2016
DOI: 10.1016/j.patcog.2016.02.024
|View full text |Cite
|
Sign up to set email alerts
|

Biometric cryptosystems: A new biometric key binding and its implementation for fingerprint minutiae-based representation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
33
0
1

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 85 publications
(34 citation statements)
references
References 30 publications
0
33
0
1
Order By: Relevance
“…Performance discrepancy: The key binding approach in [57] reported FAR more than zero in their implementation on fingerprint. This implies the potential of this scheme to be compromised through FAR related attacks.…”
Section: Motivation and Contributionmentioning
confidence: 99%
See 2 more Smart Citations
“…Performance discrepancy: The key binding approach in [57] reported FAR more than zero in their implementation on fingerprint. This implies the potential of this scheme to be compromised through FAR related attacks.…”
Section: Motivation and Contributionmentioning
confidence: 99%
“…In this paper, we proposed an alignment free iris key binding scheme with cancelable transform without depending on ECC. This idea is another approach based on chaffing and winnowing similar to Jin's approach [57]. This concept is often used in cryptology for data encryption when transferring through an insecure channel where direct application to biometrics is inappropriate due to the randomness and variability nature of the data.…”
Section: Motivation and Contributionmentioning
confidence: 99%
See 1 more Smart Citation
“…Jin et al [20] combines the notion of biometric cryptosystem and cancellable biometrics, and present a key binding scheme for minutiae-based fingerprint bio-metrics. They exploit the idea of chaffing and winnowing (CWS) [21] to confuse the eavesdropper in order to distinguish between real and bogus data and provide confidentiality without using encryption which actually reduces the overall performance of the system.…”
Section: Related Workmentioning
confidence: 99%
“…There are many ideas proposed in the literature, such as error-correcting codes [29], fuzzy commitments [30], fuzzy extractors [27,31] and fuzzy vaults [32,33]. These algorithms have already been referenced in newly presented key agreement schemes.…”
Section: Related Workmentioning
confidence: 99%