Deep face fuzzy vault: Implementation and performance

C Rathgeb, J Merkle, J Scholz, B Tams… - Computers & …, 2022 - Elsevier
Biometric technologies, especially face recognition, have become an essential part of
identity management systems worldwide. In deployments of biometrics, secure storage of …

Secure chaff-less fuzzy vault for face identification systems

X Dong, S Kim, Z Jin, JY Hwang, S Cho… - ACM Transactions on …, 2021 - dl.acm.org
Biometric cryptosystems such as fuzzy vaults represent one of the most popular approaches
for secret and biometric template protection. However, they are solely designed for biometric …

A bio-cryptographic system based on offline signature images

GS Eskander, R Sabourin, E Granger - Information sciences, 2014 - Elsevier
In bio-cryptography, biometric traits are replacing traditional passwords for secure exchange
of cryptographic keys. The Fuzzy Vault (FV) scheme has been successfully employed to …

Fuzzy vault scheme based on fixed-length templates applied to dynamic signature verification

W Ponce-Hernandez, R Blanco-Gonzalo… - IEEE …, 2020 - ieeexplore.ieee.org
As a consequence of the wide deployment of biometrics-based recognition systems, there
are increasing concerns about the security of the sensitive information managed. Various …

Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm

M Khalil-Hani, MN Marsono, R Bakhteri - Future Generation Computer …, 2013 - Elsevier
Fuzzy vault is a scheme that complements traditional cryptographic security systems by
combining it with biometric authentication to overcome the security vulnerability inherent in …

Fingerprint-based fuzzy vault: Implementation and performance

K Nandakumar, AK Jain… - IEEE transactions on …, 2007 - ieeexplore.ieee.org
Reliable information security mechanisms are required to combat the rising magnitude of
identity theft in our society. While cryptography is a powerful tool to achieve information …

Cancellable fuzzy vault with periodic transformation for biometric template protection

TK Dang, QC Truong, TTB Le, H Truong - IET Biometrics, 2016 - Wiley Online Library
Nowadays, biometrics‐based authentication is playing a potential approach for many
modern applications such as banking, homeland security etc. However, the end‐users may …

The fuzzy vault for fingerprints is vulnerable to brute force attack

P Mihailescu - arXiv preprint arXiv:0708.2974, 2007 - arxiv.org
The\textit {fuzzy vault} approach is one of the best studied and well accepted ideas for
binding cryptographic security into biometric authentication. The vault has been …

Cracking fuzzy vaults and biometric encryption

WJ Scheirer, TE Boult - 2007 Biometrics Symposium, 2007 - ieeexplore.ieee.org
This paper is a security analysis of leading privacy enhanced technologies (PETs) for
biometrics including biometric fuzzy vaults (BFV) and biometric encryption (BE). The lack of …

Multibiometric cryptosystems based on feature-level fusion

A Nagar, K Nandakumar, AK Jain - IEEE transactions on …, 2011 - ieeexplore.ieee.org
Multibiometric systems are being increasingly de-ployed in many large-scale biometric
applications (eg, FBI-IAFIS, UIDAI system in India) because they have several advantages …