117
Views
9
CrossRef citations to date
0
Altmetric
Research papers

Palm and hand vein-based fuzzy vault generation scheme for multibiometric cryptosystem

&
Pages 111-118 | Received 01 Nov 2012, Accepted 30 Sep 2014, Published online: 16 Oct 2014

References

  • IBM Corporation. ‘The consideration of data security in a computer environment’, Technical Report G520-2169, IBM, New York, USA, 1970.
  • Mitnick KD, Simon WL and Wozniak S. The Art of Deception: Controlling the Human Element of Security, 2002 (Wiley, New York).
  • Klien DV. A survey of, and improvements to unix password security, Proc. 2nd USENIX Workshop on Security, Boston, MA, USA, August 1990, USENIX Association, pp. 5–14.
  • Jain AK, Bolle R and Pankanti S. Biometrics: Personal Identification in Networked Society, 1999 (Kluwer Academic Publishers, London).
  • Jain AK, Nandakumar K, Lu X and Park U. Integrating faces, finger- prints and soft biometric traits for user recognition, Proc. ECCV Int. Workshop on Biometric authentication: BioAW 2004, Prague, Czech Republic, May 2004, Springer, Vol. 3087, pp. 259–269.
  • Adler A. Images can be regenerated from quantized biometric match score data, Proc. Canadian Conf. on Electrical and computer engineering, Niagara Falls, Ont., Canada, May 2004, IEEE, pp. 469–472.
  • Ross A, Nandakumar K and Jain AK. Handbook of Multibiometrics, 2006 (Springer, Berlin).
  • Dhamija R and Tygar JD. The battle against phishing: dynamic security skins, Proc. Symposium on Usable privacy and security, Oakland, CA, USA, May 2005, ACM Press, pp. 77–88.
  • Bhargav A, Squicciarini A, Bertino E, Kong XW and Zhang WK. Biometrics-based identifiers for digital identity management, Proc. 9th Symp. on Identity and trust, Gaithersburg, MD, USA, April 2010, NIST, pp. 84–96.
  • Wang LY and Leedham G. Near- and far- infrared imaging for vein pattern biometrics, Proc. IEEE Int. Conf. on Video and signal based surveillance, Sydney, Australia, November 2006, IEEE, p. 52.
  • Ding YH, Zhuang DY and Wang KJ. A study of hand vein recognition method, Proc. IEEE Int. Conf. on Mechatronics and automation, Niagara Falls, Ont., Canada, July–August 2005, IEEE, 2106–2110.
  • Lin CL and Fan KC. Biometric verification using thermal images of palm-dorsa vein patterns. IEEE Trans. Circuits Syst. Video Technol., 2004, 14, 199–213.
  • Zhang YB, Li Q, You J and Bhattacharya P. Palm vein extraction and matching for personal authentication. Adv. Vis. Inf. Syst., 2007, 4781, 154–164.
  • Juels A and Wattenberg M. A fuzzy commitment scheme, Proc. 6th ACM Conf. on Computer and communications security, Singapore, November 1999, ACM, pp. 28–36.
  • Cappelli R, Lumini A, Maio D and Maltoni D. Fingerprint image reconstruction from standard templates. IEEE Trans. Pattern Anal. Mach. Intell., 2007, 29, 1489–1503.
  • Uludag U, Pankanti S and Jain AK. Fuzzy vault for fingerprints. Lect. Notes Comput. Sci., 2005, 3546, 310–319.
  • Wu XQ, Gao EY, Tang YB and Wang KQ. A novel biometric system based on hand vein, Proc. 5th Int. Conf. on Frontier of computer science and technology: FCST 2010, Changchun, China, August 2010, Jilin University, pp. 522–526.
  • Wang YD, Li KF and Cui JL. Hand-dorsa vein recognition based on partition Local Binary Pattern, Proc. IEEE 10th Int. Conf. on Signal processing, Hangzhou, China, June 2010, IEEE, pp. 1671–1674.
  • Guo ZH, Zhang D, Zhang L, Zuo WM and Lu GM. Empirical study of light source selection for palmprint recognition. Pattern Recogn. Lett., 2011, 32, 120–126.
  • Guo ZH, Zuo WM, Zhang L and Zhang D. Palmprint verification. Neurocomputing, 2010, 73, 944–950.
  • Li P, Yang X, Cao K, Tao XQ, Wang RF and Tian J. An alignment-free fingerprint cryptosystem based on fuzzy vault scheme. J. Network Comput. Appl., 2010, 33, 207–220.
  • Wu LF, Xiao P, Jiang SY and Yang X. A fuzzy vault scheme for feature fusion. Lect. Notes Comput. Sci., 2011, 7098, 237–243.
  • Sun DM, Xiong K, Liu HL and Qiu ZD. 3D fuzzy vault based on palmprint, Proc. Int. Conf. on Cyber-enabled distributed computing and knowledge discovery: CyberC 2010, Huangshan, China, October 2010, IEEE, pp. 230–234.
  • Hiep DV, Duc TQ. and Lan NTH. A multibiometric encryption key algorithm using fuzzy vault to protect private key in BioPKI based security system, Proc. IEEE RIVF Int. Conf. on Research, innovation, and vision for the future: RIVF 2010, Hanoi, Vietnam, November 2010, IEEE, pp. 1–6.
  • Alvino C, Kohler C, Barrett F, Gurb RE, Gurb RC and Verma R. Study of the changing trends in facial expression recognition. Int. J. Comput. Appl., 2011, 21, 10–16.
  • Ghandi BM, Nagarajan R and Desa H. Classification of facial emotions using guided particle swarm optimization I. Int. J. Comput. Commun. Technol., 2009, 1, 36–46.
  • Ramalho CPL and Soares LD. Hand-based multimodal identification system with secure biometric template storage. Comput. Vis., 2012, 6, 165–173.
  • Uludag U, Pankanti S and Jain AK. Fuzzy vault for fingerprints. Lect. Notes Comput. Sci., 2005, 3546, 310–319.
  • Hao Y, Sun Z, Tan T and Ren C. Multispectral palm image fusion for accurate contact-free palmprint recognition, Proc. IEEE Int. Conf. on Image processing, San Diego, CA, USA, October 2008, IEEE, pp. 281–284.
  • Nandakumar K, Jain AK and Pankanti S. Fingerprint-based fuzzy vault: implementation and performance. IEEE Trans. Inf. Forens. Secur., 2007, 2, 744–757.
  • Ding YH, Zhuang DY and Wang KJ. A study of hand vein recognition method, Proc. IEEE Int. Conf. on Mechatronics & automation, Niagara Falls, Ont., Canada, July–August 2005, IEEE, pp. 2106–2110.
  • Badawi AM. ‘Hand vein database’, at systems and biomedical engineering, Cairo University, Cairo, Egypt, 2005.
  • Palm vein database. Available at: <http://www.idealtest.org>

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.