Security and Privacy in Biometrics 2013
DOI: 10.1007/978-1-4471-5230-9_4
|View full text |Cite
|
Sign up to set email alerts
|

Secure Sketches for Protecting Biometric Templates

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…For example, multi-algorithm fusion at feature level, multibiometric cryptosystem fuzzy vault based on fingerprint and iris [51], fuzzy commitments for face [49] and other ideas for score fusion level were successfully applied to fingerprints with security advances and many other combinations under various scenarios have been proposed during the last three years [23], [51]. The target is to provide a uniform distribution of errors [30], combining successfully the data and covering research gaps of previous works, and thus, contributing to secure, stable systems [25], [54], while offering, a fast comparison of protected templates suitable for biometric recognition in identification mode.…”
Section: Multibiometric Template Protectionmentioning
confidence: 99%
See 2 more Smart Citations
“…For example, multi-algorithm fusion at feature level, multibiometric cryptosystem fuzzy vault based on fingerprint and iris [51], fuzzy commitments for face [49] and other ideas for score fusion level were successfully applied to fingerprints with security advances and many other combinations under various scenarios have been proposed during the last three years [23], [51]. The target is to provide a uniform distribution of errors [30], combining successfully the data and covering research gaps of previous works, and thus, contributing to secure, stable systems [25], [54], while offering, a fast comparison of protected templates suitable for biometric recognition in identification mode.…”
Section: Multibiometric Template Protectionmentioning
confidence: 99%
“…In conclusion, in order to avoid fraud, privacy leakage should be decreased and the major requirement of unlinkability must be met. Furthermore, the alignment affects the recognition performance, the absence of a unified architecture brings confusion across the applications [25] and the desired properties for errorcorrection codes remain unattained.…”
Section: Biometric Template Protection Technologiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Owing to plenty of additive noise common during measurement, hashing the template is counter-productive [199]. There are many template protection methods like secure sketch schemes whose strength is measured by the average min-entropy of the original template given the secure sketch [200], fuzzy commitment scheme based on binary error-correcting codes [108], and the use of mutual information to measure dishonesty among users [45]. The Information Technology Laboratory (ITL) of the National Institute of Standards and Technology (NIST) recommends standards for biometric data exchange, system accuracy and interoperability [213].…”
Section: Introductionmentioning
confidence: 99%
“…Once a user's face template is compromised, the system cannot provide service to the user anymore. Numerous techniques have been proposed to protect biometrics template recently, which can be generally categorised as feature transformation [8–11] and secure sketch [12, 13] approaches. Biohashing [14, 15], cancellable biometrics [1619], and robust hashing [20] are well‐known feature transformation approaches which usually use a non‐invertible or one‐way function to protect face templates.…”
Section: Introductionmentioning
confidence: 99%