2004
DOI: 10.1016/j.patcog.2004.04.011
|View full text |Cite
|
Sign up to set email alerts
|

Biohashing: two factor authentication featuring fingerprint data and tokenised random number

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
229
0
3

Year Published

2010
2010
2021
2021

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 625 publications
(245 citation statements)
references
References 5 publications
0
229
0
3
Order By: Relevance
“…a smart card and Bwhat you are^e.g. biometrics (Jin et al 2004). These methods are driven by knowledge, objects and human characteristics.…”
Section: Authentication Approachesmentioning
confidence: 99%
“…a smart card and Bwhat you are^e.g. biometrics (Jin et al 2004). These methods are driven by knowledge, objects and human characteristics.…”
Section: Authentication Approachesmentioning
confidence: 99%
“…a smart card and "what you are" e.g. biometrics [25]. These methods are driven by knowledge, objects and human characteristics.…”
Section: Authentication Approachesmentioning
confidence: 99%
“…In biometric encryption, described in [3],a correlation filter is used to extract features from biometric samples and subsequently both the features and the filter is multiplied with a noise value, providing a masked reference before embedding a random key (the pseudo identity) in the reference using a lookup table. Similarly, in the bio-hashing algorithm by Roberge et al [4], features are derived using an integrated wavelet and Fourier-Mellintransform framework (WFMT) before the inner product of the feature and a sequence of orthogonal random patterns are calculated and binarized. The resulting bit string constitutes the pseudo identity of the subject.…”
Section: Template Protection Scheme Surveymentioning
confidence: 99%