A Biometric Template Security Approach to Fingerprints Based on Polynomial Transformations
References:
[1] D. Maltoni, D. Maio, A. K. Jain, and Salil Prabhakar, Handbook of
Fingerprint Recognition, 2009.
[2] N. Dahiya and C. Kant, “Biometrics Security Concerns,” in Second
International Conference on Advanced Computing & Communication
Technologies Biometrics, 2012, pp. 299–304.
[3] R. Cappelli, A. Lumini, D. Maio, and D. Maltoni, “Fingerprint
Image Reconstruction from Standard Templates,” IEEE Transactions
On Pattern Analysis And Machine Intelligence, vol. 29, no. 9, pp.
1489–1503, 2007.
[4] A. K. Jain, K. Nandakumar, and A. Nagar, “Fingerprint Template
Protection : From Theory to Practice,” in Security and Privacy in
Biometrics, 2013, pp. 187—-214.
[5] ——, “Biometric Template Security,” EURASIP Journal on Advances
in Signal Processing, vol. 2008, pp. 1—-17, 2008.
[6] M. M. Roja and S. Sawarkar, “ElGamel Encryption for Biometric
Database Protection,” International Journal of Computer Applications,
vol. 68, no. 6, pp. 10–14, 2013.
[7] A. Juels and M. Wattenberg, “A fuzzy commitment scheme,”
in Proceedings of the 6th ACM conference on Computer and
communications security. ACM, 1999, pp. 28–36.
[8] A. Juels and M. Sudan, “A Fuzzy Vault Scheme,” in IEEE International
Symposium on Information Theory, 2002, p. 408.
[9] X. Li and D. Sun, “A Dual-Mode Fingerprint Fusion Encryption Method
Based on Fuzzy Vault,” in International Conference on Cyber-Enabled
Distributed Computing and Knowledge Discover, no. 60773015, 2012,
pp. 208–215.
[10] R. M. Bolle, N. K. Ratha, J. H. Connell, and R. M. Bolle, “Enhancing
security and privacy in biometrics-based authentication systems,” IBM
systems Journal, vol. 40, no. 3, pp. 614–634, 2001.
[11] N. Ratha, J. Connell, and R. M. Bolle, “Cancelable Biometrics : A Case
Study in Fingerprints,” pp. 18–21, 2006.
[12] N. K. Ratha, S. Chikkerur, J. Connell, R. M. Bolle, and S. Member,
“Generating Cancelable Fingerprint Templates,” IEEE Transactions On
Pattern Analysis And Machine Intelligence, vol. 29, no. 4, pp. 561–572,
2007.
[13] A. K. Jain, S. Prabhakar, L. Hong, and S. Pankanti, “FingerCode:
a filterbank for fingerprint representation and matching,” in IEEE
Computer Society Conference on Computer Vision and Pattern
Recognition, vol. 2, 1999, p. 8.
[14] R. Belguechi, C. Rosenberger, and S. A. Aoudia, “BioHashing for
securing fingerprint minutiae templates,” in International Conference on
Pattern Recognition, 2010, pp. 1172–1175.
[15] R. Belguechi, E. Cherrier, C. Rosenberger, and S. Ait-aoudia,
“Operational bio-hash to preserve privacy of fingerprint minutiae
templates,” IET Biometrics, no. February, pp. 1–9, 2013.
[16] A. Teoh, D. Ngo, C. Ling, and A. Goh, “Biohashing : Two factor
authentication featuring fingerprint data and tokenised random number,”
Pattern Recognition, vol. 37, pp. 2245–2255, 2004.
[17] U. Uludag, S. Pankanti, and A. K. Jain, “Fuzzy Vault for Fingerprints,”
pp. 310–319, 2005.