2012
DOI: 10.1016/j.eswa.2011.12.048
|View full text |Cite
|
Sign up to set email alerts
|

An effective biometric cryptosystem combining fingerprints with error correction codes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
28
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 73 publications
(28 citation statements)
references
References 28 publications
0
28
0
Order By: Relevance
“…Fuzzy Commitment was initially described in (Juels and Wattenberg, 1999) and is implemented in (Nagar et al, 2010), (Li et al, 2012), (Kaizhi and Aiqun, 2013). Two systems that use Fuzzy Commitment are described below.…”
Section: Fuzzy Commitmentmentioning
confidence: 99%
See 3 more Smart Citations
“…Fuzzy Commitment was initially described in (Juels and Wattenberg, 1999) and is implemented in (Nagar et al, 2010), (Li et al, 2012), (Kaizhi and Aiqun, 2013). Two systems that use Fuzzy Commitment are described below.…”
Section: Fuzzy Commitmentmentioning
confidence: 99%
“…1.6 to 1), and rounding (ex 1.6 to 2). (Jin et al, 2012), (Kaizhi and Aiqun, 2013), (Li et al, 2012), (Mirmohamadsadeghi and Drygajlo, 2013), (Teoh and Kim, 2007), (Wang et al, 2010), , (Yang et al, 2014) quantize bitstrings derived from representations. (Arakala et al, 2007), , (Hartloff et al, 2013), (Jin et al, 2009), (Jin et al, 2010), (Junior et al, 2010), (Moon et al, 2007), (Nagar et al, 2010), (Nandakumar et al, 2007), quantize features.…”
Section: Quantizationmentioning
confidence: 99%
See 2 more Smart Citations
“…Systems that employ biometric traits to secure cryptographic keys are often called biometric cryptosystems [13]. The Fuzzy Commitment Scheme (FCS) [8] is one of the most popular biometric cryptosystems that has been applied successfully to iris [2,7,9,12,15], fingerprint [10], and face [1] biometrics. FCS binds cryptographic keys, encoded using Error Correction Codes (ECC), to binary biometric feature vectors using simple XOR operation.…”
Section: Introductionmentioning
confidence: 99%