwanghyuk, K. Jaihie, A new method for generating an invariant ISIS private key based on the fuzzy vault system, IEEE Trans. on System, Man, Cybernetics, Vol. 38, 2008. |
14 | K. Moon, Error Correcting Code: Mathematical Methods and Algorithm, Wiley-Interscience, 2005 |
15 | T. Marshall, Coding of real-number sequences for error correction: a digital signal processing problem, IEEE Journal of Selected Areas in Communication, Vol. SAC-2, 1984. |
16 | Govindaraju V., Z. Shi and J. Schneider, "Feature Extraction Using a Chain-coded Contour Representation," Int. Conf. on Audio and Video Based Biometric Person Authentication, Surrey, UK, 2003. |