2008 International Symposium on Computer Science and Computational Technology 2008
DOI: 10.1109/iscsct.2008.226
|View full text |Cite
|
Sign up to set email alerts
|

Cracking Cancelable Fingerprint Template of Ratha

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
36
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 91 publications
(37 citation statements)
references
References 15 publications
1
36
0
Order By: Relevance
“…Since, the comparison scores can be overwritten , the intruder can perform hill climbing attack for both biometric slating and non-invertible transformation. Hill climbing attack is performed against block remapping process in (Quan et al 2008) and surface folding process in (Shin et al 2009). …”
Section: Hill Climbing Attacksmentioning
confidence: 99%
“…Since, the comparison scores can be overwritten , the intruder can perform hill climbing attack for both biometric slating and non-invertible transformation. Hill climbing attack is performed against block remapping process in (Quan et al 2008) and surface folding process in (Shin et al 2009). …”
Section: Hill Climbing Attacksmentioning
confidence: 99%
“…Comparison scores, calculated in encrypted domain, could be overwritten [184] and hill-climbing attacks [186] could be performed. In [206,207], attacks against the block re-mapping and surface-folding algorithm of [12] based on fingerprints are proposed.…”
Section: Biometric Cryptosystemsmentioning
confidence: 99%
“…Moreover, it is difficult to quantify the level of security provided by such techniques [3]. As an example, a revocable transform is applied on finger print templates in [49] which can be cracked by the technique proposed in [47].…”
Section: Related Workmentioning
confidence: 99%