2023
DOI: 10.1109/tdsc.2022.3213704
|View full text |Cite
|
Sign up to set email alerts
|

Cancelable Fingerprint Template Construction Using Vector Permutation and Shift-Ordering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 36 publications
0
6
0
Order By: Relevance
“…Baghel et al [78] utilized a non-invertible transformation to specifically combat brute-force and false-accept attacks, while Li et al [76] improved on the concept of IoM hashing to derive an indexing min-max hashing technique to mitigate these attacks. Recently, Abdullahi et al [82] developed a vector permutation and shift-ordering approach to mitigate these attacks.…”
Section: Discussion On Other Attack Scenariosmentioning
confidence: 99%
See 4 more Smart Citations
“…Baghel et al [78] utilized a non-invertible transformation to specifically combat brute-force and false-accept attacks, while Li et al [76] improved on the concept of IoM hashing to derive an indexing min-max hashing technique to mitigate these attacks. Recently, Abdullahi et al [82] developed a vector permutation and shift-ordering approach to mitigate these attacks.…”
Section: Discussion On Other Attack Scenariosmentioning
confidence: 99%
“…To mitigate other attacks such as similarity-based, hill-climbing, preimage, correlation, crossmatch, masquerade, and substitution in fingerprint and face biometric features, Yang et al [100] and Agarwal and Bansal [79] are able to use a linear convolution and an alignment-free non-invertible transformation function, respectively, to mitigate cross-matching attacks. Similarity correlation, pre-image, dictionary, and masquerade attacks were also mitigated in the works of Abdullahi et al [82] and Sardar et al [85]. Apart from inversion and masquerade attacks, Bedari et al [77] also use the Dyno key model to overcome attacks related to revoked templates.…”
Section: Discussion On Other Attack Scenariosmentioning
confidence: 99%
See 3 more Smart Citations