2004
DOI: 10.1007/bf02683992
|View full text |Cite
|
Sign up to set email alerts
|

PalmHashing: A novel approach for dual-factor authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
28
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(28 citation statements)
references
References 15 publications
0
28
0
Order By: Relevance
“…The first work referencing the BioHashing technique is presented on face modality in (Goh & Ngo, 2003). Then the same technique has been declined to different modalities in the references (Teoh et al, 2004c), (Teoh et al, 2004a), (Connie et al, 2004) and more recently (Belguechi, Rosenberger & Aoudia, 2010), to mention just a few. Now, we detail the general principle of BioHashing.…”
Section: Biohashingmentioning
confidence: 99%
See 1 more Smart Citation
“…The first work referencing the BioHashing technique is presented on face modality in (Goh & Ngo, 2003). Then the same technique has been declined to different modalities in the references (Teoh et al, 2004c), (Teoh et al, 2004a), (Connie et al, 2004) and more recently (Belguechi, Rosenberger & Aoudia, 2010), to mention just a few. Now, we detail the general principle of BioHashing.…”
Section: Biohashingmentioning
confidence: 99%
“…Besides, integrated Wavelet Fourier-Mellin transform has been applied to face raw image in (Teoh & Ngo, 2005), while Fisher Discriminant Analysis (FDA) for face images is developed in (Teoh et al, 2004b), with a slightly different quantification step. Both Principal Component Analysis (PCA) and Fisher Discriminant Analysis are at the core of PalmHashing developed in (Connie et al, 2004) from the ROI of the raw palmprint image. In two recent papers (Belguechi, Rosenberger & Aoudia, 2010), (Belguechi, Hemery & Rosenberger, 2010), we propose to extract biometric templates from minutiae representation, by using a Gabor filterbank, after a detection process of the region of interest.…”
Section: Biohashing Principlementioning
confidence: 99%
“…In a general viewpoint, we divided the biometric template protection into four groups: (1) Biohashing (Jin et al, 2004a(Jin et al, , 2004b(Jin et al, , 2004c(Jin et al, , 2005(Jin et al, , 2007(Jin et al, , 2008, 2007Jain et al, 1999;, 2008a, 2008bConnie et al, 2004;Ling et al, 2004Ling et al, , 2006Maio & Nanni, 2005); (2) Template encryption (Soutar et al,1999;Davida et al, 1998;Juels & Sudan, 2002); (3) Geometric transform of template technology (Ratha et al, 2006(Ratha et al, , 2007Ang et al, 2005;Clancy et al, 2003;Lee C et al, 2007;Lee Y et al, 2007;Tulyakov et al, 2005Tulyakov et al, , 2007Hao et al, 2006;Jain et al, 2006;Juels & Wattenberg, 1999;Juels & Sudan, 2002;Davida et al, 1998;Wang & Plataniotis, 2008;Uludag et al, 2005;Nandakumar et al, 2007;Kholmatov & Yanikoglu, 2008;Chang, 2006;Dodis et al, 2004Dodis et al, , 2006Mihailescu, 2007;Scheirer & Boult, 2007;Nyang & Lee, 2007;Jin et al, 2007;Buhan et al, 2007;…”
Section: Review Of Biometric Template Protection Technologiesmentioning
confidence: 99%
“…The cancellable biometrics issue was addressed by Connie et al (2004) which adopted a technique known as BioHashing. Jin et al (2004c) proposed a novel approach of two-factor authenticator, based on iterated inner products between tokenised pseudo-random number and the user specific fingerprint feature, which generated from the integrated wavelet and Fourier-Mellin transform (WFMT), and hence produced a set of user specific compact code that named as BioHashing.…”
Section: Biohashingmentioning
confidence: 99%
See 1 more Smart Citation