A pitfall in fingerprint bio-cryptographic key generation

作者: Peng Zhang , Jiankun Hu , Cai Li , Mohammed Bennamoun , Vijayakumar Bhagavatula

DOI: 10.1016/J.COSE.2011.02.003

关键词: Feature extractionFingerprint (computing)Computer visionFingerprintKey (cryptography)Transformation (music)BiometricsMinutiaeComputer scienceQuantization (image processing)Pattern recognitionArtificial intelligence

摘要: … fingerprint image rotation processing and potential effect on the major features, mainly minutiae and singular point, of the rotation transformed fingerprint. … of the original fingerprint image …

参考文章(11)
Xuan Dau Hoang, Jiankun Hu, Peter Bertok, A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference Journal of Network and Computer Applications. ,vol. 32, pp. 1219- 1228 ,(2009) , 10.1016/J.JNCA.2009.05.004
Jiankun Hu, Hsiao-Hwa Chen, Ting-Wei Hou, A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations Computer Standards & Interfaces. ,vol. 32, pp. 274- 280 ,(2010) , 10.1016/J.CSI.2009.04.005
Yi Wang, Jiankun Hu, Damien Phillips, A Fingerprint Orientation Model Based on 2D Fourier Expansion (FOMFE) and Its Application to Singular-Point Detection and Fingerprint Indexing IEEE Transactions on Pattern Analysis and Machine Intelligence. ,vol. 29, pp. 573- 585 ,(2007) , 10.1109/TPAMI.2007.1003
Peng Zhang, Cai Li, Jiankun Hu, A pitfall in fingerprint features extraction international conference on control, automation, robotics and vision. pp. 13- 18 ,(2010) , 10.1109/ICARCV.2010.5707953
J. Hu, Mobile fingerprint template protection: Progress and open issues conference on industrial electronics and applications. pp. 2133- 2138 ,(2008) , 10.1109/ICIEA.2008.4582896
Jiankun Hu, Fengling Han, A pixel-based scrambling scheme for digital medical images protection Journal of Network and Computer Applications. ,vol. 32, pp. 788- 794 ,(2009) , 10.1016/J.JNCA.2009.02.009
Jiankun Hu, Xinghuo Yu, D. Qiu, Hsiao-Hwa Chen, A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection IEEE Network. ,vol. 23, pp. 42- 47 ,(2009) , 10.1109/MNET.2009.4804323
R. Keys, Cubic convolution interpolation for digital image processing IEEE Transactions on Acoustics, Speech, and Signal Processing. ,vol. 29, pp. 1153- 1160 ,(1981) , 10.1109/TASSP.1981.1163711
Sunil Arya, Ruth Silverman, Nathan S. Netanyahu, David M. Mount, Angela Wu, An optimal algorithm for approximate nearest neighbor searching symposium on discrete algorithms. pp. 573- 582 ,(1994) , 10.5555/314464.314652
Sunil Arya, David M. Mount, Nathan S. Netanyahu, Ruth Silverman, Angela Y. Wu, An optimal algorithm for approximate nearest neighbor searching fixed dimensions Journal of the ACM. ,vol. 45, pp. 891- 923 ,(1998) , 10.1145/293347.293348