Noninvertible minutia cylinder-code representation

M Ferrara, D Maltoni, R Cappelli - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Although several fingerprint template protection methods have been proposed in the
literature, the problem is still unsolved, since enforcing nonreversibility tends to produce an …

Design of alignment-free cancelable fingerprint templates via curtailed circular convolution

S Wang, J Hu - Pattern Recognition, 2014 - Elsevier
Fraudulent use of stolen fingerprint data and privacy invasion by tracking individuals
unlawfully with shared or stolen fingerprint data justify the significance of fingerprint template …

A blind system identification approach to cancelable fingerprint templates

S Wang, J Hu - Pattern Recognition, 2016 - Elsevier
Cancelable biometrics is an important biometric template protection scheme. With no a priori
image pre-alignment, alignment-free cancelable fingerprint templates do not suffer from …

Privacy-preserving speaker verification and identification using gaussian mixture models

MA Pathak, B Raj - IEEE Transactions on Audio, Speech, and …, 2012 - ieeexplore.ieee.org
Speech being a unique characteristic of an individual is widely used in speaker verification
and speaker identification tasks in applications such as authentication and surveillance …

Fingerprint template protection with minutiae-based bit-string for security and privacy preserving

Z Jin, ABJ Teoh, TS Ong, C Tee - Expert systems with applications, 2012 - Elsevier
Recently, biometric template protection has received great attention from the research
community due to the security and privacy concerns for biometric template. Although a …

Generating stable biometric keys for flexible cloud computing authentication using finger vein

Z Wu, L Tian, P Li, T Wu, M Jiang, C Wu - Information Sciences, 2018 - Elsevier
Cloud computing is profoundly changing the way of data storage, transfer and process. User
authentication is the first security barrier for cloud computing. However, the security of …

Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures

C Chen, J Chen, HW Lim, Z Zhang, D Feng… - Topics in Cryptology–CT …, 2013 - Springer
It has been an appealing but challenging goal in research on attribute-based encryption
(ABE) and attribute-based signatures (ABS) to design a secure scheme with short …

Binary feature vector fingerprint representation from minutiae vicinities

J Bringer, V Despiegel - 2010 Fourth IEEE International …, 2010 - ieeexplore.ieee.org
Today, when comparing classical fingerprint matching and more constrained algorithms, like
after binary quantization for biometric privacy protection purpose, there is an important gap …

Fingerprint template protection: From theory to practice

AK Jain, K Nandakumar, A Nagar - Security and Privacy in biometrics, 2013 - Springer
One of the potential vulnerabilities in a biometric system is the leakage of biometric template
information, which may lead to serious security and privacy threats. Most of the available …

Symmetric keyring encryption scheme for biometric cryptosystem

YL Lai, JY Hwang, Z Jin, S Kim, S Cho, ABJ Teoh - Information sciences, 2019 - Elsevier
In this paper, we propose a novel biometric cryptosystem for vectorial biometrics called
symmetric keyring encryption (SKE), inspired by Rivest's keyring model (2016). Unlike …