2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS) 2010
DOI: 10.1109/btas.2010.5634488
|View full text |Cite
|
Sign up to set email alerts
|

Binary feature vector fingerprint representation from minutiae vicinities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
41
0

Year Published

2011
2011
2014
2014

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 64 publications
(41 citation statements)
references
References 29 publications
0
41
0
Order By: Relevance
“…So, there has to be an optimal value for number of clusters for which the accuracy is maximized, in our experiments we observed that the accuracy was maximum for 1000 clusters. The results have been compared (see Figure 7) with spectral minutiae representation [12] and binary representation through minutiae vicinities [6]. These are the two major fixed-length quantized fingerprint representations in the literature.…”
Section: Experiments and Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…So, there has to be an optimal value for number of clusters for which the accuracy is maximized, in our experiments we observed that the accuracy was maximum for 1000 clusters. The results have been compared (see Figure 7) with spectral minutiae representation [12] and binary representation through minutiae vicinities [6]. These are the two major fixed-length quantized fingerprint representations in the literature.…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…Also, a minutiae based representation due to its variable size is not suitable for recently proposed template protection schemes such as [3] and [5]. Bringer in his work [6], transforms a minutiae set into a fixed-length quantized feature vector by matching small minutiae vicinities (or neighborhoods) with a set of representative vicinities.…”
Section: Introductionmentioning
confidence: 99%
“…So far, hardly any suggestions have been made to construct align-invariant BCSs or CB. Feature adaptation schemes that preserve accuracy have to be utilized in order to obtain common representations of arbitrary biometric characteristics (several approaches to extract binary fingerprint templates have been proposed, e.g., [211,212]) allowing biometric fusion in a form suitable for distinct template protection schemes. In addition, several suggestions for protocols providing provable secure biometric authentication based on template protection schemes have been made [150,192,213,214].…”
Section: F Open Issues and Challengesmentioning
confidence: 99%
“…For iriscode biometric data, the comparison of two iriscodes is made thanks to the computation of an Hamming distance [4]. There is today a trend to generalize this way of performing biometric matching for other modalities [5,6] for easier embedding into cryptographic protocols. In their works on private identification, Bringer et al [7][8][9] (see also Section Private identification schemes) actually show how to carry out fuzzy keyword search for the Hamming distance.…”
Section: Related Workmentioning
confidence: 99%