Netinfo Security ›› 2015, Vol. 15 ›› Issue (1): 72-75.doi: 10.3969/j.issn.1671-1122.2015.01.013
Previous Articles Next Articles
TANG Yu1, LIU Jia-yong1(), TANG Dian-hua2
Received:
2014-11-25
Online:
2015-01-10
Published:
2015-07-05
CLC Number:
TANG Yu, LIU Jia-yong, TANG Dian-hua. A Cancelable Fingerprint Template Protection Scheme[J]. Netinfo Security, 2015, 15(1): 72-75.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2015.01.013
[1] | Jain A K, Nandakumar K, Nagar A.Biometric Template Security[J].Journal on Advances in Signal Processing,2008, 81(1): 1-20. |
[2] | Chulhan Leea.Cancelable fingerprint templates using minutiae-based bit-strings[J]. Journal of Network and Computer Applications ,2010,33(01):236-246. |
[3] | Cao K, Yang X, Chen X, et al.A novel ant colony optimization algorithm for large-distorted fingerprint matching[J]. Pattern Recognition ,2012,45(1):151-161. |
[4] | Jin Z, Jin Teoh A B,Ong T S et al. Fingerprint template protection with minutiae-based bit-string for security and privacy preserving[J]. Expert Systems with Applications ,2012,39(1):6157-6167. |
[5] | Juels A, Sudan M.A fuzzy vault scheme. Proceedings of the 2002 International Symposium on Information Theory[C]//IEEE Press,2002: 408-426. |
[6] | Nalini K R, Sharat C, Jonathan H C, et al.Generating cancelable fingerprint templates. Proceedings of IEEE Transactions[J].Pattern Analysis and Machine Intelligence,2007, 29(4):561-572. |
[7] | LIU E, ZHAO H, LIANG J, et al.A key binding system based on n-nearest minutiae structure of fingerprint[J]. Pattern Recognition Letters,2011,32(01) :666-675. |
[8] | LI P, YANG X, CAO K, et al.An alignment-free fingerprint cryptosystem based on fuzzy vault scheme[J]. Journal of Network and Computer Applications ,2010,33(1) :207-220. |
[9] | Yang W C, Hu J K.An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures[J].Pattern recognition.2014,47(3):1309-1320. |
[10] | Soleymani R, Amirani M.C. A hybrid fingerprint matching algorithm using Delaunay triangulation and Voronoi diagram[J]. Proceedings of the 20th Iranian Conference on Electrical Engineering (ICEE), 2012:752-757. |
[11] | FENG Q, SU F, CAI A, Fingerprint-based key binding/recovering scheme based on fuzzy vault[J]. Journal of Electronics (China), 2008, 25(3): 415-421. |
[12] | WANG S, HU J.Alignment-free concelable fingerprint template design: Adensely infinite-to-one mapping (DITOM) approach[J]. Pattern Recognition, 2012,45(12):4129-413. |
[13] | FANG E B, HAN C Y, LIU J Y.Auto-Aligned Sharing Fuzzy Fingerprint Vault[J]. China Communications, 2013, 10(10): 145-154. |
[14] | Xi K, Hu J, Han F.An alignment free fingerprint fuzzy extractor using near-equivalent dual layer structure check (NeDLSC) algorithm[C] //in:Proceedings of the th IEEE Conference on Industrial Electronics and Applications (ICIEA), 2011.1040-1045. |
[15] | SOLEYMANI R, AMIRANI M C.A hybrid fingerprint matching algorithm using Delaunay triangulation and Voronoi diagram [C]//in:Proceedings of the 20th Iranian Conference on Electrical Engineering (ICEE'12), 2012. 752-757. |
[1] | HUANG Wangwang, ZHOU Hua, WANG Daiqiang, ZHAO Qi. Design of Reconfigurable Key Security Authentication Protocol for IoT Based on National Cryptography SM9 [J]. Netinfo Security, 2024, 24(7): 1006-1014. |
[2] | ZHANG Xiaojun, ZHANG Nan, HAO Yunpu, WANG Zhouyang, XUE Jingting. Three-Factor Authentication and Key Agreement Protocol Based on Chaotic Map for Industrial Internet of Things Systems [J]. Netinfo Security, 2024, 24(7): 1015-1026. |
[3] | ZHANG Jiwei, WANG Wenjun, NIU Shaozhang, GUO Xiangkuo. Blockchain Scaling Solutions: ZK-Rollup Review [J]. Netinfo Security, 2024, 24(7): 1027-1037. |
[4] | ZHANG Liqiang, LU Mengjun, YAN Fei. A Cross-Contract Fuzzing Scheme Based on Function Dependencies [J]. Netinfo Security, 2024, 24(7): 1038-1049. |
[5] | DONG Yunyun, ZHU Yuling, YAO Shaowen. High-Quality Full-Size Image Steganography Method Based on Improved U-Net and Hybrid Attention Mechanism [J]. Netinfo Security, 2024, 24(7): 1050-1061. |
[6] | ZHOU Shucheng, LI Yang, LI Chuanrong, GUO Lulu, JIA Xinhong, YANG Xinghua. Context-Based Abnormal Root Cause Algorithm [J]. Netinfo Security, 2024, 24(7): 1062-1075. |
[7] | REN Changyu, ZHANG Ling, JI Hangyuan, YANG Liqun. Research on TTP Extraction Method Based on Pre-Trained Language Model and Chinese-English Threat Intelligence [J]. Netinfo Security, 2024, 24(7): 1076-1087. |
[8] | CAI Manchun, XI Rongkang, ZHU Yi, ZHAO Zhongbin. A Fingerprint Identification Method of Multi-Page and Multi-Tag Targeting Tor Website [J]. Netinfo Security, 2024, 24(7): 1088-1097. |
[9] | XIANG Hui, XUE Yunhao, HAO Lingxin. Large Language Model-Generated Text Detection Based on Linguistic Feature Ensemble Learning [J]. Netinfo Security, 2024, 24(7): 1098-1109. |
[10] | SHEN Xiuyu, JI Weifeng. Optimization of Cost of Edge-Cloud Collaborative Computing Offloading Considering Security [J]. Netinfo Security, 2024, 24(7): 1110-1121. |
[11] | ZHAO Xinqiang, FAN Bo, ZHANG Dongju. Research on APT Attack Defense System Based on Threat Discovery [J]. Netinfo Security, 2024, 24(7): 1122-1128. |
[12] | WEN Wen, LIU Qinju, KUANG Lin, REN Xuejing. Research and Scheme Design of Cyber Threat Intelligence Sharing under Privacy Protection System [J]. Netinfo Security, 2024, 24(7): 1129-1137. |
[13] | LIU Yidan, MA Yongliu, DU Yibin, CHENG Qingfeng. A Certificateless Anonymous Authentication Key Agreement Protocol for VANET [J]. Netinfo Security, 2024, 24(7): 983-992. |
[14] | LUO Ming, ZHAN Qibang, QIU Minrong. A Heterogeneous Cross-Domain Conditional Privacy Protection Ring Signcryption Scheme for V2I Communication [J]. Netinfo Security, 2024, 24(7): 993-1005. |
[15] | LI Zengpeng, WANG Siyang, WANG Mei. Research of Privacy-Preserving Proximity Test [J]. Netinfo Security, 2024, 24(6): 817-830. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||