Academic literature on the topic 'Minutiae-based templates'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Minutiae-based templates.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Minutiae-based templates"

1

Mon, Ei Ei, Sangsuree Vasupongayya, Montri Karnjanadecha, and Touchai Angchuan. "Evaluating biometrics fingerprint template protection for an emergency situation." Tehnički glasnik 13, no. 4 (December 11, 2019): 280–85. http://dx.doi.org/10.31803/tg-20191104190328.

Full text
Abstract:
Biometric template protection approaches have been developed to secure the biometric templates against image reconstruction on the stored templates. Two cancellable fingerprint template protection approaches namely minutiae-based bit-string cancellable fingerprint template and modified minutiae-based bit-string cancellable fingerprint template, are selected to be evaluated. Both approaches include the geometric information of the fingerprint into the extracted minutiae. Six modified fingerprint data sets are derived from the original fingerprint images in FVC2002DB1_B and FVC2002DB2_B by conducting the rotation and changing the quality of original fingerprint images according to the environment conditions during an emergency situation such as wet or dry fingers and disoriented angle of fingerprint images. The experimental results show that the modified minutiae-based bit-string cancellable fingerprint template performs well on all conditions during an emergency situation by achieving the matching accuracy between 83% and 100% on FVC2002DB1_B data set and between 99% and 100% on FVC2002DB2_B data set.
APA, Harvard, Vancouver, ISO, and other styles
2

Lee, Chulhan, and Jaihie Kim. "Cancelable fingerprint templates using minutiae-based bit-strings." Journal of Network and Computer Applications 33, no. 3 (May 2010): 236–46. http://dx.doi.org/10.1016/j.jnca.2009.12.011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

PRASAD, MUNAGA V. N. K., P. SWATHI, C. R. RAO, and B. L. DEEKSHATULU. "MINIMUM SPANNING TREE (MST) BASED TECHNIQUES FOR GENERATION OF CANCELABLE FINGERPRINT TEMPLATES." International Journal of Pattern Recognition and Artificial Intelligence 28, no. 06 (September 2014): 1456013. http://dx.doi.org/10.1142/s0218001414560138.

Full text
Abstract:
The biometric community is faced with the difficult problem of protection of the original biometric template. One way of doing this is using a cancelable biometric method, which transforms original biometric template in a noninvertible way and uses the transformed template to verify a person's identity. In this paper, we propose two novel representation methods for fingerprint minutiae. Proposed methods based on this representation are simple to generate cancelable templates without requiring pre-alignment of the fingerprints. The main idea is to generate a minimal spanning tree (MST) for fingerprint minutiae in a three-dimensional (3D) feature space. The chain code representation for a generated MST in a two-dimensional (2D) feature space is proposed. A bit string is then generated by mapping the chain code into 2D array. The fingerprint minutiae based upon the Cartesian system is dealt with in Method-1, while the boundary representation of the minutiae is dealt with in Method-2. The proposed methods are evaluated using FVC2004 and FVC2002 databases and the performance is better compared to existing methods [C. Lee and J. Kim, J. Netw. Comput. Appl.33(3) (2010) 236–246; S. Wang and J. Hu, Pattern Recogn.45 (2012) 4129–4137; S. Wang and J. Hu, Pattern Recogn.47(3) (2014) 1321–1329; Z. Jin, A. B. J. Teoh, T. S. Ong and C. Tee, Expert Syst. Appl.39 (2012) 6157–6167; P. Das, K. Karthik and B. C. Garai, Pattern Recogn.45(9) (2012) 3373–3388; A. B. J. Teoh, D. C. L. Ngo and A. Goh, Pattern Recogn.37(11) (2004) 2245–2255.]
APA, Harvard, Vancouver, ISO, and other styles
4

Moon, Daesung, Jang-Hee Yoo, and Mun-Kyu Lee. "Improved cancelable fingerprint templates using minutiae-based functional transform." Security and Communication Networks 7, no. 10 (May 17, 2013): 1543–51. http://dx.doi.org/10.1002/sec.788.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chulhan Lee, Jeung-Yoon Choi, Kar-Ann Toh, and Sangyoun Lee. "Alignment-Free Cancelable Fingerprint Templates Based on Local Minutiae Information." IEEE Transactions on Systems, Man and Cybernetics, Part B (Cybernetics) 37, no. 4 (August 2007): 980–92. http://dx.doi.org/10.1109/tsmcb.2007.896999.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Shukla, Shivangi, and Sankita J. Patel. "Securing fingerprint templates by enhanced minutiae‐based encoding scheme in Fuzzy Commitment." IET Information Security 15, no. 3 (April 2021): 256–66. http://dx.doi.org/10.1049/ise2.12024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sharma, Uttam, Pradeep Tomar, Syed Sadaf Ali, Neetesh Saxena, and Robin Singh Bhadoria. "Optimized Authentication System with High Security and Privacy." Electronics 10, no. 4 (February 13, 2021): 458. http://dx.doi.org/10.3390/electronics10040458.

Full text
Abstract:
Authentication and privacy play an important role in the present electronic world. Biometrics and especially fingerprint-based authentication are extremely useful for unlocking doors, mobile phones, etc. Fingerprint biometrics usually store the attributes of the minutia point of a fingerprint directly in the database as a user template. Existing research works have shown that from such insecure user templates, original fingerprints can be constructed. If the database gets compromised, the attacker may construct the fingerprint of a user, which is a serious security and privacy issue. Security of original fingerprints is therefore extremely important. Ali et al. have designed a system for secure fingerprint biometrics; however, their technique has various limitations and is not optimized. In this paper, first we have proposed a secure technique which is highly robust, optimized, and fast. Secondly, unlike most of the fingerprint biometrics apart from the minutiae point location and orientation, we have used the quality of minutiae points as well to construct an optimized template. Third, the template constructed is in 3D shell shape. We have rigorously evaluated the technique on nine different fingerprint databases. The obtained results from the experiments are highly promising and show the effectiveness of the technique.
APA, Harvard, Vancouver, ISO, and other styles
8

Arakala, Arathi, K. J. Horadam, Jason Jeffers, and Serdar Boztaş. "Protection of minutiae-based templates using biocryptographic constructs in the set difference metric." Security and Communication Networks 4, no. 5 (June 9, 2010): 563–76. http://dx.doi.org/10.1002/sec.205.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Bin Bin, Jian De Zheng, and Zhi Qiang Zheng. "Fingerprint Identification Scheme Based on Distribution Density." Applied Mechanics and Materials 539 (July 2014): 117–21. http://dx.doi.org/10.4028/www.scientific.net/amm.539.117.

Full text
Abstract:
Traditional fingerprint identification is adopting minutiae point as a template, but this exist template leaked danger. Based on the distribution density of minutiae point, this paper deeply researches on how to use the distribution density of minutiae point as the template of fingerprints, avoiding directly storing minutiae point data, and ensuring the safety of fingerprint template. At the same time, we proposed a fingerprint matching algorithm based on this template. The experimental results show that the matching algorithm is an effective identification scheme.
APA, Harvard, Vancouver, ISO, and other styles
10

ZHU, EN, JIAN-PING YIN, GUO-MIN ZHANG, and CHUN-FENG HU. "FINGERPRINT MINUTIAE RELATIONSHIP REPRESENTATION AND MATCHING BASED ON CURVE COORDINATE SYSTEM." International Journal of Image and Graphics 05, no. 04 (October 2005): 729–44. http://dx.doi.org/10.1142/s0219467805001987.

Full text
Abstract:
A minutiae relationship representation and matching method based on curve coordinate system is proposed. For each minutia, a curve coordinate system is established, and the coordinates of other minutiae in this coordinate system is computed. Thus, the coordinate relationship between each pair of minutiae can be evaluated. These relationships are used for pairing minutiae between the template fingerprint and the query fingerprint by means of transferring reference minutiae. The algorithm is tested on FVC2004DBs which include many highly distorted fingerprints. Results have shown that the proposed algorithm achieves improved matching accuracy and is able to cope with highly distorted fingerprints.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Minutiae-based templates"

1

Arakala, Arathi, and arathi arakala@ems rmit edu au. "Secure and Private Fingerprint-based Authentication." RMIT University. Mathematical and Geospatial Sciences, 2008. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20081128.102017.

Full text
Abstract:
This thesis studies the requirements and processes involved in building an authentication system using the fingerprint biometric, where the fingerprint template is protected during storage and during comparison. The principles developed in this thesis can be easily extended to authentication systems using other biometric modalities. Most existing biometric authentication systems store their template securely using an encryption function. However, in order to perform matching, the enrolled template must be decrypted. It is at this point that the authentication system is most vulnerable as the entire enrolled template is exposed. A biometric is irreplaceable if compromised and can also reveal sensitive information about an individual. If biometric systems are taken up widely, the template could also be used as an individual's digital identifier. Compromise in that case, violates an individual's right to privacy as their transactions in all systems where they used that compromised biometric can be tracked. Therefore securing a biometric template during comparison as well as storage in an authentication system is imperative. Eight different fingerprint template representation techniques, where templates were treated as a set of elements derived from the locations and orientations of fingerprint minutiae, were studied. Four main steps to build any biometric based authentication system were identified and each of the eight fingerprint template representations was inducted through the four steps. Two distinct Error Tolerant Cryptographic Constructs based on the set difference metric, were studied for their ability to securely store and compare each of the template types in an authentication system. The first construct was found to be unsuitable for a fundamental reason that would apply to all the template types considered in the research. The second construct did not have the limitation of the first and three algorithms to build authentication systems using the second construct were proposed. It was determined that minutiae-based templates had significant intra sample variation as a result of which a very relaxed matching threshold had to be set in the authentication system. The relaxed threshold caused the authentication systems built using the first two algorithms to reveal enough information about the stored templates to render them insecure. It was found that in cases of such large intra-sample variation, a commonality based match decision was more appropriate. One solution to building a secure authentication system using minutiae-based templates was demonstrated by the third algorithm which used a two stage matching process involving the second cryptographic construct and a commonality based similarity measure in the two stages respectively. This implementation was successful in securing the fingerprint template during comparison as well as storage, with minimal reduction in accuracy when compared to the matching performance without the cryptographic construct. Another solution is to use an efficient commonality based error tolerant cryptographic construct. This thesis lists the desirable characteristics of such a construct as existence of any is unknown to date. This thesis concludes by presenting good guidelines to evaluate the suitability of different cryptographic constructs to protect biometric templates of other modalities in an authentication system.
APA, Harvard, Vancouver, ISO, and other styles
2

Noor, Azad. "A new algorithm for minutiae extraction and matching in fingerprint." Thesis, Brunel University, 2012. http://bura.brunel.ac.uk/handle/2438/7473.

Full text
Abstract:
A novel algorithm for fingerprint template formation and matching in automatic fingerprint recognition has been developed. At present, fingerprint is being considered as the dominant biometric trait among all other biometrics due to its wide range of applications in security and access control. Most of the commercially established systems use singularity point (SP) or ‘core’ point for fingerprint indexing and template formation. The efficiency of these systems heavily relies on the detection of the core and the quality of the image itself. The number of multiple SPs or absence of ‘core’ on the image can cause some anomalies in the formation of the template and may result in high False Acceptance Rate (FAR) or False Rejection Rate (FRR). Also the loss of actual minutiae or appearance of new or spurious minutiae in the scanned image can contribute to the error in the matching process. A more sophisticated algorithm is therefore necessary in the formation and matching of templates in order to achieve low FAR and FRR and to make the identification more accurate. The novel algorithm presented here does not rely on any ‘core’ or SP thus makes the structure invariant with respect to global rotation and translation. Moreover, it does not need orientation of the minutiae points on which most of the established algorithm are based. The matching methodology is based on the local features of each minutiae point such as distances to its nearest neighbours and their internal angle. Using a publicly available fingerprint database, the algorithm has been evaluated and compared with other benchmark algorithms. It has been found that the algorithm has performed better compared to others and has been able to achieve an error equal rate of 3.5%.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Minutiae-based templates"

1

Jin, Zhe, Andrew Beng Jin Teoh, Thian Song Ong, and Connie Tee. "Secure Minutiae-Based Fingerprint Templates Using Random Triangle Hashing." In Lecture Notes in Computer Science, 521–31. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-05036-7_49.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Feng, Jianjiang, and Anil K. Jain. "FM Model Based Fingerprint Reconstruction from Minutiae Template." In Advances in Biometrics, 544–53. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01793-3_56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nazmul, Rumana, Md Rafiqul Islam, and Ahsan Raja Chowdhury. "Alignment-Free Fingerprint Template Protection Technique Based on Minutiae Neighbourhood Information." In Advances in Intelligent Systems and Computing, 256–65. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67071-3_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Minutiae-based templates"

1

Arakala, Arathi, K. J. Horadam, and Serdar Boztas. "Practical considerations for secure minutiae based templates." In 2008 Biometrics Symposium (BSYM). IEEE, 2008. http://dx.doi.org/10.1109/bsym.2008.4655528.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sutcu, Yagiz, Husrev T. Sencar, and Nasir Memon. "A geometric transformation to protect minutiae-based fingerprint templates." In Defense and Security Symposium, edited by Salil Prabhakar and Arun A. Ross. SPIE, 2007. http://dx.doi.org/10.1117/12.721058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dan Do, Anh, and Quang Hieu Dang. "An optimal minutiae-based combining method for multiple fingerprint templates." In 2018 IEEE 12th International Symposium on Embedded Multicore/Many-core Systems-on-Chip (MCSoC). IEEE, 2016. http://dx.doi.org/10.1109/atc.2016.7764838.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yang, Bian, and Christoph Busch. "Parameterized geometric alignment for minutiae-based fingerprint template protection." In 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems. BTAS 2009. IEEE, 2009. http://dx.doi.org/10.1109/btas.2009.5339058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kumar, Morampudi Mahesh, Munaga V. N. K. Prasad, and U. S. N. Raju. "Cancellable Fingerprint Template Generation Using Rectangle-Based Adjoining Minutiae Pairs." In the 2018 2nd International Conference. New York, New York, USA: ACM Press, 2018. http://dx.doi.org/10.1145/3230820.3230826.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Uz, Tamer, George Bebis, Ali Erol, and Salil Prabhakar. "Minutiae-Based Template Synthesis and Matching Using Hierarchical Delaunay Triangulations." In 2007 First IEEE International Conference on Biometrics: Theory, Applications, and Systems. IEEE, 2007. http://dx.doi.org/10.1109/btas.2007.4401958.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rozsa, Andras, Albert E. Glock, and Terrance E. Boult. "Genetic algorithm attack on minutiae-based fingerprint authentication and protected template fingerprint systems." In 2015 IEEE Conference on Computer Vision and Pattern Recognition Workshops (CVPRW). IEEE, 2015. http://dx.doi.org/10.1109/cvprw.2015.7301325.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shao, Xiaoying, Haiyun Xu, Raymond N. J. Veldhuis, and Cornelis H. Slump. "A 3-layer coding scheme for biometry template protection based on spectral minutiae." In ICASSP 2011 - 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2011. http://dx.doi.org/10.1109/icassp.2011.5946890.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography