9
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Using PRNG Generated Templates to Protect Fingerprint Database

&
Pages 18-32 | Published online: 07 Jul 2014

References

  • Bayly, D., Castro, M., Arakala, A., Jeffers, J., & Horadam, K. (2010). Fractional biometrics: safeguarding privacy in biometric applications. International Journal Information Security, 9:69–82.
  • Bringer, J., & Chabanne, H. (2008). An Authentication Protocol with Encrypted Biometric Data. LNCS, 5023: 109–124.
  • Bringer, J., Chabanne, H., & Kindarji, B. (2009). Identification with Encrypted Biometric Data Made Feasible. International Conference on Communication and Information Systems Security Symposium.
  • Cavoukian, A., & Stoianov, A. (2007). Biometric encryption: A positive-sum technology that achieves strong authentication, security and privacy. Information and privacy commissioner of Ontario.
  • Ellison, C. (2001). Cryptographic Random Numbers. Available online: http://world.std.com/∼cme/html/randomness.html
  • Feng, Q. Su, F. Cai, A., & Zhao, F. (2008). Cracking Cancelable Fingerprint Template of Ratha. International Symposium on Computer Science and Computational Technology, 2: 572–575.
  • Hill, C. (2002). Risk of Masquerade Arising from the Storage of Biometrics. Thesis for the Bachelor of Science, Dept. of CS, Australian National University, 2002.
  • Jain, A., Nandakumar, K., & Nagar, A. (2008). Biometric Template Security. Journal on Advances in Signal Processing, Special Issue on Advanced Signal Processing and Pattern Recognition Methods for Biometrics.
  • Juels, A., & Sudan, M. (2002). A Fuzzy Vault Scheme. IEEE International Symposium on Information Theory.
  • Lee, Y., Bae, K., Lee, S. Park, K., & Kim, J. (2007). Biometric Key Binding: Fuzzy Vault Based on Iris Images. LNCS, 4642: 800–808.
  • Nagar, A., Nandakumar, K., & Jain, A. (2010). A hybrid biometric cryptosystem for securing fingerprint minutiae templates. Pattern Recognition Letters, 31 (8): 733–741.
  • Nandakumar, K., & Jain, A. (2008). Multibiometric Template Security Using Fuzzy Vault. The 2nd IEEE International Conference on Biometrics: Theory, Applications and Systems, pp: 1–6.
  • Ratha, N., Chikkerur, S., Connell, J., & Bolle, R. (2007). Generating Cancelable Fingerprint Templates. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(4): 561–572.
  • Ratha, N., Connell, J., & Bolle, R. (2001). Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal, 40(2): 614–634.
  • Ratha, N., Connell, J., Bolle, R., & Chikkerur, S. (2006). Cancelable Biometrics: A Case Study in Fingerprints. 18th International Conference on Pattern Recognition, pp: 370–373.
  • Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., Heckert, A., Dray, J., & Vo, S. (2010). A Statistical Test Suite for the Validation of Random Number Generators and Pseudo Random Number Generators for Cryptographic Applications. NIST Special Publication 800-22 (Rev.1).
  • Secure Hash Standard. Federal Information Processing Standards Publication 180-1 (1995). Available at: http://www.itl.nist.gov/fipspubs/fip180-1.htm
  • Shannon, C. (1949). Communication Theory of Secrecy Systems. Bell System Technical Journal, 28(4): 656–715.
  • Sheng, W., Howells, G., Fairhurst, M., & Deravi, F. (2008). Template-Free Biometric Key Generation by Means of Fuzzy Genetic Clustering. IEEE Transaction on Information Forensics and Security, 3 (2): 183–191.
  • Tulyakov, S., Farooq, F., Mansukhani, P., & Govindaraju, V. (2007). Symmetric Hash Functions for Secure Fingerprint Biometric Systems. Pattern Recognition Letters, 28(16): 2427–2436.
  • Wilson, C., Watson, C., Garris, M., & Hicklin, A. (2003). Studies of Fingerprint Matching Using the NIST Verification Test Bed (VTB). Available at: http://sequoyah.nist.gov/pub/nist_internal_reports/ir_7020.pdf.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.