2011
DOI: 10.1016/j.optcom.2010.10.007
|View full text |Cite
|
Sign up to set email alerts
|

Soft biometrics in conjunction with optics based biohashing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 21 publications
0
7
0
Order By: Relevance
“…This section is devoted to the definition of a framework to verify if the previous properties are fulfilled by a cancelable biometric system. Based on some of the early works [15], [3] which identified weak links in each subsystem of a generic authentication system, some papers consider the possible attacks in cancelable biometric systems (such as those presented in [18], [7], [13], [16]). In this paper, we strengthen this study with the proposition of an evaluation methodology, by taking into account each of the required properties.…”
Section: Proposed Methodologymentioning
confidence: 99%
See 1 more Smart Citation
“…This section is devoted to the definition of a framework to verify if the previous properties are fulfilled by a cancelable biometric system. Based on some of the early works [15], [3] which identified weak links in each subsystem of a generic authentication system, some papers consider the possible attacks in cancelable biometric systems (such as those presented in [18], [7], [13], [16]). In this paper, we strengthen this study with the proposition of an evaluation methodology, by taking into account each of the required properties.…”
Section: Proposed Methodologymentioning
confidence: 99%
“…The BioHashing algorithm is one of the most popular technique and is based on biometric data salting. It has been developed for different biometric modalities such as those presented in [19], [2], [16]. In the sequel, we focus on BioHashing since some weaknesses have been reported in the former approach in [17].…”
Section: Previous Workmentioning
confidence: 99%
“…They reported that their approach showed a promise of fast and secure verification. [19] suggested a transformation-based biometric template protection scheme as an improvement of the BioHashing algorithm where the projection matrix was created by integrating the secret and the biometric data. Experiment conducted on two biometric modalities showed that the proposed technique is efficient.…”
Section: Related Workmentioning
confidence: 99%
“…It should be infeasible to cross correlate two protected templates. Based on some of the early works [22], [4] which identified weak links in each subsystem of a generic authentication system, some papers considered the possible attacks in cancelable biometric systems (such as those presented in [9], [16], [25], [27]). We follow the Shannon's maxim ("The enemy knows the system"), we so assume that the impostor has all necessary information on the process used to generate the BioCode (feature generation method, BioCode size...).…”
Section: B Evaluationmentioning
confidence: 99%
“…The BioHashing algorithm is one of the most popular technique and is based on biometric data salting. It has been developed for different biometric modalities such as those presented in [2], [25], [28].…”
Section: Introductionmentioning
confidence: 99%