2016
DOI: 10.1016/j.jksuci.2014.12.011
|View full text |Cite
|
Sign up to set email alerts
|

New chaff point based fuzzy vault for multimodal biometric cryptosystem using particle swarm optimization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(9 citation statements)
references
References 18 publications
0
9
0
Order By: Relevance
“… [ 85 ] IITK contains 801 side face images, UND-J2 contains 1800 side face images Ear+ Side Face SURF feature fusion of ear and profile face IITK: 99.36, UND-E: 98.02, and UND-J2: 96.02 3. [ 86 ] Face—Yale face database of 165 images and IIT Delhi ear database and 471 images ear images Ear+Face Particle swarm optimisation 90 4. [ 87 ] IITdelhi-2 ear, IITD Delhi palm print database Ear+ Palm print Local texture descriptor 100 5.…”
Section: Taxonomic Review On Ear Biometricmentioning
confidence: 99%
See 1 more Smart Citation
“… [ 85 ] IITK contains 801 side face images, UND-J2 contains 1800 side face images Ear+ Side Face SURF feature fusion of ear and profile face IITK: 99.36, UND-E: 98.02, and UND-J2: 96.02 3. [ 86 ] Face—Yale face database of 165 images and IIT Delhi ear database and 471 images ear images Ear+Face Particle swarm optimisation 90 4. [ 87 ] IITdelhi-2 ear, IITD Delhi palm print database Ear+ Palm print Local texture descriptor 100 5.…”
Section: Taxonomic Review On Ear Biometricmentioning
confidence: 99%
“…Moreover, it has been identified that the score-level fusion performed is better than the feature level. [ 86 ] proposed particle swarm optimisation (PSO)-based method. The technique was applied on the Face–Yale face database of 165 greyscale images, the IIT Delhi ear database, and 471 image ear images.…”
Section: Taxonomic Review On Ear Biometricmentioning
confidence: 99%
“…It is obvious that ( ) = V( Θ ( ) , Τ ( ) , ) Υ ( ) is least square solution of (12). and technology innovation program of Chongqing University of Science & Technology (YKJCX1720407), and in part by the Chongqing Outstanding Youth Fund Project (cstc2014jcyjjq90002).…”
Section: Cmentioning
confidence: 99%
“…In BCs, a key is either bound (key binding schemes) or extracted (key generation schemes) from biometric data [8]. The key binding schemes can be classified as fuzzy vault schemes [12] and the fuzzy commitment schemes [13]. Regarding key generation schemes, a number of discretized fingerprint descriptors and appropriate error correcting codes were used to propose an effective biometric cryptosystem construction for biometric template protection 2 Complexity in [14].…”
Section: Introductionmentioning
confidence: 99%
“…A fused multimodal system like FLF is used over the fingerprint, retina and finger vein to reduce the genuine acceptance rate (GAR) and also the security against spoofing is improved [6]. A chaff point based fuzzy vault extracts the features of face and ear points and the best point is created by selecting the best locations of feature vectors which is found by the particle swarm optimization (PSO) [7]. The fusion over the face and voice modules made by the transformation based fusion algorithm over an ensemble classifier and also the fusion of these behaviour traits are made by Adaptive Neuro Fuzzy Inference System (ANFIS) [8], [9].…”
Section: Introductionmentioning
confidence: 99%