[go: up one dir, main page]

Arakala et al., 2008 - Google Patents

Practical considerations for secure minutiae based templates

Arakala et al., 2008

View PDF
Document ID
14515143476565441364
Author
Arakala A
Horadam K
Boztas S
Publication year
Publication venue
2008 Biometrics Symposium

External Links

Snippet

We illustrate the steps in building a secure authentication system using a construct called PinSketch where the identifier is a set of points derived from the minutiae extracted from a fingerprint. We define a relative set difference based threshold for matching templates, that …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00067Preprocessing; Feature extraction (minutiae)
    • G06K9/00073Extracting features related to minutiae and pores
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00087Matching; Classification
    • G06K9/00093Matching features related to minutiae and pores
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00067Preprocessing; Feature extraction (minutiae)
    • G06K9/0008Extracting features related to ridge properties; determining the fingerprint type, e.g. whorl, loop

Similar Documents

Publication Publication Date Title
US8375218B2 (en) Pre-processing biometric parameters before encoding and decoding
Nandakumar A fingerprint cryptosystem based on minutiae phase spectrum
Sutcu et al. Protecting biometric templates with sketch: Theory and practice
Arakala et al. Fuzzy extractors for minutiae-based fingerprint authentication
Kelkboom et al. Preventing the decodability attack based cross-matching in a fuzzy commitment scheme
Uludag et al. Securing fingerprint template: Fuzzy vault with helper data
EP1927934B1 (en) Method for securely storing biometric parameters in database
Jain et al. Fingerprint template protection: From theory to practice
Chang et al. Robust extraction of secret bits from minutiae
Lim et al. Biometric feature-type transformation: Making templates compatible for secret protection
JP5288935B2 (en) Preprocessing method for biometric parameters before encoding and decoding
Yang et al. A delaunay triangle-based fuzzy extractor for fingerprint authentication
Billeb et al. Biometric template protection for speaker recognition based on universal background models
Benhammadi et al. Password hardened fuzzy vault for fingerprint authentication system
Maiorana et al. User adaptive fuzzy commitment for signature template protection and renewability
Dong et al. Secure chaff-less fuzzy vault for face identification systems
Wu et al. Transforming a pattern identifier into biometric key generators
Nguyen et al. Performance and security‐enhanced fuzzy vault scheme based on ridge features for distorted fingerprints
Lu et al. Finger multi-biometric cryptosystem using feature-level fusion
Argyropoulos et al. A channel coding approach for human authentication from gait sequences
Vetro et al. Securing biometric data
Zhou Template protection and its implementation in 3D face recognition systems
Arakala et al. Practical considerations for secure minutiae based templates
Wang et al. An information-theoretic analysis of revocability and reusability in secure biometrics
Imamverdiev et al. A method for cryptographic key generation from fingerprints