Arakala et al., 2008 - Google Patents
Practical considerations for secure minutiae based templatesArakala et al., 2008
View PDF- Document ID
- 14515143476565441364
- Author
- Arakala A
- Horadam K
- Boztas S
- Publication year
- Publication venue
- 2008 Biometrics Symposium
External Links
Snippet
We illustrate the steps in building a secure authentication system using a construct called PinSketch where the identifier is a set of points derived from the minutiae extracted from a fingerprint. We define a relative set difference based threshold for matching templates, that …
- 238000000034 method 0 abstract description 10
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00067—Preprocessing; Feature extraction (minutiae)
- G06K9/00073—Extracting features related to minutiae and pores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00087—Matching; Classification
- G06K9/00093—Matching features related to minutiae and pores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00067—Preprocessing; Feature extraction (minutiae)
- G06K9/0008—Extracting features related to ridge properties; determining the fingerprint type, e.g. whorl, loop
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US8375218B2 (en) | Pre-processing biometric parameters before encoding and decoding | |
| Nandakumar | A fingerprint cryptosystem based on minutiae phase spectrum | |
| Sutcu et al. | Protecting biometric templates with sketch: Theory and practice | |
| Arakala et al. | Fuzzy extractors for minutiae-based fingerprint authentication | |
| Kelkboom et al. | Preventing the decodability attack based cross-matching in a fuzzy commitment scheme | |
| Uludag et al. | Securing fingerprint template: Fuzzy vault with helper data | |
| EP1927934B1 (en) | Method for securely storing biometric parameters in database | |
| Jain et al. | Fingerprint template protection: From theory to practice | |
| Chang et al. | Robust extraction of secret bits from minutiae | |
| Lim et al. | Biometric feature-type transformation: Making templates compatible for secret protection | |
| JP5288935B2 (en) | Preprocessing method for biometric parameters before encoding and decoding | |
| Yang et al. | A delaunay triangle-based fuzzy extractor for fingerprint authentication | |
| Billeb et al. | Biometric template protection for speaker recognition based on universal background models | |
| Benhammadi et al. | Password hardened fuzzy vault for fingerprint authentication system | |
| Maiorana et al. | User adaptive fuzzy commitment for signature template protection and renewability | |
| Dong et al. | Secure chaff-less fuzzy vault for face identification systems | |
| Wu et al. | Transforming a pattern identifier into biometric key generators | |
| Nguyen et al. | Performance and security‐enhanced fuzzy vault scheme based on ridge features for distorted fingerprints | |
| Lu et al. | Finger multi-biometric cryptosystem using feature-level fusion | |
| Argyropoulos et al. | A channel coding approach for human authentication from gait sequences | |
| Vetro et al. | Securing biometric data | |
| Zhou | Template protection and its implementation in 3D face recognition systems | |
| Arakala et al. | Practical considerations for secure minutiae based templates | |
| Wang et al. | An information-theoretic analysis of revocability and reusability in secure biometrics | |
| Imamverdiev et al. | A method for cryptographic key generation from fingerprints |