2008 International Conference on Information Security and Assurance (Isa 2008) 2008
DOI: 10.1109/isa.2008.60
|View full text |Cite
|
Sign up to set email alerts
|

Memory-Efficient Fuzzy Fingerprint Vault based on the Geometric Hashing

Abstract: One of the solutions to the auto-alignment problem in the fuzzy fingerprint vault exploited the idea of the geometric hashing technique. Although this solution can provide higher verification accuracy, it requires more memory space due to the large size of the hash table. In this paper, we propose an approach to reduce the size of the hash table by using the time-memory tradeoff without sacrificing the verification accuracy. That is, instead of generating the full hash table at the enrollment phase, our approa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 7 publications
0
7
0
Order By: Relevance
“…The corresponding UNLOCK function takes as input a vault V A and a biometric data (set B) and outputs k if B is close enough to A, or null, otherwise. Based on the fuzzy vault, some implementation results for fingerprint have been reported [2,3,8,10].…”
Section: D Lattice Structures To Protect the Correlation Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…The corresponding UNLOCK function takes as input a vault V A and a biometric data (set B) and outputs k if B is close enough to A, or null, otherwise. Based on the fuzzy vault, some implementation results for fingerprint have been reported [2,3,8,10].…”
Section: D Lattice Structures To Protect the Correlation Attackmentioning
confidence: 99%
“…Thus, adding more chaffs for higher security requires a larger geometric hash table. The details of this memory reduction technique by paying more time can be found in [8,9,10].…”
Section: D Lattice Structures To Protect the Correlation Attackmentioning
confidence: 99%
“…In their paper, the authors instance the movie lover who wants to find someone with similar preference. Due to its error-tolerance property, the fuzzy vault scheme has been utilized in various researches, especially in biometrics area [2][3][4][5][6][7][8][9][10][11].…”
Section: Introductionmentioning
confidence: 99%
“…Practically, the fingerprints are reliable biometric features, and their minutiae can be represented as an unordered set [6]. Therefore, the most practical fuzzy vault schemes are implemented using fingerprints [6][7][8][9][10][11][12][13][14][15][16][17][18][19]. Besides this, some implementations using other modalities are presented in [20][21][22][23].…”
Section: Introductionmentioning
confidence: 99%
“…The disadvantages of their schemes are: (i) the basic features could not represent the topology information of the entire fingerprint, and they could be modified by non-linear deformation of a fingerprint and (ii) their minutiae sets were aligned within a black box. Similar to [6,7], the fuzzy vault schemes proposed in [8][9][10][11][12] used the minutiae for the vault templates, which required the www.ietdl.org automatic alignment schemes to prove the effectiveness of solving the distortion in a fingerprint image. These schemes effectively solved the distortion of the fingerprint image; however, their alignment schemes were complicated.…”
Section: Introductionmentioning
confidence: 99%