2010 20th International Conference on Pattern Recognition 2010
DOI: 10.1109/icpr.2010.292
|View full text |Cite
|
Sign up to set email alerts
|

Biohashing for Securing Minutiae Template

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
23
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(23 citation statements)
references
References 3 publications
0
23
0
Order By: Relevance
“…For fingerprint texture template for example, the authors have demonstrated that the performance of the system in term of EER moves from 7.3% when no hashing is performed to 10.9% when basic BioHashing is operated under the hypothesis that the token is always stolen, while EER is evaluated to 1.5% in case where no TRN is stolen (FVC2002-DB2). These scores are also discussed in our papers (Belguechi, Rosenberger & Aoudia, 2010), (Belguechi, Hemery & Rosenberger, 2010) where different cases are considered, depending on whether the token is stolen or not.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…For fingerprint texture template for example, the authors have demonstrated that the performance of the system in term of EER moves from 7.3% when no hashing is performed to 10.9% when basic BioHashing is operated under the hypothesis that the token is always stolen, while EER is evaluated to 1.5% in case where no TRN is stolen (FVC2002-DB2). These scores are also discussed in our papers (Belguechi, Rosenberger & Aoudia, 2010), (Belguechi, Hemery & Rosenberger, 2010) where different cases are considered, depending on whether the token is stolen or not.…”
Section: Discussionmentioning
confidence: 99%
“…The first work referencing the BioHashing technique is presented on face modality in (Goh & Ngo, 2003). Then the same technique has been declined to different modalities in the references (Teoh et al, 2004c), (Teoh et al, 2004a), (Connie et al, 2004) and more recently (Belguechi, Rosenberger & Aoudia, 2010), to mention just a few. Now, we detail the general principle of BioHashing.…”
Section: Biohashingmentioning
confidence: 99%
See 2 more Smart Citations
“…Nowadays, several protection schemes exist, but unfortunately not yet mature for large scale deployment. Examples of such schemes are fuzzy commitment [59], fuzzy vault scheme [60], and the BioHashing principle presented in several works by [61] and [62].…”
Section: Evaluation Of Privacy By Design Biometric Systemsmentioning
confidence: 99%