A fingerprint Alignment with a 3D Geometric Hashing Table based on the fuzzy Fingerprint Vault |
Lee, Sung-Ju
(Korea University)
Moon, Dae-Sung (ETRI) Kim, Hak-Jae (Korea University) Yi, Ok-Yeon (Kookmin University) Chung, Yong-Wha (Korea University) |
1 | N. Ratha, J. Connel, and R. Bolle, "Enhancing Security and Privacy in Biometrics-based Authentication Systems," IBM Systems Journal, Vol. 40, No. 3, pp. 614-634, 2001 DOI ScienceOn |
2 | C. Soutar, et al., "Biometric Encryption - Enrollment and Verification Procedures," Proc. SPIE, Vol. 3386, pp. 24-35, 1998 |
3 | A. Juels and M. Sudan, "A Fuzzy Vault Scheme," Proc. of Symp. on Information Theory, pp. 408, 2002 |
4 | T. Clancy, N. Kiyavash, and D. Lin, "Secure Smartcard-based Fingerprint Authentication," Proc. of ACM SIGMM Multim., Biom. Met. & App., pp. 45-52, 2003 |
5 | U. Uludag, S. Pankanti, and A. Jain, "Fuzzy Vault for Fingerprints," LNCS 3546 - Proc. of AVBPA, pp. 310-319, 2005 |
6 | H. Wolfson and I. Rigoutsos, "Geometric Hashing: an Overview," IEEE Computational Science and Engineering, Vol. 4, pp. 10-21, Oct.-Dec. 1997 |
7 | D. Ahn, et al., "Specification of ETRI Fingerprint Database(in Korean)," Technical Report - ETRI, 2002 |
8 | C. Ellison, et al., "Protecting Secret Keys with Personal Entropy," Future Generation Computer Systems, Vol. 16, pp. 311-318, 2000 DOI ScienceOn |
9 | J. Linnartz and P. Tuyls, "New Shielding Functions to Enhance Privacy and Prevent Misuse of Biometric Templates," LNCS 2688 - Proc. of AVBPA, pp. 393-402, 2003 |
10 | F. Monrose, M. Reiter, and S. Wetzel, "Password Hardening based on Keystroke Dynamics," Proc. of ACM Conf. on Computer and Comm. Security, pp. 73-82, 1999 |
11 | G. Davida, Y. Frankel, and B. Matt, "On Enabling Secure Applications through Off-Line Biometric Identification," Proc. of Symp. on Privacy and Security, pp. 148-157, 1998 |
12 | Y. Chung, et al., "Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault," LNCS - 3822 Proc. of CISC, pp. 358-369, 2005 |
13 | W. Stallings, Cryptography and Network Security, Pearson Ed. Inc., 2003 |
14 | R. Bolle, J. Connell, and N. Ratha, "Biometric Perils and Patches," Pattern Recognition, Vol. 35, pp. 2727-2738, 2002 DOI ScienceOn |
15 | S. Prabhakar, S. Pankanti, and A. Jain, "Biometric Recognition: Security and Privacy Concerns," IEEE Security and Privacy, pp. 33-42, 2003 |
16 | D. Maltoni, et al., Handbook of Fingerprint Recognition, Springer, 2003 |
17 | S. Yang and I. Verbauwhede, "Secure Fuzzy Vault based fingerprint verification system," IEEE Signals, Systems and Computers, Vol. 1, pp. 557-581, 2004 |
18 | A. Juels and M. Wattenberg, "A Fuzzy Commitment Scheme," Proc. of ACM Conf. on Computer and Comm. Security, pp. 28-36, 1999 |
19 | B. Schneier, "The Uses and Abuses of Biometrics," Communications of the ACM, Vol. 42, No, 8, pp. 136, 1999 DOI |
20 | D. Maio and D. Maltoni, "A Secure Protocol for Electronic Commerce based on Fingerprints and Encryption," Proc. of Conf. on Systems, Cybernetics, and Informatics, pp. 519-525, 1999 |
21 | Y. Dodis, L. Reyzin, and A. Smith, "Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data," LNCS 3027 - Proc. of EuroCrypt, pp. 523-540, 2004 |
22 | U. Uludag, et al., "Biometric Cryptosystems: Issues and Challenges," Proc. of IEEE, Vol. 92, No. 6, pp. 948-960, 2004 DOI ScienceOn |
23 | V. Matyas and Z. Riha, "Biometric Authentication Systems," TR Ecom- Monitor. Com, 2000 |