Gomez-Barrero et al., 2018 - Google Patents
Multi-biometric template protection based on bloom filtersGomez-Barrero et al., 2018
- Document ID
- 5374943519510631456
- Author
- Gomez-Barrero M
- Rathgeb C
- Li G
- Ramachandra R
- Galbally J
- Busch C
- Publication year
- Publication venue
- Information Fusion
External Links
Snippet
Biometric verification systems are currently being deployed in numerous large-scale and everyday applications. It is hence of the utmost importance to protect the privacy of the enrolled subjects. Biometric template protection schemes are designed to protect biometric …
- 210000000554 Iris 0 abstract description 60
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00013—Image acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00087—Matching; Classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00067—Preprocessing; Feature extraction (minutiae)
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00268—Feature extraction; Face representation
- G06K9/00281—Local features and components; Facial parts ; Occluding parts, e.g. glasses; Geometrical relationships
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00288—Classification, e.g. identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00268—Feature extraction; Face representation
- G06K9/00275—Holistic features and representations, i.e. based on the facial image taken as a whole
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00362—Recognising human body or animal bodies, e.g. vehicle occupant, pedestrian; Recognising body parts, e.g. hand
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
- G07C9/00071—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
- G07C9/00087—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Gomez-Barrero et al. | Multi-biometric template protection based on bloom filters | |
| Gomez-Barrero et al. | Unlinkable and irreversible biometric template protection based on bloom filters | |
| Wang et al. | Design of alignment-free cancelable fingerprint templates via curtailed circular convolution | |
| El-Shafai et al. | Efficient and secure cancelable biometric authentication framework based on genetic encryption algorithm | |
| Rathgeb et al. | A survey on biometric cryptosystems and cancelable biometrics | |
| Patel et al. | Cancelable biometrics: A review | |
| Gomez-Barrero et al. | Protected facial biometric templates based on local gabor patterns and adaptive bloom filters | |
| Zhao et al. | Negative iris recognition | |
| Kaur et al. | Random slope method for generation of cancelable biometric features | |
| Rathgeb et al. | Unlinkable improved multi-biometric iris fuzzy vault | |
| Soliman et al. | A double random phase encoding approach for cancelable iris recognition | |
| Kaur et al. | Gaussian random projection based non-invertible cancelable biometric templates | |
| Bobkowska et al. | Incorporating iris, fingerprint and face biometric for fraud prevention in e‐passports using fuzzy vault | |
| Mehmood et al. | Fingerprint biometric template security schemes: attacks and countermeasures | |
| Asaker et al. | A novel cancellable Iris template generation based on salting approach | |
| Topcu et al. | Practical security and privacy attacks against biometric hashing using sparse recovery | |
| Atighehchi et al. | GREYC-Hashing: Combining biometrics and secret for enhancing the security of protected templates | |
| Nafea et al. | Hybrid multi-biometric template protection using watermarking | |
| Ayoup et al. | Cancelable multi-biometric template generation based on dual-tree complex wavelet transform | |
| Rathgeb et al. | Preventing the cross-matching attack in Bloom filter-based cancelable biometrics | |
| Asthana et al. | Random area-perimeter method for generation of unimodal and multimodal cancelable biometric templates: R. Asthana et al. | |
| Teoh et al. | Cancellable biometrics and user-dependent multi-state discretization in BioHash | |
| Kaur et al. | SURFBCS: speeded up robust features based fuzzy vault scheme in biometric cryptosystem: P. Kaur et al. | |
| Alwan et al. | Cancellable face template algorithm based on speeded-up robust features and winner-takes-all | |
| Mohammed et al. | A hybrid ranking algorithm for secure and efficient iris template protection |