2008 Biometrics Symposium 2008
DOI: 10.1109/bsym.2008.4655523
|View full text |Cite
|
Sign up to set email alerts
|

Three factor scheme for biometric-based cryptographic key regeneration using iris

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
127
0
1

Year Published

2009
2009
2023
2023

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 68 publications
(128 citation statements)
references
References 19 publications
0
127
0
1
Order By: Relevance
“…From our experiments [66], we found out that the majority coding does not work with iris data. Moreover, the assumption in [39] that the Hamming distance between genuine iris codes is 10% is too restrictive.…”
Section: Cryptographic Key Generation From Biometricsmentioning
confidence: 93%
“…From our experiments [66], we found out that the majority coding does not work with iris data. Moreover, the assumption in [39] that the Hamming distance between genuine iris codes is 10% is too restrictive.…”
Section: Cryptographic Key Generation From Biometricsmentioning
confidence: 93%
“…In an alternate formulation, Ratha et al [19] use the gradient of a mixture of Gaussian kernels to determine the direction of movement and the extent of movement is determined by the scaled value of the mixture. Some researchers proposed shuffling-based transformation to generate cancelable templates using a user-specified random key [24,25]. In these works, the iris code is divided into blocks and then the blocks are shuffled with a user-specified random shuffling key to generate cancelable iris template.…”
Section: Biometric Template Transformationmentioning
confidence: 99%
“…In the first approach, a randomly created cryptographic key is protected from unauthorized access with users' biometric data. Fuzzy vault [8][9][10] and fuzzy commitment scheme [24,25,30] fall under this category. In fuzzy vault scheme, biometric data (e.g., minutiae points) is considered as an unordered set s E = x 1 , x 2 , .…”
Section: Crypto-biometric Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…The system was tested with 700 images of 70 persons reaching an impressive FRR of 0.47%. Since the entropy of the generated keys was proven to be low Kanade et al [10,11] increase the entropy of produced keys by applying so-called shuffling keys based on passwords reporting a FRR of 4.61%. Providing a more comprehensible insight into the use of error correction codes in iris-based fuzzy commitment schemes we [18] have proposed a systematic way of constructing fuzzy commitment schemes in earlier work.…”
Section: Iris-biometric Cryptosystemsmentioning
confidence: 99%