2017 International Conference on Computing, Communication and Automation (ICCCA) 2017
DOI: 10.1109/ccaa.2017.8229966
|View full text |Cite
|
Sign up to set email alerts
|

Fuzzy vault template protection for multimodal biometric system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…Feature-level fusion is the most stable of the different fusion techniques. The feature set derived from multiple biometric features and used for multimodal device design could be inconsistent 17 .…”
Section: Related Workmentioning
confidence: 99%
“…Feature-level fusion is the most stable of the different fusion techniques. The feature set derived from multiple biometric features and used for multimodal device design could be inconsistent 17 .…”
Section: Related Workmentioning
confidence: 99%
“…Kaur and Sofat [35] fuzzy vault work incorporates a fuzzy vault multimodal biometric template approach. The fuzzy vault is a combination of extracted minutia points fingerprint and face using crossing number and principle component analysis, where the fused is the input vault, for encoding, and Lagrange interpolation to recover the vault key, for decoding.…”
Section: B Biometric Security and Privacy Workmentioning
confidence: 99%
“…Lai et al [16] YES NO YES NO Lai et al [17] YES NO YES NO Nagar et al [15] YES NO YES NO Nassir and Perumal [14] YES YES NO NO Rathgeb et al [20] YES NO YES NO Kumar and Kumar [12] YES NO YES NO Li et al [13] YES NO YES NO Kaur and Sofat [35] YES NO NO NO Zhou and Ren [11] YES NO YES NO Toli and Preneel [10] YES YES NO NO Kaur and Khanna [18] YES NO YES NO Our proposed scheme YES YES YES YES complete the purpose task. Also, it allows us to use the IDN algorithm created, ensuring the anonymity of the records.…”
Section: Interoperabilitymentioning
confidence: 99%
“…The vault can be "opened" (and the sensitive message recovered) by using an unlocking set B, where B has a large overlap with A. Biometric-based fuzzy vault uses a user's biometric features for the locking and unlocking sets. Fuzzy vaults have been implemented using fingerprint, iris, and face data [6,21,17,15,14], and for higher security, using multimodal biometric systems [13]. Fuzzy vaults have been used for biometric-based protection of cryptographic keys in smart cards [6] and online authentication systems [24].…”
Section: Introductionmentioning
confidence: 99%