References
- HyunJin Kim, JunHoo Park, JangYong Lee and JaeCheol Ryou, "Biometric authentication technology trends in smart device environment," in Proc. of Mobile and Wireless Technology 2015, vol. 310, pp. 199-206, 2015.
- fido alliance, https://fidoalliance.org/
- B. Tams, P. Mihailescu and A. Munk, "Security Considerations in Minutiae-Based Fuzzy Vaults," IEEE Transactions on Information Forensics and Security, vol. 10, no. 5, pp. 985-998, May. 2015. https://doi.org/10.1109/TIFS.2015.2392559
- Ari Juels and Madhu Sudan, "A Fuzzy Vault Scheme," IEEE International Symposium on Information Theory, pp. 408-426, 2002.
- Orencik, C., Pedersen, T. B., Savas, E. and Keskinoz, M, "Securing fuzzy vault schemes through biometric hashing," in Proc. of Turkish Journal of Electrical Engineering & Computer Sciences, vol. 18, no. 4, pp. 515-540, 2010.
- Walter J. Scheirer and Terrance E. Boult, " Cracking Fuzzy Vaults and Biometric Encryption," in Proc. of Biometrics Symposium, pp. 1-6, Sep. 2007.
- P. Mihailescu, "The fuzzy vault for fingerprints is vulnerable to brute force attack," in Proc. of Computer Vision and Pattern Recognition, Oct. 2007.
- Benjamin Tams, "Unlinkable Minutiae-Based Fuzzy Vault," in Proc. of IET Biometric, pp. 11-39, Jun. 2015.
- Umut Uludag, Sharath Pankanti and Anil K. Jain, "Fuzzy Vault for Fingerprints," in Proc. of Audio- and Video-Based Biometric Person Authentication, vol. 3546, pp. 310-319, 2005.
- Karthik Nandakumar, Anil K. Jain and Sharath Pankanti, "Fingerprint-Based Fuzzy Vault : Implementation and Performance," IEEE Transactions on Information Forensics and Security, vol. 2, no. 4, pp. 744-757, Dec. 2007. https://doi.org/10.1109/TIFS.2007.908165
- Lu Leng and Andrew Beng Jin Teoh, "Alignment-free row-co-occurrence cancelable palmprint Fuzzy Vault," in Proc. of Pattern Recognition, vol. 48, no. 7, Jul. 2015.
- Woo Yong Choi, Yongwha Chung, Jin-Won Park and Dowon Hong, "Fingerprint Template Protection Using One-Time Fuzzy Vault," KSII Transactions on Internet and Information Systems (TIIS), vol. 5, no. 11, pp. 2221-2234, Nov. 2011. https://doi.org/10.3837/tiis.2011.11.020
- Qiong Li, Zhaoqing Liu and Xiamu Niu, "Analysis and Problems on Fuzzy Vault Scheme," in Proc. of Intelligent Information Hiding and Multimedia Signal Processing, pp. 244-250, Dec. 2006.
- Minh Tan Nguyen, Quang Hai Truong and Tran Khanh Dang, "Enhance fuzzy vault security using nonrandom chaff point generator," in Proc. of Information Processing Letters, vol. 116, no. 1, pp. 53-64, Jan.2016.
- Hoi Ting Poon and Ali Miri, "On Efficient Decoding for the Fuzzy Vault scheme," in Proc. of Information Science, Signal Processing and their Applications (ISSPA), pp. 454-459, Jul. 2012.
- User's Guide to NIST Biometric Image Software (NBIS), National Institute of Standards and Technology, 2015.
- Cai Li and Jiankun Hu, "A Security-Enhanced Alignment-Free Fuzzy Vault-Based Fingerprint Cryptosystem Using Pair-Polar Minutiae Structures," IEEE Transactions on Information Forensics and Security, vol. 11, no. 3, pp. 543-555, Dec. 2015. https://doi.org/10.1109/TIFS.2015.2505630
- Karthik Nandakumar and Anil K. Jain, "Local Correlation-based Fingerprint Matching," in Proc. of ICVGIP 2004, pp. 503-508, Dec. 2004.
- E.C. Chang, R. Shen and F.W. Teo, "Finding the original point set hidden among chaff," in Proc. of the 2006 ACM Symposium on Information, Computer and Communications Security, pp. 182-188, Mar. 2006.
- A. Kholmatov and B. Yanikoglu, "Realization of correlation attack against the fuzzy vault scheme," in Proc. of SPIE, Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, vol. 6819, pp. 1-7, 2008.
- Hoi Ting Poon and Ali Miri, "A collusion attack on the fuzzy vault scheme," in Proc. of The ISC, Int. J. Inf. Secur. 1, vol. 1, no. 1, pp. 27-34, Jan. 2009.
- Neuro Technology,
- Peng Li, Xin Yang, Kai Cao, Xunqiang Tao, Ruifang Wang and Jie Tian, "An alignment-free fingerprint cryptosystem based on fuzzy vault scheme," in Proc. of Journal of Network and Computer Applications 2010, vol. 33, no. 3, pp. 207-220, May. 2010.