2005
DOI: 10.1016/j.ipl.2004.09.014
|View full text |Cite
|
Sign up to set email alerts
|

PalmHashing: a novel approach for cancelable biometrics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
78
0
2

Year Published

2005
2005
2015
2015

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 155 publications
(80 citation statements)
references
References 9 publications
(10 reference statements)
0
78
0
2
Order By: Relevance
“…Biometric Transformations: This method is based on the transformations of biometric features. It is further categorized into two: Bio-Hashing (Salting) [8], [13], [15], [16], [19], [20], [21] and Non-invertible approach [1]. Our proposed method falls under this category of Noninvertible transformation.…”
Section: Related Workmentioning
confidence: 99%
“…Biometric Transformations: This method is based on the transformations of biometric features. It is further categorized into two: Bio-Hashing (Salting) [8], [13], [15], [16], [19], [20], [21] and Non-invertible approach [1]. Our proposed method falls under this category of Noninvertible transformation.…”
Section: Related Workmentioning
confidence: 99%
“…Strictly speaking, perfect or near to perfect recognition results have been reported for BioHashing-based techniques applied to many biometric characteristics [5]- [8]. Generally, BioHashing derives a compact binary vector b ∈ {0, 1} m , called BioHash, from the true biometric feature vector x ∈ n , where m n, through an iterative computation of the inner products between a set of tokenized user-specific random numbers and the biometric vector x.…”
Section: Biohashingmentioning
confidence: 99%
“…BioHashing has been successfully applied to different biometric modalities [5]- [8] and its reported near-to-perfect results have received much attention [9], [10]. However, the main drawback of BioHashing is that its claimed performance degrades significantly when an imposter gains access to a legitimate token and tries to authenticate herself as a legitimate user.…”
Section: Introductionmentioning
confidence: 99%
“…These methods can be roughly categorized into two types: (1) Robust hash functions, where small changes in a biometric sample would yield the same hash value (e.g., [1], [2], [3], [4], [5]); (2) Similarity-preserving hard-to-invert transformations, where similarity of biometric samples would be preserved through the transformation, yet it is difficult to find the original template from a transformed one (e.g., [6], [7], [8], [9]). We note, however, that there lacks rigorous security analysis for these techniques.…”
Section: Introductionmentioning
confidence: 99%