An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures

Bio-cryptography is an emerging security technology which combines cryptography with biometrics. A good bio-cryptosystem is required to protect the privacy of the relevant biometric data as well as achieving high recognition accuracy. Fingerprints have been widely used in bio-cryptosystem design. Ho...

Full description

Saved in:
Bibliographic Details
Published inPattern recognition Vol. 47; no. 3; pp. 1309 - 1320
Main Authors Yang, Wencheng, Hu, Jiankun, Wang, Song, Stojmenovic, Milos
Format Journal Article
LanguageEnglish
Published Kidlington Elsevier Ltd 01.03.2014
Elsevier
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Bio-cryptography is an emerging security technology which combines cryptography with biometrics. A good bio-cryptosystem is required to protect the privacy of the relevant biometric data as well as achieving high recognition accuracy. Fingerprints have been widely used in bio-cryptosystem design. However, fingerprint uncertainty caused by distortion and rotation during the image capturing process makes it difficult to achieve a high recognition rate in most bio-cryptographic systems. Moreover, most existing bio-cryptosystems rely on the accurate detection of singular points for fingerprint image pre-alignment, which is very hard to achieve, and the image rotation transformation during the alignment process can cause significant singular point deviation and minutiae changes. In this paper, by taking full advantage of local Voronoi neighbor structures (VNSs), e.g. local structural stability and distortion insensitivity, we propose an alignment-free bio-cryptosystem based on fixed-length bit-string representations extracted from modified VNSs, which are rotation- and translation-invariant and distortion robust. The proposed alignment-free bio-cryptosystem is able to provide strong security while achieving good recognition performance. Experimental results in comparison with most existing alignment-free bio-cryptosystems using the publicly-available databases show the validity of the proposed scheme. •We propose an alignment-free fingerprint bio-cryptosystem based on modified VNSs.•The scheme is able to compensate the VNS change caused by large non-linear distortion.•Encrypted matching is performed and protected by the secure sketch, PinSketch.•The Experimental results show the validity of the proposed scheme.
AbstractList Bio-cryptography is an emerging security technology which combines cryptography with biometrics. A good bio-cryptosystem is required to protect the privacy of the relevant biometric data as well as achieving high recognition accuracy. Fingerprints have been widely used in bio-cryptosystem design. However, fingerprint uncertainty caused by distortion and rotation during the image capturing process makes it difficult to achieve a high recognition rate in most bio-cryptographic systems. Moreover, most existing bio-cryptosystems rely on the accurate detection of singular points for fingerprint image pre-alignment, which is very hard to achieve, and the image rotation transformation during the alignment process can cause significant singular point deviation and minutiae changes. In this paper, by taking full advantage of local Voronoi neighbor structures (VNSs), e.g. local structural stability and distortion insensitivity, we propose an alignment-free bio-cryptosystem based on fixed-length bit-string representations extracted from modified VNSs, which are rotation- and translation-invariant and distortion robust. The proposed alignment-free bio-cryptosystem is able to provide strong security while achieving good recognition performance. Experimental results in comparison with most existing alignment-free bio-cryptosystems using the publicly-available databases show the validity of the proposed scheme.
Bio-cryptography is an emerging security technology which combines cryptography with biometrics. A good bio-cryptosystem is required to protect the privacy of the relevant biometric data as well as achieving high recognition accuracy. Fingerprints have been widely used in bio-cryptosystem design. However, fingerprint uncertainty caused by distortion and rotation during the image capturing process makes it difficult to achieve a high recognition rate in most bio-cryptographic systems. Moreover, most existing bio-cryptosystems rely on the accurate detection of singular points for fingerprint image pre-alignment, which is very hard to achieve, and the image rotation transformation during the alignment process can cause significant singular point deviation and minutiae changes. In this paper, by taking full advantage of local Voronoi neighbor structures (VNSs), e.g. local structural stability and distortion insensitivity, we propose an alignment-free bio-cryptosystem based on fixed-length bit-string representations extracted from modified VNSs, which are rotation- and translation-invariant and distortion robust. The proposed alignment-free bio-cryptosystem is able to provide strong security while achieving good recognition performance. Experimental results in comparison with most existing alignment-free bio-cryptosystems using the publicly-available databases show the validity of the proposed scheme. •We propose an alignment-free fingerprint bio-cryptosystem based on modified VNSs.•The scheme is able to compensate the VNS change caused by large non-linear distortion.•Encrypted matching is performed and protected by the secure sketch, PinSketch.•The Experimental results show the validity of the proposed scheme.
Author Wang, Song
Yang, Wencheng
Stojmenovic, Milos
Hu, Jiankun
Author_xml – sequence: 1
  givenname: Wencheng
  surname: Yang
  fullname: Yang, Wencheng
  email: wencheng.yang@student.adfa.edu.au
  organization: School of Engineering and Information Technology, University of New South Wales at the Australia Defence Force Academy, Canberra ACT 2600, Australia
– sequence: 2
  givenname: Jiankun
  orcidid: 0000-0003-0230-1432
  surname: Hu
  fullname: Hu, Jiankun
  email: J.Hu@adfa.edu.au
  organization: School of Engineering and Information Technology, University of New South Wales at the Australia Defence Force Academy, Canberra ACT 2600, Australia
– sequence: 3
  givenname: Song
  surname: Wang
  fullname: Wang, Song
  email: Song.Wang@latrobe.edu.au
  organization: School of Engineering and Mathematical Sciences, La Trobe University, VIC 3086, Australia
– sequence: 4
  givenname: Milos
  surname: Stojmenovic
  fullname: Stojmenovic, Milos
  email: mstojmenovic@singidunum.ac.rs
  organization: Department of Informatics and Computing, Singidunum University, Belgrade, Serbia
BackLink http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=28292711$$DView record in Pascal Francis
BookMark eNqFkE1rGzEQhkVJoE7Sf9DDXgq9rKuR1ittD4UQ0g8I9JL0VBBaadYdsyu5klzwv6-M00sP7WmG0fO-oOeKXYQYkLHXwNfAoX-3W-9tcXG7FhxkPa05hxdsBVrJdgOduGArziW0UnD5kl3lvKuAqg8r9v02NHambVgwlHZKiM1EYYtpnyiUZqTYunTcl5iPueDSjDajb2Joluhporp_iymGSE1A2v4YY2pySQdXDgnzDbuc7Jzx1fO8Zk8f7x_vPrcPXz99ubt9aF0nN6XtwQsxjQq09laN3cCd7oR2fY_dgF7BtNGo_EZoOQBHPXQ9KuwViNF5qby8Zm_PvfsUfx4wF7NQdjjPNmA8ZAOV7bmWUlX0zTNqs7PzlGxwlE397WLT0QgtBqEAKvf-zLkUc044GUfFFoqhJEuzAW5O6s3OnNWbk_rTtZqt4e6v8J_-_8Q-nGNYXf0iTCY7wuDQU0JXjI_074LfFFOiqA
CODEN PTNRA8
CitedBy_id crossref_primary_10_1049_ipr2_12130
crossref_primary_10_1142_S0218001423560074
crossref_primary_10_1109_TCE_2022_3217234
crossref_primary_10_1142_S0218001417560043
crossref_primary_10_1007_s11042_017_4528_x
crossref_primary_10_1049_iet_ipr_2020_1025
crossref_primary_10_1007_s11042_022_13733_y
crossref_primary_10_1016_j_jisa_2022_103355
crossref_primary_10_1016_j_jnca_2018_04_013
crossref_primary_10_1049_iet_bmt_2018_5263
crossref_primary_10_3390_s19132985
crossref_primary_10_1109_TDSC_2018_2812192
crossref_primary_10_1007_s11042_021_11325_w
crossref_primary_10_1016_j_ins_2019_05_064
crossref_primary_10_1049_el_2015_1349
crossref_primary_10_1007_s11042_017_5095_x
crossref_primary_10_1186_s13635_022_00129_6
crossref_primary_10_1109_ACCESS_2018_2844182
crossref_primary_10_1016_j_cose_2019_101690
crossref_primary_10_1002_sec_1267
crossref_primary_10_1587_transfun_2022EAP1079
crossref_primary_10_1007_s11042_020_09197_7
crossref_primary_10_1109_TDSC_2018_2874245
crossref_primary_10_1109_TIFS_2023_3273919
crossref_primary_10_3390_sym11020141
crossref_primary_10_1016_j_patcog_2016_02_024
crossref_primary_10_1016_j_patrec_2019_11_037
crossref_primary_10_1093_comjnl_bxv107
crossref_primary_10_1109_TIFS_2015_2402593
crossref_primary_10_1007_s11263_024_02280_8
crossref_primary_10_1049_iet_bmt_2016_0008
crossref_primary_10_1007_s10044_016_0584_5
crossref_primary_10_1007_s10489_022_04038_6
crossref_primary_10_1109_ACCESS_2020_3009917
crossref_primary_10_1109_TETC_2021_3130126
crossref_primary_10_1145_2930669
crossref_primary_10_1007_s00371_022_02726_5
crossref_primary_10_1049_iet_bmt_2018_5070
crossref_primary_10_1016_j_imavis_2020_104004
crossref_primary_10_1007_s11042_020_10095_1
crossref_primary_10_1016_j_forc_2023_100522
crossref_primary_10_1117_1_JEI_27_5_053031
crossref_primary_10_1007_s11042_020_10127_w
crossref_primary_10_1109_TII_2022_3195938
crossref_primary_10_1016_j_compeleceng_2018_01_028
crossref_primary_10_1049_iet_bmt_2015_0034
crossref_primary_10_1016_j_patcog_2015_01_021
crossref_primary_10_1016_j_patcog_2016_01_001
crossref_primary_10_4028_www_scientific_net_AMM_518_316
crossref_primary_10_1109_TIFS_2015_2505630
crossref_primary_10_1016_j_patrec_2018_04_017
crossref_primary_10_3233_JIFS_189952
Cites_doi 10.1109/TrustCom.2012.23
10.1007/978-3-540-74549-5_97
10.1109/TIFS.2012.2215326
10.1016/j.patrec.2010.12.015
10.1016/j.comgeo.2004.11.001
10.1109/TIFS.2007.908165
10.1007/11527923_68
10.1016/j.patcog.2011.04.016
10.1109/ICCSA.2008.52
10.1109/TPAMI.2007.1003
10.1109/TIFS.2007.910242
10.1016/S0020-0190(99)00107-6
10.1016/j.jnca.2009.12.002
10.1007/s10623-005-6343-z
10.1016/S0925-7721(01)00027-X
10.1016/j.jnca.2009.12.003
10.1049/el.2011.1525
10.1016/j.jnca.2010.08.009
10.1145/982507.982516
10.1016/j.patcog.2012.05.004
10.1137/S0036144502417715
10.1145/319709.319714
10.1109/ICIEA.2011.5975740
10.1109/IranianCEE.2012.6292454
10.1109/ICPR.2002.1047865
10.1016/j.cose.2011.02.003
10.1007/978-3-540-74549-5_80
10.1109/ICIEA.2008.4582896
10.1137/060651380
10.1016/j.jnca.2009.12.011
10.1109/ICPR.2006.573
ContentType Journal Article
Copyright 2013 Elsevier Ltd
2015 INIST-CNRS
Copyright_xml – notice: 2013 Elsevier Ltd
– notice: 2015 INIST-CNRS
DBID AAYXX
CITATION
IQODW
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1016/j.patcog.2013.10.001
DatabaseName CrossRef
Pascal-Francis
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList Computer and Information Systems Abstracts

DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
Applied Sciences
EISSN 1873-5142
EndPage 1320
ExternalDocumentID 28292711
10_1016_j_patcog_2013_10_001
S003132031300407X
GroupedDBID --K
--M
-D8
-DT
-~X
.DC
.~1
0R~
123
1B1
1RT
1~.
1~5
29O
4.4
457
4G.
53G
5VS
7-5
71M
8P~
9JN
AABNK
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABEFU
ABFNM
ABFRF
ABHFT
ABJNI
ABMAC
ABTAH
ABXDB
ABYKQ
ACBEA
ACDAQ
ACGFO
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADJOM
ADMUD
ADMXK
ADTZH
AEBSH
AECPX
AEFWE
AEKER
AENEX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHJVU
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BJAXD
BKOJK
BLXMC
CS3
DU5
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
F0J
F5P
FD6
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-Q
G8K
GBLVA
GBOLZ
HLZ
HVGLF
HZ~
H~9
IHE
J1W
JJJVA
KOM
KZ1
LG9
LMP
LY1
M41
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
Q38
R2-
RIG
RNS
ROL
RPZ
SBC
SDF
SDG
SDP
SDS
SES
SEW
SPC
SPCBC
SST
SSV
SSZ
T5K
TN5
UNMZH
VOH
WUQ
XJE
XPP
ZMT
ZY4
~G-
AATTM
AAXKI
AAYWO
AAYXX
ABDPE
ABWVN
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AFXIZ
AGCQF
AGQPQ
AGRNS
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
BNPGV
CITATION
SSH
IQODW
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c435t-61d22fb7188da7b490c8428c66e49ed71f58e7d5283910e8946e7e6712bcd37d3
IEDL.DBID .~1
ISSN 0031-3203
IngestDate Thu Jul 10 23:09:19 EDT 2025
Wed Apr 02 07:37:51 EDT 2025
Thu Apr 24 23:12:16 EDT 2025
Tue Jul 01 02:36:17 EDT 2025
Fri Feb 23 02:25:24 EST 2024
IsPeerReviewed true
IsScholarly true
Issue 3
Keywords Fingerprint
Distortion robust
Bio-cryptosystem
Fuzzy extractor
Alignment-free
Modified Voronoi neighbor structure
Biometrics
Performance evaluation
Private life
Image processing
Sequence alignment
Singular point
High precision
Pattern recognition
Image matching
Rotational invariance
Security of data
Database
Cryptography
Automatic recognition
Language English
License CC BY 4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c435t-61d22fb7188da7b490c8428c66e49ed71f58e7d5283910e8946e7e6712bcd37d3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
ORCID 0000-0003-0230-1432
PQID 1671608337
PQPubID 23500
PageCount 12
ParticipantIDs proquest_miscellaneous_1671608337
pascalfrancis_primary_28292711
crossref_citationtrail_10_1016_j_patcog_2013_10_001
crossref_primary_10_1016_j_patcog_2013_10_001
elsevier_sciencedirect_doi_10_1016_j_patcog_2013_10_001
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2014-03-01
PublicationDateYYYYMMDD 2014-03-01
PublicationDate_xml – month: 03
  year: 2014
  text: 2014-03-01
  day: 01
PublicationDecade 2010
PublicationPlace Kidlington
PublicationPlace_xml – name: Kidlington
PublicationTitle Pattern recognition
PublicationYear 2014
Publisher Elsevier Ltd
Elsevier
Publisher_xml – name: Elsevier Ltd
– name: Elsevier
References Abellanas, Hurtado, Ramos (bib26) 1999; 71
Liang, Bishnu, Asano (bib29) 2007; 2
Benhammadi, Hentous, Bey-Beghdad, Aissani (bib30) 2005
Software VeriFinger, Neuro Technology, 2010
Wang, Hu (bib22) 2012; 45
T.C. Clancy, N. Kiyavash, D.J. Lin, Secure smartcardbased fingerprint authentication, in: Proceedings of the 2003 ACM SIGMM Workshop on Biometrics Methods and Applications, ACM, 2003, pp. 45–52.
Dodis, Reyzin, Smith (bib25) 2004
Nagar (bib3) 2012
Zhang, Hu, Li, Bennamoun, Bhagavatula (bib23) 2011; 30

Juels, Sudan (bib18) 2006; 38
Li, Yang, Cao, Tao, Wang, Tian (bib7) 2010; 33
Software code for modified VNS based feature representations
Harmon, Johnson, Reyzin (bib36) 2006
Cao, Yang, Chen, Zang, Liang, Tian (bib2) 2012; 45
K.D. Yu, S. Na, T.Y. Choi, A fingerprint matching algorithm based on radial structure and a structure-rewarding scoring strategy, in: Proceedings of the 5th International Conference on Audio- and Video-based Biometric Person Authentication (AVBPA 2005), Springer, 2005, pp. 656–664
K. Xi, J. Hu, F. Han, An alignment free fingerprint fuzzy extractor using near-equivalent dual layer structure check (NeDLSC) algorithm, in: Proceedings of the th IEEE Conference on Industrial Electronics and Applications (ICIEA), 2011, pp. 1040–1045.
Ferrara, Maltoni, Cappelli (bib38) 2012; 7
Nandakumar, Nagar, Jain (bib34) 2007
Lee, Kim (bib31) 2010; 33
H. Khazaei, A. Mohades, Fingerprint matching algorithm based on voronoi diagram, in: Proceedings of the International Conference on Computational Sciences and Its Applications (ICCSA'08), IEEE, 2008, pp. 433–440.
W. Yang, J. Hu, S. Wang, A delaunay triangle-based fuzzy extractor for fingerprint authentication, in: Proceedings of the IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2012, pp. 66–70.
Berrut, Trefethen (bib33) 2004; 46
Wang, Cao, Hu (bib40) 2011; 34
Wang, Hu, Phillips (bib21) 2007; 29
Arakala, Jeffers, Horadam (bib8) 2007
Kaufman, Perlman, Speciner (bib1) 2002
A. Juels, M. Wattenberg, A fuzzy commitment scheme, in: Proceedings of the 6th ACM conference on Computer and Communications Security, ACM, 1999, pp. 28–36.
Dodis, Ostrovsky, Reyzin, Smith (bib24) 2008; 38
R. Soleymani, M.C. Amirani, A hybrid fingerprint matching algorithm using Delaunay triangulation and Voronoi diagram, in: Proceedings of the 20th Iranian Conference on Electrical Engineering (ICEE'12), 2012, pp. 752–757.
Nandakumar, Jain, Pankanti (bib20) 2007; 2
Gudmundsson, Hammar, Van Kreveld (bib27) 2002; 23
Okabe, Boots, Sugihara, Chiu (bib11) 2009
Liu, Liang, Pang, Xie, Tian (bib4) 2010; 33
J. Hu, Mobile fingerprint template protection: progress and open issues, in: Proceedings of the 3rd IEEE Conference on Industrial Electronics and Applications (ICIEA'08), 2008, pp. 2133–2138.
Jin, Jin Teoh, Ong, Tee (bib16) 2011
.
Nanni, Brahnam, Lumini (bib39) 2011; 47
W. Wang, J. Li, W. Chen, Fingerprint minutiae matching based on coordinate system bank and global optimum alignment, in: Proceedings of the 18th International Conference on Pattern Recognition (ICPR'06) IEEE, 2006, pp. 401–404.
A.V. Ceguerra, I. Koprinska, Integrating local and global features in automatic fingerprint verification, in: Proceedings of the 16th International Conference on Pattern Recognition, 2002, pp. 347–350.
Liu, Zhao, Liang, Pang, Xie, Chen, Li, Li, Tian (bib6) 2011; 32
Gudmundsson, Haverkort, Van Kreveld (bib28) 2005; 30
Kaufman (10.1016/j.patcog.2013.10.001_bib1) 2002
Abellanas (10.1016/j.patcog.2013.10.001_bib26) 1999; 71
Wang (10.1016/j.patcog.2013.10.001_bib21) 2007; 29
Wang (10.1016/j.patcog.2013.10.001_bib22) 2012; 45
Dodis (10.1016/j.patcog.2013.10.001_bib25) 2004
Benhammadi (10.1016/j.patcog.2013.10.001_bib30) 2005
Nandakumar (10.1016/j.patcog.2013.10.001_bib20) 2007; 2
Berrut (10.1016/j.patcog.2013.10.001_bib33) 2004; 46
Li (10.1016/j.patcog.2013.10.001_bib7) 2010; 33
10.1016/j.patcog.2013.10.001_bib9
Wang (10.1016/j.patcog.2013.10.001_bib40) 2011; 34
Liu (10.1016/j.patcog.2013.10.001_bib6) 2011; 32
Cao (10.1016/j.patcog.2013.10.001_bib2) 2012; 45
10.1016/j.patcog.2013.10.001_bib19
10.1016/j.patcog.2013.10.001_bib17
Lee (10.1016/j.patcog.2013.10.001_bib31) 2010; 33
10.1016/j.patcog.2013.10.001_bib15
Liang (10.1016/j.patcog.2013.10.001_bib29) 2007; 2
10.1016/j.patcog.2013.10.001_bib37
10.1016/j.patcog.2013.10.001_bib14
Ferrara (10.1016/j.patcog.2013.10.001_bib38) 2012; 7
10.1016/j.patcog.2013.10.001_bib13
10.1016/j.patcog.2013.10.001_bib35
10.1016/j.patcog.2013.10.001_bib12
Gudmundsson (10.1016/j.patcog.2013.10.001_bib27) 2002; 23
Nandakumar (10.1016/j.patcog.2013.10.001_bib34) 2007
Nagar (10.1016/j.patcog.2013.10.001_bib3) 2012
10.1016/j.patcog.2013.10.001_bib10
10.1016/j.patcog.2013.10.001_bib32
10.1016/j.patcog.2013.10.001_bib5
Arakala (10.1016/j.patcog.2013.10.001_bib8) 2007
Juels (10.1016/j.patcog.2013.10.001_bib18) 2006; 38
Harmon (10.1016/j.patcog.2013.10.001_bib36) 2006
Okabe (10.1016/j.patcog.2013.10.001_bib11) 2009
Dodis (10.1016/j.patcog.2013.10.001_bib24) 2008; 38
Nanni (10.1016/j.patcog.2013.10.001_bib39) 2011; 47
Liu (10.1016/j.patcog.2013.10.001_bib4) 2010; 33
Gudmundsson (10.1016/j.patcog.2013.10.001_bib28) 2005; 30
Zhang (10.1016/j.patcog.2013.10.001_bib23) 2011; 30
Jin (10.1016/j.patcog.2013.10.001_bib16) 2011
References_xml – volume: 30
  start-page: 271
  year: 2005
  end-page: 277
  ident: bib28
  article-title: Constrained higher order delaunay triangulations
  publication-title: Computational Geometry
– volume: 30
  start-page: 311
  year: 2011
  end-page: 319
  ident: bib23
  article-title: A pitfall in fingerprint bio-cryptographic key generation
  publication-title: Computers & Security
– reference: A. Juels, M. Wattenberg, A fuzzy commitment scheme, in: Proceedings of the 6th ACM conference on Computer and Communications Security, ACM, 1999, pp. 28–36.
– volume: 33
  start-page: 236
  year: 2010
  end-page: 246
  ident: bib31
  article-title: Cancelable fingerprint templates using minutiae-based bit-strings
  publication-title: Journal of Network and Computer Applications
– year: 2002
  ident: bib1
  article-title: Network Security: Private Communication in a Public World
– reference: K. Xi, J. Hu, F. Han, An alignment free fingerprint fuzzy extractor using near-equivalent dual layer structure check (NeDLSC) algorithm, in: Proceedings of the th IEEE Conference on Industrial Electronics and Applications (ICIEA), 2011, pp. 1040–1045.
– volume: 46
  start-page: 501
  year: 2004
  end-page: 517
  ident: bib33
  article-title: Barycentric lagrange interpolation
  publication-title: Siam Review
– volume: 23
  start-page: 85
  year: 2002
  end-page: 98
  ident: bib27
  article-title: Higher order delaunay triangulations
  publication-title: Computational Geometry
– start-page: 760
  year: 2007
  end-page: 769
  ident: bib8
  article-title: Fuzzy extractors for minutiae-based fingerprint authentication
  publication-title: Advances in Biometrics
– volume: 7
  start-page: 1727
  year: 2012
  end-page: 1737
  ident: bib38
  article-title: Noninvertible minutia cylinder-code representation
  publication-title: IEEE Transactions on Information Forensics and Security
– reference: J. Hu, Mobile fingerprint template protection: progress and open issues, in: Proceedings of the 3rd IEEE Conference on Industrial Electronics and Applications (ICIEA'08), 2008, pp. 2133–2138.
– year: 2011
  ident: bib16
  article-title: Fingerprint template protection with minutiae-based bit-string for security and privacy preserving
  publication-title: Expert Systems with Applications
– year: 2009
  ident: bib11
  article-title: Spatial Tessellations: Concepts and Applications of Voronoi Diagrams
– reference: T.C. Clancy, N. Kiyavash, D.J. Lin, Secure smartcardbased fingerprint authentication, in: Proceedings of the 2003 ACM SIGMM Workshop on Biometrics Methods and Applications, ACM, 2003, pp. 45–52.
– volume: 34
  start-page: 116
  year: 2011
  end-page: 120
  ident: bib40
  article-title: A frequency domain subspace blind channel estimation method for trailing zero OFDM systems
  publication-title: Journal of Network and Computer Applications
– reference: W. Wang, J. Li, W. Chen, Fingerprint minutiae matching based on coordinate system bank and global optimum alignment, in: Proceedings of the 18th International Conference on Pattern Recognition (ICPR'06) IEEE, 2006, pp. 401–404.
– volume: 45
  start-page: 4129
  year: 2012
  end-page: 4137
  ident: bib22
  article-title: Alignment-free cancellable fingerprint template design: a densely infinite-to-one mapping (DITOM) approach
  publication-title: Pattern Recognition
– volume: 38
  start-page: 97
  year: 2008
  end-page: 139
  ident: bib24
  article-title: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data
  publication-title: SIAM Journal on Computing
– volume: 47
  start-page: 851
  year: 2011
  end-page: 853
  ident: bib39
  article-title: Biohashing applied to orientation-based minutia descriptor for secure fingerprint authentication system
  publication-title: Electronics Letters
– reference: W. Yang, J. Hu, S. Wang, A delaunay triangle-based fuzzy extractor for fingerprint authentication, in: Proceedings of the IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2012, pp. 66–70.
– reference:
– volume: 2
  start-page: 721
  year: 2007
  end-page: 733
  ident: bib29
  article-title: A robust fingerprint indexing scheme using minutia neighborhood structure and low-order Delaunay triangles
  publication-title: IEEE Transactions on Information Forensics and Security
– volume: 71
  start-page: 221
  year: 1999
  end-page: 227
  ident: bib26
  article-title: Structural tolerance and Delaunay triangulation
  publication-title: Information Processing Letters
– year: 2012
  ident: bib3
  article-title: Biometric Template Security, Dissertation
– volume: 33
  start-page: 207
  year: 2010
  end-page: 220
  ident: bib7
  article-title: An alignment-free fingerprint cryptosystem based on fuzzy vault scheme
  publication-title: Journal of Network and Computer Applications
– reference: K.D. Yu, S. Na, T.Y. Choi, A fingerprint matching algorithm based on radial structure and a structure-rewarding scoring strategy, in: Proceedings of the 5th International Conference on Audio- and Video-based Biometric Person Authentication (AVBPA 2005), Springer, 2005, pp. 656–664
– volume: 32
  start-page: 666
  year: 2011
  end-page: 675
  ident: bib6
  article-title: A key binding system based on n-nearest minutiae structure of fingerprint
  publication-title: Pattern Recognition Letters
– reference: .
– start-page: 523
  year: 2004
  end-page: 540
  ident: bib25
  article-title: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
  publication-title: Advances in cryptology-Eurocrypt
– year: 2006
  ident: bib36
  article-title: An implementation of syndrome encoding and decoding for binary BCH codes
  publication-title: Secure Sketches and Fuzzy Extractors, in
– volume: 33
  start-page: 221
  year: 2010
  end-page: 235
  ident: bib4
  article-title: Minutiae and modified biocode fusion for fingerprint-based key generation
  publication-title: Journal of Network and Computer Applications
– reference: R. Soleymani, M.C. Amirani, A hybrid fingerprint matching algorithm using Delaunay triangulation and Voronoi diagram, in: Proceedings of the 20th Iranian Conference on Electrical Engineering (ICEE'12), 2012, pp. 752–757.
– volume: 2
  start-page: 744
  year: 2007
  end-page: 757
  ident: bib20
  article-title: Fingerprint-based fuzzy vault: implementation and performance
  publication-title: IEEE Transactions on Information Forensics and Security
– reference: Software VeriFinger, Neuro Technology, 2010, 〈
– reference: H. Khazaei, A. Mohades, Fingerprint matching algorithm based on voronoi diagram, in: Proceedings of the International Conference on Computational Sciences and Its Applications (ICCSA'08), IEEE, 2008, pp. 433–440.
– start-page: 927
  year: 2007
  end-page: 937
  ident: bib34
  article-title: Hardening fingerprint fuzzy vault using password
  publication-title: Advances in Biometrics
– volume: 45
  start-page: 151
  year: 2012
  end-page: 161
  ident: bib2
  article-title: A novel ant colony optimization algorithm for large-distorted fingerprint matching
  publication-title: Pattern Recognition
– volume: 38
  start-page: 237
  year: 2006
  end-page: 257
  ident: bib18
  article-title: A fuzzy vault scheme
  publication-title: Designs, Codes and Cryptography
– volume: 29
  start-page: 573
  year: 2007
  end-page: 585
  ident: bib21
  article-title: A fingerprint orientation model based on 2D Fourier expansion (FOMFE) and its application to singular-point detection and fingerprint indexing
  publication-title: IEEE Transactions on Pattern Analysis and Machine Intelligence
– start-page: 9
  year: 2005
  end-page: 19
  ident: bib30
  article-title: Fingerprint matching using minutiae coordinate systems
  publication-title: Pattern Recognition and Image Analysis
– reference: A.V. Ceguerra, I. Koprinska, Integrating local and global features in automatic fingerprint verification, in: Proceedings of the 16th International Conference on Pattern Recognition, 2002, pp. 347–350.
– reference: Software code for modified VNS based feature representations,
– ident: 10.1016/j.patcog.2013.10.001_bib10
  doi: 10.1109/TrustCom.2012.23
– year: 2009
  ident: 10.1016/j.patcog.2013.10.001_bib11
– start-page: 927
  year: 2007
  ident: 10.1016/j.patcog.2013.10.001_bib34
  article-title: Hardening fingerprint fuzzy vault using password
  publication-title: Advances in Biometrics
  doi: 10.1007/978-3-540-74549-5_97
– volume: 7
  start-page: 1727
  year: 2012
  ident: 10.1016/j.patcog.2013.10.001_bib38
  article-title: Noninvertible minutia cylinder-code representation
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2012.2215326
– volume: 32
  start-page: 666
  year: 2011
  ident: 10.1016/j.patcog.2013.10.001_bib6
  article-title: A key binding system based on n-nearest minutiae structure of fingerprint
  publication-title: Pattern Recognition Letters
  doi: 10.1016/j.patrec.2010.12.015
– volume: 30
  start-page: 271
  year: 2005
  ident: 10.1016/j.patcog.2013.10.001_bib28
  article-title: Constrained higher order delaunay triangulations
  publication-title: Computational Geometry
  doi: 10.1016/j.comgeo.2004.11.001
– volume: 2
  start-page: 744
  year: 2007
  ident: 10.1016/j.patcog.2013.10.001_bib20
  article-title: Fingerprint-based fuzzy vault: implementation and performance
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2007.908165
– ident: 10.1016/j.patcog.2013.10.001_bib13
  doi: 10.1007/11527923_68
– volume: 45
  start-page: 151
  year: 2012
  ident: 10.1016/j.patcog.2013.10.001_bib2
  article-title: A novel ant colony optimization algorithm for large-distorted fingerprint matching
  publication-title: Pattern Recognition
  doi: 10.1016/j.patcog.2011.04.016
– ident: 10.1016/j.patcog.2013.10.001_bib14
  doi: 10.1109/ICCSA.2008.52
– year: 2012
  ident: 10.1016/j.patcog.2013.10.001_bib3
– year: 2006
  ident: 10.1016/j.patcog.2013.10.001_bib36
  article-title: An implementation of syndrome encoding and decoding for binary BCH codes
– volume: 29
  start-page: 573
  year: 2007
  ident: 10.1016/j.patcog.2013.10.001_bib21
  article-title: A fingerprint orientation model based on 2D Fourier expansion (FOMFE) and its application to singular-point detection and fingerprint indexing
  publication-title: IEEE Transactions on Pattern Analysis and Machine Intelligence
  doi: 10.1109/TPAMI.2007.1003
– volume: 2
  start-page: 721
  year: 2007
  ident: 10.1016/j.patcog.2013.10.001_bib29
  article-title: A robust fingerprint indexing scheme using minutia neighborhood structure and low-order Delaunay triangles
  publication-title: IEEE Transactions on Information Forensics and Security
  doi: 10.1109/TIFS.2007.910242
– volume: 71
  start-page: 221
  year: 1999
  ident: 10.1016/j.patcog.2013.10.001_bib26
  article-title: Structural tolerance and Delaunay triangulation
  publication-title: Information Processing Letters
  doi: 10.1016/S0020-0190(99)00107-6
– volume: 33
  start-page: 221
  year: 2010
  ident: 10.1016/j.patcog.2013.10.001_bib4
  article-title: Minutiae and modified biocode fusion for fingerprint-based key generation
  publication-title: Journal of Network and Computer Applications
  doi: 10.1016/j.jnca.2009.12.002
– volume: 38
  start-page: 237
  year: 2006
  ident: 10.1016/j.patcog.2013.10.001_bib18
  article-title: A fuzzy vault scheme
  publication-title: Designs, Codes and Cryptography
  doi: 10.1007/s10623-005-6343-z
– volume: 23
  start-page: 85
  year: 2002
  ident: 10.1016/j.patcog.2013.10.001_bib27
  article-title: Higher order delaunay triangulations
  publication-title: Computational Geometry
  doi: 10.1016/S0925-7721(01)00027-X
– volume: 33
  start-page: 207
  year: 2010
  ident: 10.1016/j.patcog.2013.10.001_bib7
  article-title: An alignment-free fingerprint cryptosystem based on fuzzy vault scheme
  publication-title: Journal of Network and Computer Applications
  doi: 10.1016/j.jnca.2009.12.003
– year: 2002
  ident: 10.1016/j.patcog.2013.10.001_bib1
– volume: 47
  start-page: 851
  year: 2011
  ident: 10.1016/j.patcog.2013.10.001_bib39
  article-title: Biohashing applied to orientation-based minutia descriptor for secure fingerprint authentication system
  publication-title: Electronics Letters
  doi: 10.1049/el.2011.1525
– volume: 34
  start-page: 116
  year: 2011
  ident: 10.1016/j.patcog.2013.10.001_bib40
  article-title: A frequency domain subspace blind channel estimation method for trailing zero OFDM systems
  publication-title: Journal of Network and Computer Applications
  doi: 10.1016/j.jnca.2010.08.009
– ident: 10.1016/j.patcog.2013.10.001_bib19
  doi: 10.1145/982507.982516
– volume: 45
  start-page: 4129
  year: 2012
  ident: 10.1016/j.patcog.2013.10.001_bib22
  article-title: Alignment-free cancellable fingerprint template design: a densely infinite-to-one mapping (DITOM) approach
  publication-title: Pattern Recognition
  doi: 10.1016/j.patcog.2012.05.004
– volume: 46
  start-page: 501
  year: 2004
  ident: 10.1016/j.patcog.2013.10.001_bib33
  article-title: Barycentric lagrange interpolation
  publication-title: Siam Review
  doi: 10.1137/S0036144502417715
– ident: 10.1016/j.patcog.2013.10.001_bib17
  doi: 10.1145/319709.319714
– ident: 10.1016/j.patcog.2013.10.001_bib37
– ident: 10.1016/j.patcog.2013.10.001_bib9
  doi: 10.1109/ICIEA.2011.5975740
– ident: 10.1016/j.patcog.2013.10.001_bib35
– ident: 10.1016/j.patcog.2013.10.001_bib15
  doi: 10.1109/IranianCEE.2012.6292454
– ident: 10.1016/j.patcog.2013.10.001_bib12
  doi: 10.1109/ICPR.2002.1047865
– volume: 30
  start-page: 311
  year: 2011
  ident: 10.1016/j.patcog.2013.10.001_bib23
  article-title: A pitfall in fingerprint bio-cryptographic key generation
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2011.02.003
– year: 2011
  ident: 10.1016/j.patcog.2013.10.001_bib16
  article-title: Fingerprint template protection with minutiae-based bit-string for security and privacy preserving
  publication-title: Expert Systems with Applications
– start-page: 523
  year: 2004
  ident: 10.1016/j.patcog.2013.10.001_bib25
  article-title: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
– start-page: 9
  year: 2005
  ident: 10.1016/j.patcog.2013.10.001_bib30
  article-title: Fingerprint matching using minutiae coordinate systems
  publication-title: Pattern Recognition and Image Analysis
– start-page: 760
  year: 2007
  ident: 10.1016/j.patcog.2013.10.001_bib8
  article-title: Fuzzy extractors for minutiae-based fingerprint authentication
  publication-title: Advances in Biometrics
  doi: 10.1007/978-3-540-74549-5_80
– ident: 10.1016/j.patcog.2013.10.001_bib5
  doi: 10.1109/ICIEA.2008.4582896
– volume: 38
  start-page: 97
  year: 2008
  ident: 10.1016/j.patcog.2013.10.001_bib24
  article-title: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data
  publication-title: SIAM Journal on Computing
  doi: 10.1137/060651380
– volume: 33
  start-page: 236
  year: 2010
  ident: 10.1016/j.patcog.2013.10.001_bib31
  article-title: Cancelable fingerprint templates using minutiae-based bit-strings
  publication-title: Journal of Network and Computer Applications
  doi: 10.1016/j.jnca.2009.12.011
– ident: 10.1016/j.patcog.2013.10.001_bib32
  doi: 10.1109/ICPR.2006.573
SSID ssj0017142
Score 2.3841915
Snippet Bio-cryptography is an emerging security technology which combines cryptography with biometrics. A good bio-cryptosystem is required to protect the privacy of...
SourceID proquest
pascalfrancis
crossref
elsevier
SourceType Aggregation Database
Index Database
Enrichment Source
Publisher
StartPage 1309
SubjectTerms Alignment
Alignment-free
Applied sciences
Bio-cryptosystem
Biometrics
Cryptography
Deviation
Distortion
Distortion robust
Exact sciences and technology
Fingerprint
Fingerprints
Fuzzy extractor
Image processing
Information, signal and communications theory
Modified Voronoi neighbor structure
Pattern recognition
Recognition
Security
Signal and communications theory
Signal processing
Telecommunications and information theory
Transformations
Title An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures
URI https://dx.doi.org/10.1016/j.patcog.2013.10.001
https://www.proquest.com/docview/1671608337
Volume 47
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEA6yXgTxLT6XCF6jmzZNtsdFlFXRkyt7EEqbx1LRtri7By_-dmeadmEREbwUWhJSvkxmJsk3M4Scgw11hkvNuBWSiUBZFoNby6Q2qetZoVODwckPj3I4EnfjaLxCrtpYGKRVNrrf6_RaWzdfLhs0L6s8xxhfTDuID5RENcYIdqFQyi--FjQPrO_tM4aHnGHrNnyu5nhVoO7KCRK8woua48V_M0_rVToF0JyvdvFDcdfW6GaLbDRuJB34P90mK7bYIZttiQbarNhd8jIoKHjak_rOn7kPa6mrD_LwPG9Gs7xk-uOzmpU-ozNFo2ZoWdD30uQO3FP6jCkOypwWeIYKAkN9xtk5bNP3yOjm-ulqyJqCCkyDVzSDbaIJApeBOeqbVGUi7uk-bD-0lFbE1ijuor5VBvO9gBdh-7GQVlmpeJBpEyoT7pNOURb2gNCMZ0Jz5NQILiKnslD2XJw6gJu7VEWHJGxxTHSTbRyLXrwlLa3sNfHoJ4g-fgX0Dwlb9Kp8to0_2qt2ipIlqUnAIPzRs7s0o4vh8GY5UBwanLVTnMCKw2uUtLDlfJpwAESC5xqqo38Pf0zW4E14MtsJ6cDM2VPwbmZZtxbfLlkd3N4PH78BsUr65w
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8QwEA6rHhTEt_g2gtfops0m26Msyvo8qexBCG0eUtG26Hrw4m93pmkXRETw0kOa0DIzmZkkX74h5BBiqLdcGsadkExEyrEE0lomjU191wmTWrycfH0jh3fiYtQbdcigvQuDsMrG9wefXnvrpuW4keZxled4xxdpB_GBlqhGU2RGwPTFMgZHnxOcBxb4DpThMWfYvb0_V4O8KvB35SMivOKjGuTFf4tP81X6BlLzodzFD89dh6OzJbLQ5JH0JPzqMum4YoUstjUaaDNlV8nDSUEh1X6sD_2Zf3WO-nonDzf0xjTLS2ZeP6pxGSidKUY1S8uCvpQ295Cf0nvkOChzWuAmKlgMDZSz77BOXyN3Z6e3gyFrKiowA2nRGNaJNop8BvGob1OViaRr-rD-MFI6kTiruO_1nbJI-AJphOsnQjrlpOJRZmysbLxOpouycBuEZjwThiOoRnDR8yqLZdcnqQdxc5-q3iaJWzlq09CNY9WLZ93iyp50kL5G6WMrSH-TsMmoKtBt_NFftSrS38xGQ0T4Y-TeN41OPodHy5Hi0OGgVbGGKYfnKGnhyvc3zUEgElLXWG39-_P7ZHZ4e32lr85vLrfJHLwRAdm2Q6ZBi24XUp1xtleb8hdkMvx1
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+alignment-free+fingerprint+bio-cryptosystem+based+on+modified+Voronoi+neighbor+structures&rft.jtitle=Pattern+recognition&rft.au=WENCHENG+YANG&rft.au=JIANKUN+HU&rft.au=SONG+WANG&rft.au=STOJMENOVIC%2C+Milos&rft.date=2014-03-01&rft.pub=Elsevier&rft.issn=0031-3203&rft.volume=47&rft.issue=3&rft.spage=1309&rft.epage=1320&rft_id=info:doi/10.1016%2Fj.patcog.2013.10.001&rft.externalDBID=n%2Fa&rft.externalDocID=28292711
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0031-3203&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0031-3203&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0031-3203&client=summon