[go: up one dir, main page]

Ali et al., 2019 - Google Patents

Polynomial vault: A secure and robust fingerprint based authentication

Ali et al., 2019

View PDF
Document ID
16126624568764997120
Author
Ali S
Ganapathi I
Mahyo S
Prakash S
Publication year
Publication venue
IEEE Transactions on Emerging Topics in Computing

External Links

Snippet

Fingerprint matching is one of the extensively used tools to authenticate users. It has been accepted by governments of various countries to authenticate their citizens. The common practice in a fingerprint based system is to store minutiae points of fingerprints as the user …
Continue reading at kresttechnology.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00067Preprocessing; Feature extraction (minutiae)
    • G06K9/00073Extracting features related to minutiae and pores
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder
    • G07C9/00071Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
    • G07C9/00087Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically

Similar Documents

Publication Publication Date Title
US10877568B2 (en) Three-dimensional in-the-air finger motion based user login framework for gesture interface
Ali et al. Polynomial vault: A secure and robust fingerprint based authentication
Dinca et al. The fall of one, the rise of many: a survey on multi-biometric fusion methods
Jin et al. Biohashing: two factor authentication featuring fingerprint data and tokenised random number
Tulyakov et al. Symmetric hash functions for secure fingerprint biometric systems
Ali et al. Robust technique for fingerprint template protection
Sardar et al. A Novel Cancelable FaceHashing Technique Based on Non-Invertible Transformation With Encryption and Decryption Template.
Kaur et al. Biometric cryptosystems: a comprehensive survey
Ali et al. 3-dimensional secured fingerprint shell
Choudhary et al. Multimodal biometric authentication with secured templates—A review
Ali et al. Fingerprint shell construction with prominent minutiae points
Baghel et al. Generation of secure fingerprint template using DFT for consumer electronics devices
Arunachalam et al. AES Based Multimodal Biometric Authentication using Cryptographic Level Fusion with Fingerprint and Finger Knuckle Print.
Ali et al. A novel technique for fingerprint based secure user authentication
Ahmad et al. String-based cancelable fingerprint templates
Wang et al. Joint biological ID: A secure and efficient lightweight biometric authentication scheme
Saraswathi et al. Retinal biometrics based authentication and key exchange system
Hossam Eldein Mohamed et al. Cancelable biometric authentication system based on hyperchaotic technique and fibonacci Q-Matrix
Bedad et al. Multi-biometric template protection: an overview
Singla et al. Performance Analysis of Authentication System: A Systematic Literature Review
Singla et al. Performance analysis of authentication system: A systematic literature review
Liu et al. Is fuzzy vault scheme very effective for key binding in biometric cryptosystems?
Baghel et al. Adaptation of pair-polar structures to compute a secure and alignment-free fingerprint template
Shelton et al. Permutation-based biometric authentication protocols for mitigating replay attacks
Selwal et al. Performance analysis of template data security and protection in biometric systems