2020
DOI: 10.1109/tifs.2019.2916406
|View full text |Cite
|
Sign up to set email alerts
|

Fingerprint Entropy and Identification Capacity Estimation Based on Pixel-Level Generative Modelling

Abstract:  Users may download and print one copy of any publication from the public portal for the purpose of private study or research.  You may not further distribute the material or use it for any profit-making activity or commercial gain  You may freely distribute the URL identifying the publication in the public portal If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(14 citation statements)
references
References 20 publications
(42 reference statements)
0
14
0
Order By: Relevance
“…However, the original templates of many traditional biometrics are not confidential. For instance, DNA [4], face [5], gait [31] and fingerprint [6] can be captured via lost hair, highresolution photography, depth camera and any touched surfaces, respectively. Once the original biometric template is stolen, it is compromised forever in all applications.…”
Section: B Comparison With Other Modalitiesmentioning
confidence: 99%
See 1 more Smart Citation
“…However, the original templates of many traditional biometrics are not confidential. For instance, DNA [4], face [5], gait [31] and fingerprint [6] can be captured via lost hair, highresolution photography, depth camera and any touched surfaces, respectively. Once the original biometric template is stolen, it is compromised forever in all applications.…”
Section: B Comparison With Other Modalitiesmentioning
confidence: 99%
“…Furthermore, the biosignals of multiple individuals acquired by BSN devices are sent to a central server for further analysis in remote health monitoring, where personal identification is required. Compared with knowledge-based identification methods, such as a personal identification number (PIN) and password, biometrics-based ones such as DNA [4], face [5] and fingerprint [6], are relatively difficult to forge and reproduce if stolen. Previous studies have employed fingerprint recognition technique in implantable medical devices to ensure information security [7].…”
Section: Introductionmentioning
confidence: 99%
“…Recently, security technology is evolving along with artificial intelligence technology. From physical security to security using software, and by recognizing bio-information, it is moving toward simple and personalized security without risk of loss [ 1 , 2 , 3 ]. External environment security technology using bio-information gradually requires personal identification in a non-face to face method, and internal environment security technology carried by users is being carried out in portable smart devices and body-wearing wearable devices [ 4 , 5 , 6 ].…”
Section: Introductionmentioning
confidence: 99%
“…The final expression for the probability of a true-positive, we obtain by substitution of Equations (16) and (10) into (9).…”
Section: Quantification Of Condition Monitoring Uncertainty At Succesmentioning
confidence: 99%
“…Initially, only communication theory used the concept of Shannon entropy. However, subsequently, the Shannon entropy began to be used in many different fields of science and technology such as machine learning [2], biomedical informatics [3], reliability [4], prognostics [5], fault detection [6], condition monitoring [7], maintenance [8], fingerprint recognition [9], geosciences [10], fatigue damage modeling [11], and many others.…”
Section: Introductionmentioning
confidence: 99%