References
- Cappelli R., Lumini A., Dario, et al, "Fingerprint Image Reconstruction from Standard Template [J]," IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(9):1489-1503, 2007. https://doi.org/10.1109/TPAMI.2007.1087
- Jain A.K., Nandakumar K., Nagar A., "Biometric Template Security [J]," EURASIP Journal on Advances in Signal Processing, Special Issue on Biometrics(1): 1-20, 2008.
- Yang W, Hu J,Wang S et al., "An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures [J]," Pattern Recognition, 47(3):1309-1320, 2014. https://doi.org/10.1016/j.patcog.2013.10.001
- Nandakumar K., Jain A.K., Pankanti S., "Fingerprint-based Fuzzy Vault: Implementation and Performance[J]," IEEE Trans. on Information Forensics and Security, 2(4): 744-757, 2007. https://doi.org/10.1109/TIFS.2007.908165
- Soutar C, Robege D, Stoinov A., "Biometric Encryption: enrollment and verification procedures [C]," The International Society for Optical Engineering in Optical Pattern Recognition I, Volume 3386, pp:24-35, 1998.
- Juels A, "Wattenberg M. A fuzzy commitment scheme[C]," in Proc. of the 6th ACM conference on Computer and communications security, New York, USA, Volume 1:28-36, 1999.
- Hao F., Anderson R., Daugman J., "Combining Crypto with Biometrics Effectively[J]," IEEE Trans on Computers, 55(9): 1081-1088, 2006. https://doi.org/10.1109/TC.2006.138
- Jeuls A, Sudan M, "A fuzzy vault scheme[C]," in Proc. of IEEE International Symposium On Information Theory. Institute of Electrical and Electronics Engineers, 38(2):237-257, 2002.
- Clancy T., Kiyavash N., Lin D., "Secure Smartcard-based Fingerprint Authentication[C]," in Proc. of WBMA '03 Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications, 45-52, 2003.
- Shenglin Yang, & Verbauwhede,I., "Automatic secure fingerprint verification system based on fuzzy vault scheme[C]," in Proc. of IEEE International Conference on Acoustics, Speech, and Signal Processing(ICASSP 2005),Vol.5:609-612, 2005.
- Uludag U., Pankanti S., Jain A.K., "Fuzzy Vault for Fingerprint[J]," Audio and Video-based Biometric Person Authentication, 92(6): 310-319, 2005.
- Uludag U, Jain A., "Securing fingerprint template: Fuzzy vault with helper data[C]," in Proc. of the 2006 Conference on computer Vision and Pattern Recognition Workshop(CVPRW2006), New Jersey: IEEE Computer Society, 163, 2006.
- Nandakumar K., Nagar A, Jain A.K., "Hardening Fingerprint Fuzzy Vault Using Password[C]," in Proc. of 2nd International Conference on Biometrics, South Korea, Lecture Notes in Computer Science, 4642,pp: 927-937, 2007.
- Jesse Hartloff, Sergey Tulyakov, Jimmy Dobler, Atri Rudra, Venu Govindaraju, "Security analysis for fingerprint fuzzy vaults [J]," in Proc. of SPIE-the International Society for Optical Engineering, 8712 (4).:1-11, 2013.
- Li P., Yang X., Cao K, et al., "An Alignment-free Fingerprint Cryptosystem Based on Fuzzy Vault Scheme[J]," Journal of Network and Computer Applications, 33 (3): 207-220 , 2010. https://doi.org/10.1016/j.jnca.2009.12.003
- LI Peng, TIAN Jie, "Biometric Template Protection[J]," Journal of Software, 20(6): 1553-1573, 2009. https://doi.org/10.3724/SP.J.1001.2009.03528
- ZHANG Rong-lin, LIU Eryun, "Improved cancelable fingerprint fuzzy vault system [J]," Journal of Xidian University, 38(4):174-179, 2011.
- C. Jin and H. Kim, "High-resolution orientation field estimation based on multi-scale Gaussian filter[J]," IEICE Electronics Express, 6(24):1781-1787, 2009. https://doi.org/10.1587/elex.6.1781
- L.Hong, Y.Wan and A.K. Jain, "Fingerprint Image Enhancement: Algorithm and Performance Evaluation," IEEE Transactions on Pattern Analysis and Machine Intelligence,20(8): 777-789, 1998. https://doi.org/10.1109/34.709565
- ORENCIK C., PEDERSEN T.B., SAVAS E., et al., "Securing fuzzy vault schemes through biom etric hashing[J]," Turk J Elec Eng&Comp Sci, 18(4): 515-539, 2010.
- Feng J., "Combining Minutiae Descriptors for Fingerprint Matching[J]," Pattern Recognition, 41 (1): 342-352,2008. https://doi.org/10.1016/j.patcog.2007.04.016