2013
DOI: 10.1364/ao.52.008161
|View full text |Cite
|
Sign up to set email alerts
|

Secure biometric image sensor and authentication scheme based on compressed sensing

Abstract: It is important to ensure the security of biometric authentication information, because its leakage causes serious risks, such as replay attacks using the stolen biometric data, and also because it is almost impossible to replace raw biometric information. In this paper, we propose a secure biometric authentication scheme that protects such information by employing an optical data ciphering technique based on compressed sensing. The proposed scheme is based on two-factor authentication, the biometric informati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(14 citation statements)
references
References 11 publications
0
14
0
Order By: Relevance
“…Actually, the same issue may arise also without such threshold if a form of regularization is naively applied. As an example, using Φ( x ) = || x || 1 for promoting sparsity (Candès et al, 2006 ; Donoho, 2006 ) in the tractogram, small coefficients may tend to be suppressed depending on how the specific algorithm for solving Equation (2) handles highly correlated atoms. Thus, false negatives may be generated also in this case and different regularization functions may lead to even more unpredictable results; this is why we adopted classical least squares in all our experiments.…”
Section: A Parallel With Local Reconstruction and Inherited Issuesmentioning
confidence: 99%
“…Actually, the same issue may arise also without such threshold if a form of regularization is naively applied. As an example, using Φ( x ) = || x || 1 for promoting sparsity (Candès et al, 2006 ; Donoho, 2006 ) in the tractogram, small coefficients may tend to be suppressed depending on how the specific algorithm for solving Equation (2) handles highly correlated atoms. Thus, false negatives may be generated also in this case and different regularization functions may lead to even more unpredictable results; this is why we adopted classical least squares in all our experiments.…”
Section: A Parallel With Local Reconstruction and Inherited Issuesmentioning
confidence: 99%
“…This can be achieved by minimizing the KL-divergence between the distribution of the external states estimated from the all-to-all network, and the distribution estimated from a given connection structure (i.e., , see Section Optimality of Connectivity for details). However, this calculation requires combinatorial optimization, and local approximation is generally difficult (Donoho, 2006 ), thus expectedly the brain employs some heuristic alternatives. Experimental results indicate that synaptic connections and weights are often representing similar features.…”
Section: Resultsmentioning
confidence: 99%
“…This approach was demonstrated in refs. . In this case we do not have to obtain and store in device’s memory actual vein pattern images thus protecting the user against stealing of the personal data.…”
Section: Methodsmentioning
confidence: 99%
“…The reconstruction time in our experiments is more or less equal for the both types of SLM with value ~10 s for 500 masks used in 60 × 60 pixels image reconstruction. This value can be significantly decreased by using fast algorithms and optimization procedures used in software transfer to real device prototype; however, according to the above‐mentioned works , one can skip reconstruction procedure and for the authentication purposes use only a 1D raw detector signal thus increasing the whole system’s performance.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation