2021
DOI: 10.1145/3442198
|View full text |Cite
|
Sign up to set email alerts
|

Secure Chaff-less Fuzzy Vault for Face Identification Systems

Abstract: Biometric cryptosystems such as fuzzy vaults represent one of the most popular approaches for secret and biometric template protection. However, they are solely designed for biometric verification, where the user is required to input both identity credentials and biometrics. Several practical questions related to the implementation of biometric cryptosystems remain open, especially in regard to biometric template protection. In this article, we propose a face cryptosystem for identification (FCI) in which only… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(15 citation statements)
references
References 35 publications
0
15
0
Order By: Relevance
“…The hashing methods considered thus far have used either cryptographic hash functions or non-cryptographic hashing techniques. A face BTP method that combines these two hashing approaches was presented in [29]. More specifically, [29] proposes a protected face identification system consisting of two sub-systems.…”
Section: A Non-nn Face Btp Methodsmentioning
confidence: 99%
See 4 more Smart Citations
“…The hashing methods considered thus far have used either cryptographic hash functions or non-cryptographic hashing techniques. A face BTP method that combines these two hashing approaches was presented in [29]. More specifically, [29] proposes a protected face identification system consisting of two sub-systems.…”
Section: A Non-nn Face Btp Methodsmentioning
confidence: 99%
“…A face BTP method that combines these two hashing approaches was presented in [29]. More specifically, [29] proposes a protected face identification system consisting of two sub-systems. The first sub-system compares the probe face template to each of the N reference face templates in the database, where all templates are protected by the noncryptographic Index-of-Max (IoM) hashing method proposed in [36] (which is a special instance of LSH).…”
Section: A Non-nn Face Btp Methodsmentioning
confidence: 99%
See 3 more Smart Citations