[go: up one dir, main page]

Gomez-Barrero et al., 2018 - Google Patents

Multi-biometric template protection based on bloom filters

Gomez-Barrero et al., 2018

Document ID
5374943519510631456
Author
Gomez-Barrero M
Rathgeb C
Li G
Ramachandra R
Galbally J
Busch C
Publication year
Publication venue
Information Fusion

External Links

Snippet

Biometric verification systems are currently being deployed in numerous large-scale and everyday applications. It is hence of the utmost importance to protect the privacy of the enrolled subjects. Biometric template protection schemes are designed to protect biometric …
Continue reading at www.sciencedirect.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00013Image acquisition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00087Matching; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00067Preprocessing; Feature extraction (minutiae)
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00268Feature extraction; Face representation
    • G06K9/00281Local features and components; Facial parts ; Occluding parts, e.g. glasses; Geometrical relationships
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00288Classification, e.g. identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00268Feature extraction; Face representation
    • G06K9/00275Holistic features and representations, i.e. based on the facial image taken as a whole
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00362Recognising human body or animal bodies, e.g. vehicle occupant, pedestrian; Recognising body parts, e.g. hand
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder
    • G07C9/00071Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
    • G07C9/00087Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically

Similar Documents

Publication Publication Date Title
Gomez-Barrero et al. Multi-biometric template protection based on bloom filters
Gomez-Barrero et al. Unlinkable and irreversible biometric template protection based on bloom filters
Wang et al. Design of alignment-free cancelable fingerprint templates via curtailed circular convolution
El-Shafai et al. Efficient and secure cancelable biometric authentication framework based on genetic encryption algorithm
Rathgeb et al. A survey on biometric cryptosystems and cancelable biometrics
Patel et al. Cancelable biometrics: A review
Gomez-Barrero et al. Protected facial biometric templates based on local gabor patterns and adaptive bloom filters
Zhao et al. Negative iris recognition
Kaur et al. Random slope method for generation of cancelable biometric features
Rathgeb et al. Unlinkable improved multi-biometric iris fuzzy vault
Soliman et al. A double random phase encoding approach for cancelable iris recognition
Kaur et al. Gaussian random projection based non-invertible cancelable biometric templates
Bobkowska et al. Incorporating iris, fingerprint and face biometric for fraud prevention in e‐passports using fuzzy vault
Mehmood et al. Fingerprint biometric template security schemes: attacks and countermeasures
Asaker et al. A novel cancellable Iris template generation based on salting approach
Topcu et al. Practical security and privacy attacks against biometric hashing using sparse recovery
Atighehchi et al. GREYC-Hashing: Combining biometrics and secret for enhancing the security of protected templates
Nafea et al. Hybrid multi-biometric template protection using watermarking
Ayoup et al. Cancelable multi-biometric template generation based on dual-tree complex wavelet transform
Rathgeb et al. Preventing the cross-matching attack in Bloom filter-based cancelable biometrics
Asthana et al. Random area-perimeter method for generation of unimodal and multimodal cancelable biometric templates: R. Asthana et al.
Teoh et al. Cancellable biometrics and user-dependent multi-state discretization in BioHash
Kaur et al. SURFBCS: speeded up robust features based fuzzy vault scheme in biometric cryptosystem: P. Kaur et al.
Alwan et al. Cancellable face template algorithm based on speeded-up robust features and winner-takes-all
Mohammed et al. A hybrid ranking algorithm for secure and efficient iris template protection