2021
DOI: 10.1049/ipr2.12130
|View full text |Cite
|
Sign up to set email alerts
|

A non‐invertible transformation based technique to protect a fingerprint template

Abstract: A fingerprint-based authentication system provides security to the applications of numerous fields and usually stores minutiae information in the database as a template. It has been observed from the literature that the reconstruction of an original fingerprint is possible from minutiae points information; hence the security of the stored template becomes extremely crucial. Cancellable biometric techniques based on non-invertible transformation protect the stored template. These techniques prevent the reconstr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 59 publications
0
5
0
Order By: Relevance
“…This is designed with the notion of achieving a mechanism free from alignment while overcoming brute force and false accept attacks. Baghel et al [78] utilized a non-invertible transformation to specifically combat brute-force and false-accept attacks, while Li et al [76] improved on the concept of IoM hashing to derive an indexing min-max hashing technique to mitigate these attacks. Recently, Abdullahi et al [82] developed a vector permutation and shift-ordering approach to mitigate these attacks.…”
Section: Discussion On Other Attack Scenariosmentioning
confidence: 99%
See 3 more Smart Citations
“…This is designed with the notion of achieving a mechanism free from alignment while overcoming brute force and false accept attacks. Baghel et al [78] utilized a non-invertible transformation to specifically combat brute-force and false-accept attacks, while Li et al [76] improved on the concept of IoM hashing to derive an indexing min-max hashing technique to mitigate these attacks. Recently, Abdullahi et al [82] developed a vector permutation and shift-ordering approach to mitigate these attacks.…”
Section: Discussion On Other Attack Scenariosmentioning
confidence: 99%
“…Furthermore, in the case of a lost key, a feature-guided index-generating method is designed to guarantee the security of the selected help vector. Other recent techniques used to counter the inversion of fingerprint templates include the works of Baghel et al [78], Agarwal and Bansal [79], Guo et al [80], Trivedi et al [81], and Abdullahi et al [82].…”
Section: ) Mechanisms Against Inversion On Fingerprintsmentioning
confidence: 99%
See 2 more Smart Citations
“…As there are numerous issues related to fingerprint biometrics [33], there is a need for a highly secure fingerprint-based authentication method. Any secure biometric system is expected to depict the essential requirements [19,34] given below:…”
Section: Introductionmentioning
confidence: 99%