A survey: Error control methods used in bio-cryptography

作者: Harsha S. Gardiyawasam Pussewalage , Jiankun Hu , Josef Pieprzyk

DOI: 10.1109/FSKD.2014.6980968

关键词:

摘要: Integration of biometrics is considered as an attractive solution for the issues associated with password based human authentication well secure storage and release cryptographic keys which one critical modern cryptography. However, widespread popularity bio-cryptographic solutions are somewhat restricted by fuzziness biometric measurements. Therefore, error control mechanisms must be adopted to make sure that inputs can sufficiently countered. In this paper, we have outlined such existing techniques used in bio-cryptography while explaining how they deployed different types solutions. Finally, elaborated on important facts when choosing appropriate correction a particular solution.

参考文章(37)
Wencheng Yang, Jiankun Hu, Song Wang, Jucheng Yang, Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures International Symposium on Cyberspace Safety and Security. pp. 81- 91 ,(2013) , 10.1007/978-3-319-03584-0_7
Yi Chen, Sarat C. Dass, Anil K. Jain, Fingerprint Quality Indices for Predicting Authentication Performance Lecture Notes in Computer Science. pp. 160- 170 ,(2005) , 10.1007/11527923_17
Arathi Arakala, Jason Jeffers, K. J. Horadam, Fuzzy extractors for minutiae-based fingerprint authentication international conference on biometrics. pp. 760- 769 ,(2007) , 10.1007/978-3-540-74549-5_80
Umut Uludag, Sharath Pankanti, Anil K. Jain, Fuzzy vault for fingerprints Lecture Notes in Computer Science. pp. 310- 319 ,(2005) , 10.1007/11527923_32
Pim Tuyls, Anton H. M. Akkermans, Tom A. M. Kevenaar, Geert-Jan Schrijen, Asker M. Bazen, Raimond N. J. Veldhuis, Practical biometric authentication with template protection Lecture Notes in Computer Science. pp. 436- 446 ,(2005) , 10.1007/11527923_45
Fahim Sufi, Ibrahim Khalil, Faster person identification using compressed ECG in time critical wireless telecardiology applications Journal of Network and Computer Applications. ,vol. 34, pp. 282- 293 ,(2011) , 10.1016/J.JNCA.2010.07.004
Wencheng Yang, Jiankun Hu, Milos Stojmenovic, NDTC: A novel topology-based fingerprint matching algorithm using N-layer Delaunay triangulation net check conference on industrial electronics and applications. pp. 866- 870 ,(2012) , 10.1109/ICIEA.2012.6360846
R. Álvarez Mariño, F. Hernández Álvarez, L. Hernández Encinas, A crypto-biometric scheme based on iris-templates with fuzzy extractors Information Sciences. ,vol. 195, pp. 91- 102 ,(2012) , 10.1016/J.INS.2012.01.042
Ari Juels, Martin Wattenberg, A fuzzy commitment scheme computer and communications security. pp. 28- 36 ,(1999) , 10.1145/319709.319714