References
- D. Maltoni, et al., Handbook of Fingerprint Recognition, 2003.
- R. Bolle, J. Connell, and N. Ratha, "Biometric Perils and Patches," Pattern Recognition, vol. 35, pp. 2727-2738, 2002. https://doi.org/10.1016/S0031-3203(01)00247-3
- B. Schneier, "The Uses and Abuses of Biometrics," Communications of the ACM, vol. 42, no, 8, pp. 136, 1999. https://doi.org/10.1145/310930.310988
- S. Prabhakar, et al., "Biometric Recognition: Security and Privacy Concerns," IEEE Security and Privacy, pp. 33-42, 2003.
- J. Hu, "Mobile Fingerprint Template Protection: Progress and Open Issues," in Proc. of IEEE ICIEA Conference, pp. 3-5, 2008.
- A. Juels and M. Sudan, "A Fuzzy Vault Scheme," in Proc. of Symp. on Information Theory, pp. 408, 2002.
- T. Clancy, et al., "Secure Smartcard-based Fingerprint Authentication," in Proc. of ACM SIGMM Multim., Biom. Met. & App., pp. 45-522003.,
- U. Uludag, et al., "Fuzzy Vault for Fingerprints," in Proc. of Audio- and Video-based Biometric Person Authentication, pp. 310-319, 2005.
- K. Nandakumar, et al., "Fingerprint-based Fuzzy Vault: Implementation and Performance," IEEE Transactions on Information Forensics and Security, vol. 2, no. 4, pp. 744-757, 2007. https://doi.org/10.1109/TIFS.2007.908165
- S. Yang and I. Verbauwhede, "Automatic Secure Fingerprint Verification System Based on Fuzzy Vault Scheme," in Proc. of IEEE International Conference on Acoustics, Speech, and Signal Processing, Vol. 5, pp. 609-612, 2005.
- Y. Chung, et al., "Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault," LNCS 3822, pp. 358-369, 2005.
- D. Moon, et al., "Fingerprint Template Protection Using Fuzzy Vault," LNCS 4707, pp.1141-1151, 2007.
- D. Moon, et al., "Configurable Fuzzy Fingerprint Vault for Match-on-Card System," IEICE Electron Express, vol. 6, no. 14, pp. 993-999, 2009. https://doi.org/10.1587/elex.6.993
- S. Shin, M. Lee, D. Moon, and K. Moon, "Dictionary Attack on Functional Transform-based Cancelable Fingerprint Templates," ETRI Journal, vol. 31, no. 5, pp. 628-630, 2009. https://doi.org/10.4218/etrij.09.0209.0137
- W. Scheirer and T. Boult, "Cracking Fuzzy Vaults and Biometric Encryption," in Proc. of IEEE Biometrics Research Symposium at the National Biometrics Consortium Conference, 2007.
- A. Kholmatov and B. Yanikoglu, "Realization of Correlation Attack against the Fuzzy Vault Scheme," in Proc. of SPIE, vol. 6819, pp. 68190O.1-68190O.7, 2008.
- R. Rivest, et al., "Chaffing and Winnowing: Confidentiality without Encryption," http://theory.lcs.mit.edu/-rivest/chaffing.txt, 1998.
- D. Socek, D. Culibrk, and V. Bozovic, "Issues and Challenges in Storing Biometric Templates Securely," in Proc. of CRISIS, pp. 75-81, 2007.
- N. Ratha and R. Bolle, "Automatic Fingerprint Recognition Systems," Springer, 2004.
- T. Hopper, C. Brislawn, J. Bradley, "WSQ Gray-Scale Fingerprint Image Compression Specification," Federal Bureau of Investigation, Document No. IAFIS-IC-0110 (v2), 1993.
- Y. Wang, J. Hu, and D. Philip, "A Fingerprint Orientation Model Based on 2D Fourier Expansion (FOMFE) and its Application to Singular-point Detection and Fingerprint Indexing," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 573-585, 2007. https://doi.org/10.1109/TPAMI.2007.1003
- P. Zhang, J. Hu, C. Li, M. Bennamound, and V. Bhagavatulae, "A Pitfall in Fingerprint Bio-Cryptographic Key Generation," Computers and Security, Elsevier, 2011.
- K. Xi and J. Hu. "Biometric Mobile Template Protection: A Composite Feature Based Fingerprint Fuzzy Vault," in Proc. of IEEE ICC, 2009.
- H. Wolfson and I. Rigoutsos, "Geometric Hashing: an Overview," IEEE Computational Science and Engineering, vol. 4, pp. 10-21, Oct.-Dec. 1997.
- S. Lee, et al., "Memory-Efficient Fuzzy Fingerprint Vault Based on the Geometric Hashing," in Proc. of ISA, pp. 312-315, 2008.
- S. Chae, S. Lim, S. Bae, Y. Chung, and S. Pan, "Parallel Processing of the Fuzzy Fingerprint Vault based on Geometric Hashing," KSII Tr. Internet & Info Systems, vol. 4, no. 6, pp. 1294-1310, 2010.
- E. Berlekamp, Algebraic Coding Theory, McGraw-Hill, New York, 1968. (Revised edition, Laguna Hills: Aegean Park Press, 1984.
- V. Guruswami and M. Sudan, "Improved Decoding of Reed-Solomon and Algebraic Geometric Codes," in Proc. of FOCS, pp. 28-39, 1998.
- S. Gao, "A New Algorithm for Decoding Reed-Solomon Codes," Communications, Information and Network Security, pp. 55-68, Kluwer Academic Press, 2003.
- http://bias.csr.unibo.it/fvc2002/databases.asp. Sungju
Cited by
-
Multibiometrics fusion using
$Acz{\acute{e}}l$ -Alsina triangular norm vol.8, pp.7, 2011, https://doi.org/10.3837/tiis.2014.07.012 - Multiply information coding and hiding using fuzzy vault vol.23, pp.12, 2011, https://doi.org/10.1007/s00500-018-3089-x
- 무아레를 이용한 융합 보안토큰생성과 전파공격 보호 기법 vol.10, pp.2, 2011, https://doi.org/10.15207/jkcs.2019.10.2.007