A Practical Implementation of Fuzzy Fingerprint Vault
![]() ![]() |
Lee, Sun-Gju
(Department of Computer and Information Science, Korea University)
Chung, Yong-Wha (Department of Computer and Information Science, Korea University) Moon, Dae-Sung (ETRI Human Identification Research Team, ETRI) Pan, Sung-Bum (Department of Control, Instrumentation and Robot Engineering, Chosun University) Seo, Chang-Ho (Department of Applied Mathematics, Kongju National University) |
1 | S. Lee, et al., "Memory-Efficient Fuzzy Fingerprint Vault Based on the Geometric Hashing," in Proc. of ISA, pp. 312-315, 2008. |
2 | S. Chae, S. Lim, S. Bae, Y. Chung, and S. Pan, "Parallel Processing of the Fuzzy Fingerprint Vault based on Geometric Hashing," KSII Tr. Internet & Info Systems, vol. 4, no. 6, pp. 1294-1310, 2010. |
3 | E. Berlekamp, Algebraic Coding Theory, McGraw-Hill, New York, 1968. (Revised edition, Laguna Hills: Aegean Park Press, 1984. |
4 | V. Guruswami and M. Sudan, "Improved Decoding of Reed-Solomon and Algebraic Geometric Codes," in Proc. of FOCS, pp. 28-39, 1998. |
5 | S. Gao, "A New Algorithm for Decoding Reed-Solomon Codes," Communications, Information and Network Security, pp. 55-68, Kluwer Academic Press, 2003. |
6 | N. Ratha and R. Bolle, "Automatic Fingerprint Recognition Systems," Springer, 2004. |
7 | T. Hopper, C. Brislawn, J. Bradley, "WSQ Gray-Scale Fingerprint Image Compression Specification," Federal Bureau of Investigation, Document No. IAFIS-IC-0110 (v2), 1993. |
8 | Y. Wang, J. Hu, and D. Philip, "A Fingerprint Orientation Model Based on 2D Fourier Expansion (FOMFE) and its Application to Singular-point Detection and Fingerprint Indexing," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 573-585, 2007. DOI |
9 | K. Xi and J. Hu. "Biometric Mobile Template Protection: A Composite Feature Based Fingerprint Fuzzy Vault," in Proc. of IEEE ICC, 2009. |
10 | P. Zhang, J. Hu, C. Li, M. Bennamound, and V. Bhagavatulae, "A Pitfall in Fingerprint Bio-Cryptographic Key Generation," Computers and Security, Elsevier, 2011. |
11 | H. Wolfson and I. Rigoutsos, "Geometric Hashing: an Overview," IEEE Computational Science and Engineering, vol. 4, pp. 10-21, Oct.-Dec. 1997. |
12 | J. Hu, "Mobile Fingerprint Template Protection: Progress and Open Issues," in Proc. of IEEE ICIEA Conference, pp. 3-5, 2008. |
13 | http://bias.csr.unibo.it/fvc2002/databases.asp. Sungju |
14 | D. Maltoni, et al., Handbook of Fingerprint Recognition, 2003. |
15 | R. Bolle, J. Connell, and N. Ratha, "Biometric Perils and Patches," Pattern Recognition, vol. 35, pp. 2727-2738, 2002. DOI |
16 | B. Schneier, "The Uses and Abuses of Biometrics," Communications of the ACM, vol. 42, no, 8, pp. 136, 1999. DOI |
17 | S. Prabhakar, et al., "Biometric Recognition: Security and Privacy Concerns," IEEE Security and Privacy, pp. 33-42, 2003. |
18 | A. Juels and M. Sudan, "A Fuzzy Vault Scheme," in Proc. of Symp. on Information Theory, pp. 408, 2002. |
19 | U. Uludag, et al., "Fuzzy Vault for Fingerprints," in Proc. of Audio- and Video-based Biometric Person Authentication, pp. 310-319, 2005. |
20 | T. Clancy, et al., "Secure Smartcard-based Fingerprint Authentication," in Proc. of ACM SIGMM Multim., Biom. Met. & App., pp. 45-522003., |
21 | K. Nandakumar, et al., "Fingerprint-based Fuzzy Vault: Implementation and Performance," IEEE Transactions on Information Forensics and Security, vol. 2, no. 4, pp. 744-757, 2007. DOI |
22 | S. Yang and I. Verbauwhede, "Automatic Secure Fingerprint Verification System Based on Fuzzy Vault Scheme," in Proc. of IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol. 5, pp. 609-612, 2005. |
23 | Y. Chung, et al., "Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault," LNCS 3822, pp. 358-369, 2005. |
24 | D. Moon, et al., "Fingerprint Template Protection Using Fuzzy Vault," LNCS 4707, pp.1141-1151, 2007. |
25 | D. Moon, et al., "Configurable Fuzzy Fingerprint Vault for Match-on-Card System," IEICE Electron Express, vol. 6, no. 14, pp. 993-999, 2009. DOI |
26 | S. Shin, M. Lee, D. Moon, and K. Moon, "Dictionary Attack on Functional Transform-based Cancelable Fingerprint Templates," ETRI Journal, vol. 31, no. 5, pp. 628-630, 2009. DOI |
27 | D. Socek, D. Culibrk, and V. Bozovic, "Issues and Challenges in Storing Biometric Templates Securely," in Proc. of CRISIS, pp. 75-81, 2007. |
28 | W. Scheirer and T. Boult, "Cracking Fuzzy Vaults and Biometric Encryption," in Proc. of IEEE Biometrics Research Symposium at the National Biometrics Consortium Conference, 2007. |
29 | A. Kholmatov and B. Yanikoglu, "Realization of Correlation Attack against the Fuzzy Vault Scheme," in Proc. of SPIE, vol. 6819, pp. 68190O.1-68190O.7, 2008. |
30 | R. Rivest, et al., "Chaffing and Winnowing: Confidentiality without Encryption," http://theory.lcs.mit.edu/-rivest/chaffing.txt, 1998. |
![]() |