2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06)
DOI: 10.1109/cvprw.2006.185
|View full text |Cite
|
Sign up to set email alerts
|

Securing Fingerprint Template: Fuzzy Vault with Helper Data

Abstract: An important issue gaining attention in biometrics com

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
140
0
2

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 175 publications
(142 citation statements)
references
References 17 publications
0
140
0
2
Order By: Relevance
“…More recently, Uludag and Jain [14] presented an advancement of the earlier algorithm with a genuine accept rate of ∼ 72%. However, the alignment is highly prone to error, and does not work on poor quality or partial images.…”
Section: Previous Workmentioning
confidence: 99%
“…More recently, Uludag and Jain [14] presented an advancement of the earlier algorithm with a genuine accept rate of ∼ 72%. However, the alignment is highly prone to error, and does not work on poor quality or partial images.…”
Section: Previous Workmentioning
confidence: 99%
“…The information of the templates should be hidden to keep individual biological information secret. Many methods have been recently proposed, for example, the biometric cryptosystems [2]- [5], cancellable fingerprint templates [6]- [10], and so on. However, in these methods, since the minutia-based templates are basically used, the recognition accuracy tends to become low in comparison with that of the image-based templates.…”
Section: % As For the Robustness Of The Proposed Templates It Has Bmentioning
confidence: 99%
“…There is a tradeoff between the number of chaff points, the protection capability and the key recovery rate. For more detail about the fuzzy vault and its implementation we would refer the reader to the many published papers [46,[76][77][78][79][80][81][82][83][84][85][86].…”
Section: Key Bindingmentioning
confidence: 99%
“…In the verification phase, the key can be released by combining the protected template with a newly captured probe biometric sample. Examples of known key binding and release implementations are the Code-Offset Construction [40,64,65], Fuzzy Commitment Scheme (FCS) [36,[66][67][68][69][70][71], the Helper Data System (HDS) [33][34][35]72,73], Quantization Index Modulation (QIM) [48,74,75], and the Fuzzy Vault [46,[76][77][78][79][80][81][82][83][84][85][86]. The first three schemes are related to each other as portrayed in Figure 2.6.…”
Section: Key Bindingmentioning
confidence: 99%