DOI: 10.1007/978-3-540-74549-5_80
|View full text |Cite
|
Sign up to set email alerts
|

Fuzzy Extractors for Minutiae-Based Fingerprint Authentication

Abstract: Abstract. We propose an authentication scheme using fingerprint biometrics, protected by a construct called a Fuzzy Extractor. We look at a new way of quantizing and digitally representing the minutiae measurements so that a construct called PinSketch can be applied to the minutiae. This is converted to a Fuzzy Extractor by tying some random information to the minutiae measurements. We run a matching algorithm at chosen quantization parameters and show that the authentication accuracy is within acceptable limi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
48
0

Publication Types

Select...
8
2

Relationship

1
9

Authors

Journals

citations
Cited by 73 publications
(48 citation statements)
references
References 11 publications
0
48
0
Order By: Relevance
“…Fuzzy key extraction schemes are classified under the key generation ones and they use helper data [53][54][55][56][57][58]. These schemes can be used as an authentication mechanism where a user is verified via her own biometric template as a key.…”
Section: Key Generation Systemsmentioning
confidence: 99%
“…Fuzzy key extraction schemes are classified under the key generation ones and they use helper data [53][54][55][56][57][58]. These schemes can be used as an authentication mechanism where a user is verified via her own biometric template as a key.…”
Section: Key Generation Systemsmentioning
confidence: 99%
“…While these two ideas sound good, practical implementation was not presented. Some researchers [28], [29] have followed this approach and proposed their own secure sketch and fuzzy extractor schemes.…”
Section: A Biometric Cryptosystems Approachmentioning
confidence: 99%
“…The problem of generating fuzzy extractors from continuous distributions was addressed by Buhan et al [80]. Secure sketch construction for other modalities such as fingerprints [81,82], 3D face [83], and multimodal systems (face and fingerprint) [84] has also been proposed. Protocols for secure authentication in remote applications [85,86] have also been proposed based on the fuzzy extractor scheme.…”
Section: Key Generating Biometric Cryptosystemmentioning
confidence: 99%