Ali et al., 2019 - Google Patents
Polynomial vault: A secure and robust fingerprint based authenticationAli et al., 2019
View PDF- Document ID
- 16126624568764997120
- Author
- Ali S
- Ganapathi I
- Mahyo S
- Prakash S
- Publication year
- Publication venue
- IEEE Transactions on Emerging Topics in Computing
External Links
Snippet
Fingerprint matching is one of the extensively used tools to authenticate users. It has been accepted by governments of various countries to authenticate their citizens. The common practice in a fingerprint based system is to store minutiae points of fingerprints as the user …
- 238000000034 method 0 abstract description 95
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00067—Preprocessing; Feature extraction (minutiae)
- G06K9/00073—Extracting features related to minutiae and pores
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
- G07C9/00071—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
- G07C9/00087—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10877568B2 (en) | Three-dimensional in-the-air finger motion based user login framework for gesture interface | |
Ali et al. | Polynomial vault: A secure and robust fingerprint based authentication | |
Dinca et al. | The fall of one, the rise of many: a survey on multi-biometric fusion methods | |
Jin et al. | Biohashing: two factor authentication featuring fingerprint data and tokenised random number | |
Tulyakov et al. | Symmetric hash functions for secure fingerprint biometric systems | |
Ali et al. | Robust technique for fingerprint template protection | |
Sardar et al. | A Novel Cancelable FaceHashing Technique Based on Non-Invertible Transformation With Encryption and Decryption Template. | |
Kaur et al. | Biometric cryptosystems: a comprehensive survey | |
Ali et al. | 3-dimensional secured fingerprint shell | |
Choudhary et al. | Multimodal biometric authentication with secured templates—A review | |
Ali et al. | Fingerprint shell construction with prominent minutiae points | |
Baghel et al. | Generation of secure fingerprint template using DFT for consumer electronics devices | |
Arunachalam et al. | AES Based Multimodal Biometric Authentication using Cryptographic Level Fusion with Fingerprint and Finger Knuckle Print. | |
Ali et al. | A novel technique for fingerprint based secure user authentication | |
Ahmad et al. | String-based cancelable fingerprint templates | |
Wang et al. | Joint biological ID: A secure and efficient lightweight biometric authentication scheme | |
Saraswathi et al. | Retinal biometrics based authentication and key exchange system | |
Hossam Eldein Mohamed et al. | Cancelable biometric authentication system based on hyperchaotic technique and fibonacci Q-Matrix | |
Bedad et al. | Multi-biometric template protection: an overview | |
Singla et al. | Performance Analysis of Authentication System: A Systematic Literature Review | |
Singla et al. | Performance analysis of authentication system: A systematic literature review | |
Liu et al. | Is fuzzy vault scheme very effective for key binding in biometric cryptosystems? | |
Baghel et al. | Adaptation of pair-polar structures to compute a secure and alignment-free fingerprint template | |
Shelton et al. | Permutation-based biometric authentication protocols for mitigating replay attacks | |
Selwal et al. | Performance analysis of template data security and protection in biometric systems |