An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures
Bio-cryptography is an emerging security technology which combines cryptography with biometrics. A good bio-cryptosystem is required to protect the privacy of the relevant biometric data as well as achieving high recognition accuracy. Fingerprints have been widely used in bio-cryptosystem design. Ho...
Saved in:
Published in | Pattern recognition Vol. 47; no. 3; pp. 1309 - 1320 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Kidlington
Elsevier Ltd
01.03.2014
Elsevier |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Bio-cryptography is an emerging security technology which combines cryptography with biometrics. A good bio-cryptosystem is required to protect the privacy of the relevant biometric data as well as achieving high recognition accuracy. Fingerprints have been widely used in bio-cryptosystem design. However, fingerprint uncertainty caused by distortion and rotation during the image capturing process makes it difficult to achieve a high recognition rate in most bio-cryptographic systems. Moreover, most existing bio-cryptosystems rely on the accurate detection of singular points for fingerprint image pre-alignment, which is very hard to achieve, and the image rotation transformation during the alignment process can cause significant singular point deviation and minutiae changes. In this paper, by taking full advantage of local Voronoi neighbor structures (VNSs), e.g. local structural stability and distortion insensitivity, we propose an alignment-free bio-cryptosystem based on fixed-length bit-string representations extracted from modified VNSs, which are rotation- and translation-invariant and distortion robust. The proposed alignment-free bio-cryptosystem is able to provide strong security while achieving good recognition performance. Experimental results in comparison with most existing alignment-free bio-cryptosystems using the publicly-available databases show the validity of the proposed scheme.
•We propose an alignment-free fingerprint bio-cryptosystem based on modified VNSs.•The scheme is able to compensate the VNS change caused by large non-linear distortion.•Encrypted matching is performed and protected by the secure sketch, PinSketch.•The Experimental results show the validity of the proposed scheme. |
---|---|
AbstractList | Bio-cryptography is an emerging security technology which combines cryptography with biometrics. A good bio-cryptosystem is required to protect the privacy of the relevant biometric data as well as achieving high recognition accuracy. Fingerprints have been widely used in bio-cryptosystem design. However, fingerprint uncertainty caused by distortion and rotation during the image capturing process makes it difficult to achieve a high recognition rate in most bio-cryptographic systems. Moreover, most existing bio-cryptosystems rely on the accurate detection of singular points for fingerprint image pre-alignment, which is very hard to achieve, and the image rotation transformation during the alignment process can cause significant singular point deviation and minutiae changes. In this paper, by taking full advantage of local Voronoi neighbor structures (VNSs), e.g. local structural stability and distortion insensitivity, we propose an alignment-free bio-cryptosystem based on fixed-length bit-string representations extracted from modified VNSs, which are rotation- and translation-invariant and distortion robust. The proposed alignment-free bio-cryptosystem is able to provide strong security while achieving good recognition performance. Experimental results in comparison with most existing alignment-free bio-cryptosystems using the publicly-available databases show the validity of the proposed scheme. Bio-cryptography is an emerging security technology which combines cryptography with biometrics. A good bio-cryptosystem is required to protect the privacy of the relevant biometric data as well as achieving high recognition accuracy. Fingerprints have been widely used in bio-cryptosystem design. However, fingerprint uncertainty caused by distortion and rotation during the image capturing process makes it difficult to achieve a high recognition rate in most bio-cryptographic systems. Moreover, most existing bio-cryptosystems rely on the accurate detection of singular points for fingerprint image pre-alignment, which is very hard to achieve, and the image rotation transformation during the alignment process can cause significant singular point deviation and minutiae changes. In this paper, by taking full advantage of local Voronoi neighbor structures (VNSs), e.g. local structural stability and distortion insensitivity, we propose an alignment-free bio-cryptosystem based on fixed-length bit-string representations extracted from modified VNSs, which are rotation- and translation-invariant and distortion robust. The proposed alignment-free bio-cryptosystem is able to provide strong security while achieving good recognition performance. Experimental results in comparison with most existing alignment-free bio-cryptosystems using the publicly-available databases show the validity of the proposed scheme. •We propose an alignment-free fingerprint bio-cryptosystem based on modified VNSs.•The scheme is able to compensate the VNS change caused by large non-linear distortion.•Encrypted matching is performed and protected by the secure sketch, PinSketch.•The Experimental results show the validity of the proposed scheme. |
Author | Wang, Song Yang, Wencheng Stojmenovic, Milos Hu, Jiankun |
Author_xml | – sequence: 1 givenname: Wencheng surname: Yang fullname: Yang, Wencheng email: wencheng.yang@student.adfa.edu.au organization: School of Engineering and Information Technology, University of New South Wales at the Australia Defence Force Academy, Canberra ACT 2600, Australia – sequence: 2 givenname: Jiankun orcidid: 0000-0003-0230-1432 surname: Hu fullname: Hu, Jiankun email: J.Hu@adfa.edu.au organization: School of Engineering and Information Technology, University of New South Wales at the Australia Defence Force Academy, Canberra ACT 2600, Australia – sequence: 3 givenname: Song surname: Wang fullname: Wang, Song email: Song.Wang@latrobe.edu.au organization: School of Engineering and Mathematical Sciences, La Trobe University, VIC 3086, Australia – sequence: 4 givenname: Milos surname: Stojmenovic fullname: Stojmenovic, Milos email: mstojmenovic@singidunum.ac.rs organization: Department of Informatics and Computing, Singidunum University, Belgrade, Serbia |
BackLink | http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=28292711$$DView record in Pascal Francis |
BookMark | eNqFkE1rGzEQhkVJoE7Sf9DDXgq9rKuR1ittD4UQ0g8I9JL0VBBaadYdsyu5klzwv6-M00sP7WmG0fO-oOeKXYQYkLHXwNfAoX-3W-9tcXG7FhxkPa05hxdsBVrJdgOduGArziW0UnD5kl3lvKuAqg8r9v02NHambVgwlHZKiM1EYYtpnyiUZqTYunTcl5iPueDSjDajb2Joluhporp_iymGSE1A2v4YY2pySQdXDgnzDbuc7Jzx1fO8Zk8f7x_vPrcPXz99ubt9aF0nN6XtwQsxjQq09laN3cCd7oR2fY_dgF7BtNGo_EZoOQBHPXQ9KuwViNF5qby8Zm_PvfsUfx4wF7NQdjjPNmA8ZAOV7bmWUlX0zTNqs7PzlGxwlE397WLT0QgtBqEAKvf-zLkUc044GUfFFoqhJEuzAW5O6s3OnNWbk_rTtZqt4e6v8J_-_8Q-nGNYXf0iTCY7wuDQU0JXjI_074LfFFOiqA |
CODEN | PTNRA8 |
CitedBy_id | crossref_primary_10_1049_ipr2_12130 crossref_primary_10_1142_S0218001423560074 crossref_primary_10_1109_TCE_2022_3217234 crossref_primary_10_1142_S0218001417560043 crossref_primary_10_1007_s11042_017_4528_x crossref_primary_10_1049_iet_ipr_2020_1025 crossref_primary_10_1007_s11042_022_13733_y crossref_primary_10_1016_j_jisa_2022_103355 crossref_primary_10_1016_j_jnca_2018_04_013 crossref_primary_10_1049_iet_bmt_2018_5263 crossref_primary_10_3390_s19132985 crossref_primary_10_1109_TDSC_2018_2812192 crossref_primary_10_1007_s11042_021_11325_w crossref_primary_10_1016_j_ins_2019_05_064 crossref_primary_10_1049_el_2015_1349 crossref_primary_10_1007_s11042_017_5095_x crossref_primary_10_1186_s13635_022_00129_6 crossref_primary_10_1109_ACCESS_2018_2844182 crossref_primary_10_1016_j_cose_2019_101690 crossref_primary_10_1002_sec_1267 crossref_primary_10_1587_transfun_2022EAP1079 crossref_primary_10_1007_s11042_020_09197_7 crossref_primary_10_1109_TDSC_2018_2874245 crossref_primary_10_1109_TIFS_2023_3273919 crossref_primary_10_3390_sym11020141 crossref_primary_10_1016_j_patcog_2016_02_024 crossref_primary_10_1016_j_patrec_2019_11_037 crossref_primary_10_1093_comjnl_bxv107 crossref_primary_10_1109_TIFS_2015_2402593 crossref_primary_10_1007_s11263_024_02280_8 crossref_primary_10_1049_iet_bmt_2016_0008 crossref_primary_10_1007_s10044_016_0584_5 crossref_primary_10_1007_s10489_022_04038_6 crossref_primary_10_1109_ACCESS_2020_3009917 crossref_primary_10_1109_TETC_2021_3130126 crossref_primary_10_1145_2930669 crossref_primary_10_1007_s00371_022_02726_5 crossref_primary_10_1049_iet_bmt_2018_5070 crossref_primary_10_1016_j_imavis_2020_104004 crossref_primary_10_1007_s11042_020_10095_1 crossref_primary_10_1016_j_forc_2023_100522 crossref_primary_10_1117_1_JEI_27_5_053031 crossref_primary_10_1007_s11042_020_10127_w crossref_primary_10_1109_TII_2022_3195938 crossref_primary_10_1016_j_compeleceng_2018_01_028 crossref_primary_10_1049_iet_bmt_2015_0034 crossref_primary_10_1016_j_patcog_2015_01_021 crossref_primary_10_1016_j_patcog_2016_01_001 crossref_primary_10_4028_www_scientific_net_AMM_518_316 crossref_primary_10_1109_TIFS_2015_2505630 crossref_primary_10_1016_j_patrec_2018_04_017 crossref_primary_10_3233_JIFS_189952 |
Cites_doi | 10.1109/TrustCom.2012.23 10.1007/978-3-540-74549-5_97 10.1109/TIFS.2012.2215326 10.1016/j.patrec.2010.12.015 10.1016/j.comgeo.2004.11.001 10.1109/TIFS.2007.908165 10.1007/11527923_68 10.1016/j.patcog.2011.04.016 10.1109/ICCSA.2008.52 10.1109/TPAMI.2007.1003 10.1109/TIFS.2007.910242 10.1016/S0020-0190(99)00107-6 10.1016/j.jnca.2009.12.002 10.1007/s10623-005-6343-z 10.1016/S0925-7721(01)00027-X 10.1016/j.jnca.2009.12.003 10.1049/el.2011.1525 10.1016/j.jnca.2010.08.009 10.1145/982507.982516 10.1016/j.patcog.2012.05.004 10.1137/S0036144502417715 10.1145/319709.319714 10.1109/ICIEA.2011.5975740 10.1109/IranianCEE.2012.6292454 10.1109/ICPR.2002.1047865 10.1016/j.cose.2011.02.003 10.1007/978-3-540-74549-5_80 10.1109/ICIEA.2008.4582896 10.1137/060651380 10.1016/j.jnca.2009.12.011 10.1109/ICPR.2006.573 |
ContentType | Journal Article |
Copyright | 2013 Elsevier Ltd 2015 INIST-CNRS |
Copyright_xml | – notice: 2013 Elsevier Ltd – notice: 2015 INIST-CNRS |
DBID | AAYXX CITATION IQODW 7SC 8FD JQ2 L7M L~C L~D |
DOI | 10.1016/j.patcog.2013.10.001 |
DatabaseName | CrossRef Pascal-Francis Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Computer and Information Systems Abstracts |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science Applied Sciences |
EISSN | 1873-5142 |
EndPage | 1320 |
ExternalDocumentID | 28292711 10_1016_j_patcog_2013_10_001 S003132031300407X |
GroupedDBID | --K --M -D8 -DT -~X .DC .~1 0R~ 123 1B1 1RT 1~. 1~5 29O 4.4 457 4G. 53G 5VS 7-5 71M 8P~ 9JN AABNK AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABEFU ABFNM ABFRF ABHFT ABJNI ABMAC ABTAH ABXDB ABYKQ ACBEA ACDAQ ACGFO ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADJOM ADMUD ADMXK ADTZH AEBSH AECPX AEFWE AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHJVU AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BJAXD BKOJK BLXMC CS3 DU5 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 F0J F5P FD6 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q G8K GBLVA GBOLZ HLZ HVGLF HZ~ H~9 IHE J1W JJJVA KOM KZ1 LG9 LMP LY1 M41 MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. Q38 R2- RIG RNS ROL RPZ SBC SDF SDG SDP SDS SES SEW SPC SPCBC SST SSV SSZ T5K TN5 UNMZH VOH WUQ XJE XPP ZMT ZY4 ~G- AATTM AAXKI AAYWO AAYXX ABDPE ABWVN ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AFXIZ AGCQF AGQPQ AGRNS AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP BNPGV CITATION SSH IQODW 7SC 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c435t-61d22fb7188da7b490c8428c66e49ed71f58e7d5283910e8946e7e6712bcd37d3 |
IEDL.DBID | .~1 |
ISSN | 0031-3203 |
IngestDate | Thu Jul 10 23:09:19 EDT 2025 Wed Apr 02 07:37:51 EDT 2025 Thu Apr 24 23:12:16 EDT 2025 Tue Jul 01 02:36:17 EDT 2025 Fri Feb 23 02:25:24 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Keywords | Fingerprint Distortion robust Bio-cryptosystem Fuzzy extractor Alignment-free Modified Voronoi neighbor structure Biometrics Performance evaluation Private life Image processing Sequence alignment Singular point High precision Pattern recognition Image matching Rotational invariance Security of data Database Cryptography Automatic recognition |
Language | English |
License | CC BY 4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c435t-61d22fb7188da7b490c8428c66e49ed71f58e7d5283910e8946e7e6712bcd37d3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
ORCID | 0000-0003-0230-1432 |
PQID | 1671608337 |
PQPubID | 23500 |
PageCount | 12 |
ParticipantIDs | proquest_miscellaneous_1671608337 pascalfrancis_primary_28292711 crossref_citationtrail_10_1016_j_patcog_2013_10_001 crossref_primary_10_1016_j_patcog_2013_10_001 elsevier_sciencedirect_doi_10_1016_j_patcog_2013_10_001 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2014-03-01 |
PublicationDateYYYYMMDD | 2014-03-01 |
PublicationDate_xml | – month: 03 year: 2014 text: 2014-03-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | Kidlington |
PublicationPlace_xml | – name: Kidlington |
PublicationTitle | Pattern recognition |
PublicationYear | 2014 |
Publisher | Elsevier Ltd Elsevier |
Publisher_xml | – name: Elsevier Ltd – name: Elsevier |
References | Abellanas, Hurtado, Ramos (bib26) 1999; 71 Liang, Bishnu, Asano (bib29) 2007; 2 Benhammadi, Hentous, Bey-Beghdad, Aissani (bib30) 2005 Software VeriFinger, Neuro Technology, 2010 Wang, Hu (bib22) 2012; 45 T.C. Clancy, N. Kiyavash, D.J. Lin, Secure smartcardbased fingerprint authentication, in: Proceedings of the 2003 ACM SIGMM Workshop on Biometrics Methods and Applications, ACM, 2003, pp. 45–52. Dodis, Reyzin, Smith (bib25) 2004 Nagar (bib3) 2012 Zhang, Hu, Li, Bennamoun, Bhagavatula (bib23) 2011; 30 〉 Juels, Sudan (bib18) 2006; 38 Li, Yang, Cao, Tao, Wang, Tian (bib7) 2010; 33 Software code for modified VNS based feature representations Harmon, Johnson, Reyzin (bib36) 2006 Cao, Yang, Chen, Zang, Liang, Tian (bib2) 2012; 45 K.D. Yu, S. Na, T.Y. Choi, A fingerprint matching algorithm based on radial structure and a structure-rewarding scoring strategy, in: Proceedings of the 5th International Conference on Audio- and Video-based Biometric Person Authentication (AVBPA 2005), Springer, 2005, pp. 656–664 K. Xi, J. Hu, F. Han, An alignment free fingerprint fuzzy extractor using near-equivalent dual layer structure check (NeDLSC) algorithm, in: Proceedings of the th IEEE Conference on Industrial Electronics and Applications (ICIEA), 2011, pp. 1040–1045. Ferrara, Maltoni, Cappelli (bib38) 2012; 7 Nandakumar, Nagar, Jain (bib34) 2007 Lee, Kim (bib31) 2010; 33 H. Khazaei, A. Mohades, Fingerprint matching algorithm based on voronoi diagram, in: Proceedings of the International Conference on Computational Sciences and Its Applications (ICCSA'08), IEEE, 2008, pp. 433–440. W. Yang, J. Hu, S. Wang, A delaunay triangle-based fuzzy extractor for fingerprint authentication, in: Proceedings of the IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2012, pp. 66–70. Berrut, Trefethen (bib33) 2004; 46 Wang, Cao, Hu (bib40) 2011; 34 Wang, Hu, Phillips (bib21) 2007; 29 Arakala, Jeffers, Horadam (bib8) 2007 Kaufman, Perlman, Speciner (bib1) 2002 A. Juels, M. Wattenberg, A fuzzy commitment scheme, in: Proceedings of the 6th ACM conference on Computer and Communications Security, ACM, 1999, pp. 28–36. Dodis, Ostrovsky, Reyzin, Smith (bib24) 2008; 38 R. Soleymani, M.C. Amirani, A hybrid fingerprint matching algorithm using Delaunay triangulation and Voronoi diagram, in: Proceedings of the 20th Iranian Conference on Electrical Engineering (ICEE'12), 2012, pp. 752–757. Nandakumar, Jain, Pankanti (bib20) 2007; 2 Gudmundsson, Hammar, Van Kreveld (bib27) 2002; 23 Okabe, Boots, Sugihara, Chiu (bib11) 2009 Liu, Liang, Pang, Xie, Tian (bib4) 2010; 33 J. Hu, Mobile fingerprint template protection: progress and open issues, in: Proceedings of the 3rd IEEE Conference on Industrial Electronics and Applications (ICIEA'08), 2008, pp. 2133–2138. Jin, Jin Teoh, Ong, Tee (bib16) 2011 . Nanni, Brahnam, Lumini (bib39) 2011; 47 W. Wang, J. Li, W. Chen, Fingerprint minutiae matching based on coordinate system bank and global optimum alignment, in: Proceedings of the 18th International Conference on Pattern Recognition (ICPR'06) IEEE, 2006, pp. 401–404. A.V. Ceguerra, I. Koprinska, Integrating local and global features in automatic fingerprint verification, in: Proceedings of the 16th International Conference on Pattern Recognition, 2002, pp. 347–350. Liu, Zhao, Liang, Pang, Xie, Chen, Li, Li, Tian (bib6) 2011; 32 Gudmundsson, Haverkort, Van Kreveld (bib28) 2005; 30 Kaufman (10.1016/j.patcog.2013.10.001_bib1) 2002 Abellanas (10.1016/j.patcog.2013.10.001_bib26) 1999; 71 Wang (10.1016/j.patcog.2013.10.001_bib21) 2007; 29 Wang (10.1016/j.patcog.2013.10.001_bib22) 2012; 45 Dodis (10.1016/j.patcog.2013.10.001_bib25) 2004 Benhammadi (10.1016/j.patcog.2013.10.001_bib30) 2005 Nandakumar (10.1016/j.patcog.2013.10.001_bib20) 2007; 2 Berrut (10.1016/j.patcog.2013.10.001_bib33) 2004; 46 Li (10.1016/j.patcog.2013.10.001_bib7) 2010; 33 10.1016/j.patcog.2013.10.001_bib9 Wang (10.1016/j.patcog.2013.10.001_bib40) 2011; 34 Liu (10.1016/j.patcog.2013.10.001_bib6) 2011; 32 Cao (10.1016/j.patcog.2013.10.001_bib2) 2012; 45 10.1016/j.patcog.2013.10.001_bib19 10.1016/j.patcog.2013.10.001_bib17 Lee (10.1016/j.patcog.2013.10.001_bib31) 2010; 33 10.1016/j.patcog.2013.10.001_bib15 Liang (10.1016/j.patcog.2013.10.001_bib29) 2007; 2 10.1016/j.patcog.2013.10.001_bib37 10.1016/j.patcog.2013.10.001_bib14 Ferrara (10.1016/j.patcog.2013.10.001_bib38) 2012; 7 10.1016/j.patcog.2013.10.001_bib13 10.1016/j.patcog.2013.10.001_bib35 10.1016/j.patcog.2013.10.001_bib12 Gudmundsson (10.1016/j.patcog.2013.10.001_bib27) 2002; 23 Nandakumar (10.1016/j.patcog.2013.10.001_bib34) 2007 Nagar (10.1016/j.patcog.2013.10.001_bib3) 2012 10.1016/j.patcog.2013.10.001_bib10 10.1016/j.patcog.2013.10.001_bib32 10.1016/j.patcog.2013.10.001_bib5 Arakala (10.1016/j.patcog.2013.10.001_bib8) 2007 Juels (10.1016/j.patcog.2013.10.001_bib18) 2006; 38 Harmon (10.1016/j.patcog.2013.10.001_bib36) 2006 Okabe (10.1016/j.patcog.2013.10.001_bib11) 2009 Dodis (10.1016/j.patcog.2013.10.001_bib24) 2008; 38 Nanni (10.1016/j.patcog.2013.10.001_bib39) 2011; 47 Liu (10.1016/j.patcog.2013.10.001_bib4) 2010; 33 Gudmundsson (10.1016/j.patcog.2013.10.001_bib28) 2005; 30 Zhang (10.1016/j.patcog.2013.10.001_bib23) 2011; 30 Jin (10.1016/j.patcog.2013.10.001_bib16) 2011 |
References_xml | – volume: 30 start-page: 271 year: 2005 end-page: 277 ident: bib28 article-title: Constrained higher order delaunay triangulations publication-title: Computational Geometry – volume: 30 start-page: 311 year: 2011 end-page: 319 ident: bib23 article-title: A pitfall in fingerprint bio-cryptographic key generation publication-title: Computers & Security – reference: A. Juels, M. Wattenberg, A fuzzy commitment scheme, in: Proceedings of the 6th ACM conference on Computer and Communications Security, ACM, 1999, pp. 28–36. – volume: 33 start-page: 236 year: 2010 end-page: 246 ident: bib31 article-title: Cancelable fingerprint templates using minutiae-based bit-strings publication-title: Journal of Network and Computer Applications – year: 2002 ident: bib1 article-title: Network Security: Private Communication in a Public World – reference: K. Xi, J. Hu, F. Han, An alignment free fingerprint fuzzy extractor using near-equivalent dual layer structure check (NeDLSC) algorithm, in: Proceedings of the th IEEE Conference on Industrial Electronics and Applications (ICIEA), 2011, pp. 1040–1045. – volume: 46 start-page: 501 year: 2004 end-page: 517 ident: bib33 article-title: Barycentric lagrange interpolation publication-title: Siam Review – volume: 23 start-page: 85 year: 2002 end-page: 98 ident: bib27 article-title: Higher order delaunay triangulations publication-title: Computational Geometry – start-page: 760 year: 2007 end-page: 769 ident: bib8 article-title: Fuzzy extractors for minutiae-based fingerprint authentication publication-title: Advances in Biometrics – volume: 7 start-page: 1727 year: 2012 end-page: 1737 ident: bib38 article-title: Noninvertible minutia cylinder-code representation publication-title: IEEE Transactions on Information Forensics and Security – reference: J. Hu, Mobile fingerprint template protection: progress and open issues, in: Proceedings of the 3rd IEEE Conference on Industrial Electronics and Applications (ICIEA'08), 2008, pp. 2133–2138. – year: 2011 ident: bib16 article-title: Fingerprint template protection with minutiae-based bit-string for security and privacy preserving publication-title: Expert Systems with Applications – year: 2009 ident: bib11 article-title: Spatial Tessellations: Concepts and Applications of Voronoi Diagrams – reference: T.C. Clancy, N. Kiyavash, D.J. Lin, Secure smartcardbased fingerprint authentication, in: Proceedings of the 2003 ACM SIGMM Workshop on Biometrics Methods and Applications, ACM, 2003, pp. 45–52. – volume: 34 start-page: 116 year: 2011 end-page: 120 ident: bib40 article-title: A frequency domain subspace blind channel estimation method for trailing zero OFDM systems publication-title: Journal of Network and Computer Applications – reference: W. Wang, J. Li, W. Chen, Fingerprint minutiae matching based on coordinate system bank and global optimum alignment, in: Proceedings of the 18th International Conference on Pattern Recognition (ICPR'06) IEEE, 2006, pp. 401–404. – volume: 45 start-page: 4129 year: 2012 end-page: 4137 ident: bib22 article-title: Alignment-free cancellable fingerprint template design: a densely infinite-to-one mapping (DITOM) approach publication-title: Pattern Recognition – volume: 38 start-page: 97 year: 2008 end-page: 139 ident: bib24 article-title: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data publication-title: SIAM Journal on Computing – volume: 47 start-page: 851 year: 2011 end-page: 853 ident: bib39 article-title: Biohashing applied to orientation-based minutia descriptor for secure fingerprint authentication system publication-title: Electronics Letters – reference: W. Yang, J. Hu, S. Wang, A delaunay triangle-based fuzzy extractor for fingerprint authentication, in: Proceedings of the IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2012, pp. 66–70. – reference: 〉 – volume: 2 start-page: 721 year: 2007 end-page: 733 ident: bib29 article-title: A robust fingerprint indexing scheme using minutia neighborhood structure and low-order Delaunay triangles publication-title: IEEE Transactions on Information Forensics and Security – volume: 71 start-page: 221 year: 1999 end-page: 227 ident: bib26 article-title: Structural tolerance and Delaunay triangulation publication-title: Information Processing Letters – year: 2012 ident: bib3 article-title: Biometric Template Security, Dissertation – volume: 33 start-page: 207 year: 2010 end-page: 220 ident: bib7 article-title: An alignment-free fingerprint cryptosystem based on fuzzy vault scheme publication-title: Journal of Network and Computer Applications – reference: K.D. Yu, S. Na, T.Y. Choi, A fingerprint matching algorithm based on radial structure and a structure-rewarding scoring strategy, in: Proceedings of the 5th International Conference on Audio- and Video-based Biometric Person Authentication (AVBPA 2005), Springer, 2005, pp. 656–664 – volume: 32 start-page: 666 year: 2011 end-page: 675 ident: bib6 article-title: A key binding system based on n-nearest minutiae structure of fingerprint publication-title: Pattern Recognition Letters – reference: . – start-page: 523 year: 2004 end-page: 540 ident: bib25 article-title: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data publication-title: Advances in cryptology-Eurocrypt – year: 2006 ident: bib36 article-title: An implementation of syndrome encoding and decoding for binary BCH codes publication-title: Secure Sketches and Fuzzy Extractors, in – volume: 33 start-page: 221 year: 2010 end-page: 235 ident: bib4 article-title: Minutiae and modified biocode fusion for fingerprint-based key generation publication-title: Journal of Network and Computer Applications – reference: R. Soleymani, M.C. Amirani, A hybrid fingerprint matching algorithm using Delaunay triangulation and Voronoi diagram, in: Proceedings of the 20th Iranian Conference on Electrical Engineering (ICEE'12), 2012, pp. 752–757. – volume: 2 start-page: 744 year: 2007 end-page: 757 ident: bib20 article-title: Fingerprint-based fuzzy vault: implementation and performance publication-title: IEEE Transactions on Information Forensics and Security – reference: Software VeriFinger, Neuro Technology, 2010, 〈 – reference: H. Khazaei, A. Mohades, Fingerprint matching algorithm based on voronoi diagram, in: Proceedings of the International Conference on Computational Sciences and Its Applications (ICCSA'08), IEEE, 2008, pp. 433–440. – start-page: 927 year: 2007 end-page: 937 ident: bib34 article-title: Hardening fingerprint fuzzy vault using password publication-title: Advances in Biometrics – volume: 45 start-page: 151 year: 2012 end-page: 161 ident: bib2 article-title: A novel ant colony optimization algorithm for large-distorted fingerprint matching publication-title: Pattern Recognition – volume: 38 start-page: 237 year: 2006 end-page: 257 ident: bib18 article-title: A fuzzy vault scheme publication-title: Designs, Codes and Cryptography – volume: 29 start-page: 573 year: 2007 end-page: 585 ident: bib21 article-title: A fingerprint orientation model based on 2D Fourier expansion (FOMFE) and its application to singular-point detection and fingerprint indexing publication-title: IEEE Transactions on Pattern Analysis and Machine Intelligence – start-page: 9 year: 2005 end-page: 19 ident: bib30 article-title: Fingerprint matching using minutiae coordinate systems publication-title: Pattern Recognition and Image Analysis – reference: A.V. Ceguerra, I. Koprinska, Integrating local and global features in automatic fingerprint verification, in: Proceedings of the 16th International Conference on Pattern Recognition, 2002, pp. 347–350. – reference: Software code for modified VNS based feature representations, – ident: 10.1016/j.patcog.2013.10.001_bib10 doi: 10.1109/TrustCom.2012.23 – year: 2009 ident: 10.1016/j.patcog.2013.10.001_bib11 – start-page: 927 year: 2007 ident: 10.1016/j.patcog.2013.10.001_bib34 article-title: Hardening fingerprint fuzzy vault using password publication-title: Advances in Biometrics doi: 10.1007/978-3-540-74549-5_97 – volume: 7 start-page: 1727 year: 2012 ident: 10.1016/j.patcog.2013.10.001_bib38 article-title: Noninvertible minutia cylinder-code representation publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2012.2215326 – volume: 32 start-page: 666 year: 2011 ident: 10.1016/j.patcog.2013.10.001_bib6 article-title: A key binding system based on n-nearest minutiae structure of fingerprint publication-title: Pattern Recognition Letters doi: 10.1016/j.patrec.2010.12.015 – volume: 30 start-page: 271 year: 2005 ident: 10.1016/j.patcog.2013.10.001_bib28 article-title: Constrained higher order delaunay triangulations publication-title: Computational Geometry doi: 10.1016/j.comgeo.2004.11.001 – volume: 2 start-page: 744 year: 2007 ident: 10.1016/j.patcog.2013.10.001_bib20 article-title: Fingerprint-based fuzzy vault: implementation and performance publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2007.908165 – ident: 10.1016/j.patcog.2013.10.001_bib13 doi: 10.1007/11527923_68 – volume: 45 start-page: 151 year: 2012 ident: 10.1016/j.patcog.2013.10.001_bib2 article-title: A novel ant colony optimization algorithm for large-distorted fingerprint matching publication-title: Pattern Recognition doi: 10.1016/j.patcog.2011.04.016 – ident: 10.1016/j.patcog.2013.10.001_bib14 doi: 10.1109/ICCSA.2008.52 – year: 2012 ident: 10.1016/j.patcog.2013.10.001_bib3 – year: 2006 ident: 10.1016/j.patcog.2013.10.001_bib36 article-title: An implementation of syndrome encoding and decoding for binary BCH codes – volume: 29 start-page: 573 year: 2007 ident: 10.1016/j.patcog.2013.10.001_bib21 article-title: A fingerprint orientation model based on 2D Fourier expansion (FOMFE) and its application to singular-point detection and fingerprint indexing publication-title: IEEE Transactions on Pattern Analysis and Machine Intelligence doi: 10.1109/TPAMI.2007.1003 – volume: 2 start-page: 721 year: 2007 ident: 10.1016/j.patcog.2013.10.001_bib29 article-title: A robust fingerprint indexing scheme using minutia neighborhood structure and low-order Delaunay triangles publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2007.910242 – volume: 71 start-page: 221 year: 1999 ident: 10.1016/j.patcog.2013.10.001_bib26 article-title: Structural tolerance and Delaunay triangulation publication-title: Information Processing Letters doi: 10.1016/S0020-0190(99)00107-6 – volume: 33 start-page: 221 year: 2010 ident: 10.1016/j.patcog.2013.10.001_bib4 article-title: Minutiae and modified biocode fusion for fingerprint-based key generation publication-title: Journal of Network and Computer Applications doi: 10.1016/j.jnca.2009.12.002 – volume: 38 start-page: 237 year: 2006 ident: 10.1016/j.patcog.2013.10.001_bib18 article-title: A fuzzy vault scheme publication-title: Designs, Codes and Cryptography doi: 10.1007/s10623-005-6343-z – volume: 23 start-page: 85 year: 2002 ident: 10.1016/j.patcog.2013.10.001_bib27 article-title: Higher order delaunay triangulations publication-title: Computational Geometry doi: 10.1016/S0925-7721(01)00027-X – volume: 33 start-page: 207 year: 2010 ident: 10.1016/j.patcog.2013.10.001_bib7 article-title: An alignment-free fingerprint cryptosystem based on fuzzy vault scheme publication-title: Journal of Network and Computer Applications doi: 10.1016/j.jnca.2009.12.003 – year: 2002 ident: 10.1016/j.patcog.2013.10.001_bib1 – volume: 47 start-page: 851 year: 2011 ident: 10.1016/j.patcog.2013.10.001_bib39 article-title: Biohashing applied to orientation-based minutia descriptor for secure fingerprint authentication system publication-title: Electronics Letters doi: 10.1049/el.2011.1525 – volume: 34 start-page: 116 year: 2011 ident: 10.1016/j.patcog.2013.10.001_bib40 article-title: A frequency domain subspace blind channel estimation method for trailing zero OFDM systems publication-title: Journal of Network and Computer Applications doi: 10.1016/j.jnca.2010.08.009 – ident: 10.1016/j.patcog.2013.10.001_bib19 doi: 10.1145/982507.982516 – volume: 45 start-page: 4129 year: 2012 ident: 10.1016/j.patcog.2013.10.001_bib22 article-title: Alignment-free cancellable fingerprint template design: a densely infinite-to-one mapping (DITOM) approach publication-title: Pattern Recognition doi: 10.1016/j.patcog.2012.05.004 – volume: 46 start-page: 501 year: 2004 ident: 10.1016/j.patcog.2013.10.001_bib33 article-title: Barycentric lagrange interpolation publication-title: Siam Review doi: 10.1137/S0036144502417715 – ident: 10.1016/j.patcog.2013.10.001_bib17 doi: 10.1145/319709.319714 – ident: 10.1016/j.patcog.2013.10.001_bib37 – ident: 10.1016/j.patcog.2013.10.001_bib9 doi: 10.1109/ICIEA.2011.5975740 – ident: 10.1016/j.patcog.2013.10.001_bib35 – ident: 10.1016/j.patcog.2013.10.001_bib15 doi: 10.1109/IranianCEE.2012.6292454 – ident: 10.1016/j.patcog.2013.10.001_bib12 doi: 10.1109/ICPR.2002.1047865 – volume: 30 start-page: 311 year: 2011 ident: 10.1016/j.patcog.2013.10.001_bib23 article-title: A pitfall in fingerprint bio-cryptographic key generation publication-title: Computers & Security doi: 10.1016/j.cose.2011.02.003 – year: 2011 ident: 10.1016/j.patcog.2013.10.001_bib16 article-title: Fingerprint template protection with minutiae-based bit-string for security and privacy preserving publication-title: Expert Systems with Applications – start-page: 523 year: 2004 ident: 10.1016/j.patcog.2013.10.001_bib25 article-title: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data – start-page: 9 year: 2005 ident: 10.1016/j.patcog.2013.10.001_bib30 article-title: Fingerprint matching using minutiae coordinate systems publication-title: Pattern Recognition and Image Analysis – start-page: 760 year: 2007 ident: 10.1016/j.patcog.2013.10.001_bib8 article-title: Fuzzy extractors for minutiae-based fingerprint authentication publication-title: Advances in Biometrics doi: 10.1007/978-3-540-74549-5_80 – ident: 10.1016/j.patcog.2013.10.001_bib5 doi: 10.1109/ICIEA.2008.4582896 – volume: 38 start-page: 97 year: 2008 ident: 10.1016/j.patcog.2013.10.001_bib24 article-title: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data publication-title: SIAM Journal on Computing doi: 10.1137/060651380 – volume: 33 start-page: 236 year: 2010 ident: 10.1016/j.patcog.2013.10.001_bib31 article-title: Cancelable fingerprint templates using minutiae-based bit-strings publication-title: Journal of Network and Computer Applications doi: 10.1016/j.jnca.2009.12.011 – ident: 10.1016/j.patcog.2013.10.001_bib32 doi: 10.1109/ICPR.2006.573 |
SSID | ssj0017142 |
Score | 2.3841915 |
Snippet | Bio-cryptography is an emerging security technology which combines cryptography with biometrics. A good bio-cryptosystem is required to protect the privacy of... |
SourceID | proquest pascalfrancis crossref elsevier |
SourceType | Aggregation Database Index Database Enrichment Source Publisher |
StartPage | 1309 |
SubjectTerms | Alignment Alignment-free Applied sciences Bio-cryptosystem Biometrics Cryptography Deviation Distortion Distortion robust Exact sciences and technology Fingerprint Fingerprints Fuzzy extractor Image processing Information, signal and communications theory Modified Voronoi neighbor structure Pattern recognition Recognition Security Signal and communications theory Signal processing Telecommunications and information theory Transformations |
Title | An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures |
URI | https://dx.doi.org/10.1016/j.patcog.2013.10.001 https://www.proquest.com/docview/1671608337 |
Volume | 47 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEA6yXgTxLT6XCF6jmzZNtsdFlFXRkyt7EEqbx1LRtri7By_-dmeadmEREbwUWhJSvkxmJsk3M4Scgw11hkvNuBWSiUBZFoNby6Q2qetZoVODwckPj3I4EnfjaLxCrtpYGKRVNrrf6_RaWzdfLhs0L6s8xxhfTDuID5RENcYIdqFQyi--FjQPrO_tM4aHnGHrNnyu5nhVoO7KCRK8woua48V_M0_rVToF0JyvdvFDcdfW6GaLbDRuJB34P90mK7bYIZttiQbarNhd8jIoKHjak_rOn7kPa6mrD_LwPG9Gs7xk-uOzmpU-ozNFo2ZoWdD30uQO3FP6jCkOypwWeIYKAkN9xtk5bNP3yOjm-ulqyJqCCkyDVzSDbaIJApeBOeqbVGUi7uk-bD-0lFbE1ijuor5VBvO9gBdh-7GQVlmpeJBpEyoT7pNOURb2gNCMZ0Jz5NQILiKnslD2XJw6gJu7VEWHJGxxTHSTbRyLXrwlLa3sNfHoJ4g-fgX0Dwlb9Kp8to0_2qt2ipIlqUnAIPzRs7s0o4vh8GY5UBwanLVTnMCKw2uUtLDlfJpwAESC5xqqo38Pf0zW4E14MtsJ6cDM2VPwbmZZtxbfLlkd3N4PH78BsUr65w |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEA6rHhTEt_g2gtfops0m26Msyvo8qexBCG0eUtG26Hrw4m93pmkXRETw0kOa0DIzmZkkX74h5BBiqLdcGsadkExEyrEE0lomjU191wmTWrycfH0jh3fiYtQbdcigvQuDsMrG9wefXnvrpuW4keZxled4xxdpB_GBlqhGU2RGwPTFMgZHnxOcBxb4DpThMWfYvb0_V4O8KvB35SMivOKjGuTFf4tP81X6BlLzodzFD89dh6OzJbLQ5JH0JPzqMum4YoUstjUaaDNlV8nDSUEh1X6sD_2Zf3WO-nonDzf0xjTLS2ZeP6pxGSidKUY1S8uCvpQ295Cf0nvkOChzWuAmKlgMDZSz77BOXyN3Z6e3gyFrKiowA2nRGNaJNop8BvGob1OViaRr-rD-MFI6kTiruO_1nbJI-AJphOsnQjrlpOJRZmysbLxOpouycBuEZjwThiOoRnDR8yqLZdcnqQdxc5-q3iaJWzlq09CNY9WLZ93iyp50kL5G6WMrSH-TsMmoKtBt_NFftSrS38xGQ0T4Y-TeN41OPodHy5Hi0OGgVbGGKYfnKGnhyvc3zUEgElLXWG39-_P7ZHZ4e32lr85vLrfJHLwRAdm2Q6ZBi24XUp1xtleb8hdkMvx1 |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+alignment-free+fingerprint+bio-cryptosystem+based+on+modified+Voronoi+neighbor+structures&rft.jtitle=Pattern+recognition&rft.au=WENCHENG+YANG&rft.au=JIANKUN+HU&rft.au=SONG+WANG&rft.au=STOJMENOVIC%2C+Milos&rft.date=2014-03-01&rft.pub=Elsevier&rft.issn=0031-3203&rft.volume=47&rft.issue=3&rft.spage=1309&rft.epage=1320&rft_id=info:doi/10.1016%2Fj.patcog.2013.10.001&rft.externalDBID=n%2Fa&rft.externalDocID=28292711 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0031-3203&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0031-3203&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0031-3203&client=summon |