2007
DOI: 10.1109/tpami.2007.1004
|View full text |Cite
|
Sign up to set email alerts
|

Generating Cancelable Fingerprint Templates

Abstract: Biometrics-based authentication systems offer obvious usability advantages over traditional password and token-based authentication schemes. However, biometrics raises several privacy concerns. A biometric is permanently associated with a user and cannot be changed. Hence, if a biometric identifier is compromised, it is lost forever and possibly for every application where the biometric is used. Moreover, if the same biometric is used in multiple applications, a user can potentially be tracked from one applica… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

2
495
0
4

Year Published

2008
2008
2018
2018

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 777 publications
(501 citation statements)
references
References 23 publications
2
495
0
4
Order By: Relevance
“…Another method is the use of biometrics, which is suggested as an ultimate identity and authentication technique for e-learning [11]. Irrespective of known biometric challenges [2,10,17], researchers explore the possibilities of employing biometrics in e-assessment. Current researches focus on multi-biometrics to support services for identity and authentication [3,16].…”
Section: Identity and Authentication Security Goalsmentioning
confidence: 99%
“…Another method is the use of biometrics, which is suggested as an ultimate identity and authentication technique for e-learning [11]. Irrespective of known biometric challenges [2,10,17], researchers explore the possibilities of employing biometrics in e-assessment. Current researches focus on multi-biometrics to support services for identity and authentication [3,16].…”
Section: Identity and Authentication Security Goalsmentioning
confidence: 99%
“…The template protection schemes proposed in literatures can be broadly classified into two categories, feature transformation approach and biometric cryptosystem [2], [3]. The former [4]- [16] has a high degree of freedom for signal processing in the protected domain, compared to the latter [17]- [21]. Feature transform schemes can be further categorized as salting biometric [4]- [8] and noninvertible [9]- [16] transforms.…”
Section: Introductionmentioning
confidence: 99%
“…One of the most promising solutions to this problem is cancelable biometrics [2], where a system does not store the original biometric data; rather, it stores only the version transformed by a noninvertible transform [3]. Then, verification is done on this transformed data without any need to recover the original data, keeping the original data safe even if the system is compromised.…”
Section: Introductionmentioning
confidence: 99%