2013
DOI: 10.1007/978-3-642-41190-8_11
|View full text |Cite
|
Sign up to set email alerts
|

A Dissimilarity-Based Approach for Biometric Fuzzy Vaults–Application to Handwritten Signature Images

Abstract: Abstract. Bio-Cryptographic systems enforce authenticity of cryptographic applications like data encryption and digital signatures. Instead of simple user passwords, biometrics, such as, fingerprint and handwritten signatures, are employed to access the cryptographic secret keys. The Fuzzy Vault scheme (FV) is massively employed to produce biocryptogra-phic systems, as it absorbs variability in biometric signals. However, the FV design problem is not well formulated in the literature, and different approaches … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2014
2014
2016
2016

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…These alterations were not done with respect to a particular trait, but were performed to improve any specific aspect of the vault. The authors in [85, 86] introduced a generic FV design approach based on the theory of classifiers. Not only the authors extended their work in [85] by employing a BFS method for optimising their model, but also tested it in offline handwritten signatures with promising results.…”
Section: Improvements On Fuzzy Vaultmentioning
confidence: 99%
See 1 more Smart Citation
“…These alterations were not done with respect to a particular trait, but were performed to improve any specific aspect of the vault. The authors in [85, 86] introduced a generic FV design approach based on the theory of classifiers. Not only the authors extended their work in [85] by employing a BFS method for optimising their model, but also tested it in offline handwritten signatures with promising results.…”
Section: Improvements On Fuzzy Vaultmentioning
confidence: 99%
“…The authors in [85, 86] introduced a generic FV design approach based on the theory of classifiers. Not only the authors extended their work in [85] by employing a BFS method for optimising their model, but also tested it in offline handwritten signatures with promising results. This work was further extended in [87] by proposing a scheme which dynamically modifies the user key size.…”
Section: Improvements On Fuzzy Vaultmentioning
confidence: 99%
“…By this method, it is less likely that an unlocking element equates a chaff element. For or instance, the same entropy (68-bits) could be achieved with a minimal impact on system robustness (AER = 10.52%) [11].…”
Section: A Adaptive Chaff Generationmentioning
confidence: 93%
“…Moreover, impact of chaff points δ is minimized through generation of chaff points adaptively according to feature expected variability, so it is less likely that a genuine unlocking point matches with a chaff point [15].…”
Section: Dissimilarity-based Fuzzy Vault Designmentioning
confidence: 99%
“…Instead of training classifiers in the FR space, some proximity measure produces an alternative classification space, called a DR space (for a review on application of DR approach to SV, see [14]). Recently, the authors have proposed a dissimilarity-based approach to design FV systems [15]. Error correction capacity of a FV is considered as a threshold in a dissimilarity space by which a FV classifies genuine and impostor samples.…”
Section: Dissimilarity-based Fuzzy Vault Designmentioning
confidence: 99%