Citation: | YOU Lin, YANG Ling, YU Wangke, et al., “A Cancelable Fuzzy Vault Algorithm Based on Transformed Fingerprint Features,” Chinese Journal of Electronics, vol. 26, no. 2, pp. 236-243, 2017, doi: 10.1049/cje.2017.01.009 |
U. Uludag, S. Pankanti, S. Prabhakar, et al., "Biometric cryptosystems:Issues and challenges", Proc. of the IEEE, Vol.92, No.6, pp.948-960, 2004.
|
H. Feng, A. Ross and D. John, "Combining cryptography with biometrics effectively", IEEE Transactions on Computers, Vol.55, No.9, pp.1081-1088, 2006.
|
R. Christian and U. Andreas, "A survey on biometric cryptosystems and cancelable biometrics", EURASIP Journal on Information Security, Vol.201, No.3, pp.1-25, 2011.
|
A. Juels and M. Sudan, "A fuzzy vault scheme", Proc. of Int. Symp. on Information Theory, Lausanne, USA, pp.408, 2002.
|
W. Yongjin and K.N. Pmataniotis, "Fuzzy vault for face based cryptographic key generation", Proc. of Biometrics Symposium, Baltimore, MD, USA, pp.1-6, 2007.
|
U. Uludag, S. Pankanti and A. Jain, "Fuzzy vault for fingerprints". Proc. 5th Int. Conf. on Audio-Based and Video-Based Biometric Person Authentication, LNCS, Vol.3546, pp.310-319, 2005.
|
J. Deng and H. Yuan, "Fingerprint minutiae feature encryption based on fuzzy vault scheme", The Computer Engineering and Design, Vol.10, No.4, pp.73-76, 2010.
|
Q. Li, X.M. Niu and S.H. Sun, "A novel biometric key scheme", Chinese Journal of Electronics, Vol.15, No.1, pp.99-102, 2006.
|
B. Fu and J.P. Li, "Efficient fuzzy vault based on pairing and its application to fingerprint encryption", Chinese Journal of Electronics, Vol.19, No.2, pp.249-255, 2010.
|
N.K. Ratha, S. Chikkerur and J.H. Connemm, "Generating cancelable fingerprint templates". IEEE Trans. on Pattern Analysis and Machine Intelligence, Vol.29, No.4, pp.561-572, 2007.
|
D. Xu and X. Wang, "A scheme for cancelable fingerprint fuzzy vault based on chaotic sequence", Proc. Int. Conf. on Mechatronics and Automation, Xi'an, China, pp.329-332, 2010.
|
I.M. Verbauwhede and S. Yang, "Secure fuzzy vault based fingerprint verification system", Asilomar Conference on Signals Systems and Computers, California, USA, pp.577-581, 2004.
|
Y. Dodis, R.Ostrovsky, L. Reyzin, et al., "Fuzzy extractors:How to generate strong keys from biometrics and other noisy data", EUROCRYPT 2004, pp.523-540, 2004.
|
K. Nandakumar and A.K. Jain, "Multibiometric template security using fuzzy vault", Proc. IEEE 2nd Int. Conf. on Biometrics:Theory, Applications and Systems, VA, USA, pp.1-6, 2008.
|
X. Li and D. Sun, "A dual-mode fingerprint fusion encryption method based on fuzzy vault", Proc. International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, Sanya, China, pp.208-215, 2012.
|
A. Nagar, K. Nandakumar and A.K. Jain, "Multibiometric cryptosystems based on feature level fusion", IEEE Trans. on Information Forensics and Security, Vol.7, No.1, pp.255-268, 2012.
|
M.K. Geetika, "Multimodal based fuzzy vault using iris retina and finger vein", Proc. the Fourth International Conference on Computing,Communications and Networking Technologies, Tiruchengode, India, pp.1-5, 2013.
|