Journal articles on the topic 'Minutiae-based templates'

To see the other types of publications on this topic, follow the link: Minutiae-based templates.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 29 journal articles for your research on the topic 'Minutiae-based templates.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Mon, Ei Ei, Sangsuree Vasupongayya, Montri Karnjanadecha, and Touchai Angchuan. "Evaluating biometrics fingerprint template protection for an emergency situation." Tehnički glasnik 13, no. 4 (December 11, 2019): 280–85. http://dx.doi.org/10.31803/tg-20191104190328.

Full text
Abstract:
Biometric template protection approaches have been developed to secure the biometric templates against image reconstruction on the stored templates. Two cancellable fingerprint template protection approaches namely minutiae-based bit-string cancellable fingerprint template and modified minutiae-based bit-string cancellable fingerprint template, are selected to be evaluated. Both approaches include the geometric information of the fingerprint into the extracted minutiae. Six modified fingerprint data sets are derived from the original fingerprint images in FVC2002DB1_B and FVC2002DB2_B by conducting the rotation and changing the quality of original fingerprint images according to the environment conditions during an emergency situation such as wet or dry fingers and disoriented angle of fingerprint images. The experimental results show that the modified minutiae-based bit-string cancellable fingerprint template performs well on all conditions during an emergency situation by achieving the matching accuracy between 83% and 100% on FVC2002DB1_B data set and between 99% and 100% on FVC2002DB2_B data set.
APA, Harvard, Vancouver, ISO, and other styles
2

Lee, Chulhan, and Jaihie Kim. "Cancelable fingerprint templates using minutiae-based bit-strings." Journal of Network and Computer Applications 33, no. 3 (May 2010): 236–46. http://dx.doi.org/10.1016/j.jnca.2009.12.011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

PRASAD, MUNAGA V. N. K., P. SWATHI, C. R. RAO, and B. L. DEEKSHATULU. "MINIMUM SPANNING TREE (MST) BASED TECHNIQUES FOR GENERATION OF CANCELABLE FINGERPRINT TEMPLATES." International Journal of Pattern Recognition and Artificial Intelligence 28, no. 06 (September 2014): 1456013. http://dx.doi.org/10.1142/s0218001414560138.

Full text
Abstract:
The biometric community is faced with the difficult problem of protection of the original biometric template. One way of doing this is using a cancelable biometric method, which transforms original biometric template in a noninvertible way and uses the transformed template to verify a person's identity. In this paper, we propose two novel representation methods for fingerprint minutiae. Proposed methods based on this representation are simple to generate cancelable templates without requiring pre-alignment of the fingerprints. The main idea is to generate a minimal spanning tree (MST) for fingerprint minutiae in a three-dimensional (3D) feature space. The chain code representation for a generated MST in a two-dimensional (2D) feature space is proposed. A bit string is then generated by mapping the chain code into 2D array. The fingerprint minutiae based upon the Cartesian system is dealt with in Method-1, while the boundary representation of the minutiae is dealt with in Method-2. The proposed methods are evaluated using FVC2004 and FVC2002 databases and the performance is better compared to existing methods [C. Lee and J. Kim, J. Netw. Comput. Appl.33(3) (2010) 236–246; S. Wang and J. Hu, Pattern Recogn.45 (2012) 4129–4137; S. Wang and J. Hu, Pattern Recogn.47(3) (2014) 1321–1329; Z. Jin, A. B. J. Teoh, T. S. Ong and C. Tee, Expert Syst. Appl.39 (2012) 6157–6167; P. Das, K. Karthik and B. C. Garai, Pattern Recogn.45(9) (2012) 3373–3388; A. B. J. Teoh, D. C. L. Ngo and A. Goh, Pattern Recogn.37(11) (2004) 2245–2255.]
APA, Harvard, Vancouver, ISO, and other styles
4

Moon, Daesung, Jang-Hee Yoo, and Mun-Kyu Lee. "Improved cancelable fingerprint templates using minutiae-based functional transform." Security and Communication Networks 7, no. 10 (May 17, 2013): 1543–51. http://dx.doi.org/10.1002/sec.788.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chulhan Lee, Jeung-Yoon Choi, Kar-Ann Toh, and Sangyoun Lee. "Alignment-Free Cancelable Fingerprint Templates Based on Local Minutiae Information." IEEE Transactions on Systems, Man and Cybernetics, Part B (Cybernetics) 37, no. 4 (August 2007): 980–92. http://dx.doi.org/10.1109/tsmcb.2007.896999.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Shukla, Shivangi, and Sankita J. Patel. "Securing fingerprint templates by enhanced minutiae‐based encoding scheme in Fuzzy Commitment." IET Information Security 15, no. 3 (April 2021): 256–66. http://dx.doi.org/10.1049/ise2.12024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sharma, Uttam, Pradeep Tomar, Syed Sadaf Ali, Neetesh Saxena, and Robin Singh Bhadoria. "Optimized Authentication System with High Security and Privacy." Electronics 10, no. 4 (February 13, 2021): 458. http://dx.doi.org/10.3390/electronics10040458.

Full text
Abstract:
Authentication and privacy play an important role in the present electronic world. Biometrics and especially fingerprint-based authentication are extremely useful for unlocking doors, mobile phones, etc. Fingerprint biometrics usually store the attributes of the minutia point of a fingerprint directly in the database as a user template. Existing research works have shown that from such insecure user templates, original fingerprints can be constructed. If the database gets compromised, the attacker may construct the fingerprint of a user, which is a serious security and privacy issue. Security of original fingerprints is therefore extremely important. Ali et al. have designed a system for secure fingerprint biometrics; however, their technique has various limitations and is not optimized. In this paper, first we have proposed a secure technique which is highly robust, optimized, and fast. Secondly, unlike most of the fingerprint biometrics apart from the minutiae point location and orientation, we have used the quality of minutiae points as well to construct an optimized template. Third, the template constructed is in 3D shell shape. We have rigorously evaluated the technique on nine different fingerprint databases. The obtained results from the experiments are highly promising and show the effectiveness of the technique.
APA, Harvard, Vancouver, ISO, and other styles
8

Arakala, Arathi, K. J. Horadam, Jason Jeffers, and Serdar Boztaş. "Protection of minutiae-based templates using biocryptographic constructs in the set difference metric." Security and Communication Networks 4, no. 5 (June 9, 2010): 563–76. http://dx.doi.org/10.1002/sec.205.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Bin Bin, Jian De Zheng, and Zhi Qiang Zheng. "Fingerprint Identification Scheme Based on Distribution Density." Applied Mechanics and Materials 539 (July 2014): 117–21. http://dx.doi.org/10.4028/www.scientific.net/amm.539.117.

Full text
Abstract:
Traditional fingerprint identification is adopting minutiae point as a template, but this exist template leaked danger. Based on the distribution density of minutiae point, this paper deeply researches on how to use the distribution density of minutiae point as the template of fingerprints, avoiding directly storing minutiae point data, and ensuring the safety of fingerprint template. At the same time, we proposed a fingerprint matching algorithm based on this template. The experimental results show that the matching algorithm is an effective identification scheme.
APA, Harvard, Vancouver, ISO, and other styles
10

ZHU, EN, JIAN-PING YIN, GUO-MIN ZHANG, and CHUN-FENG HU. "FINGERPRINT MINUTIAE RELATIONSHIP REPRESENTATION AND MATCHING BASED ON CURVE COORDINATE SYSTEM." International Journal of Image and Graphics 05, no. 04 (October 2005): 729–44. http://dx.doi.org/10.1142/s0219467805001987.

Full text
Abstract:
A minutiae relationship representation and matching method based on curve coordinate system is proposed. For each minutia, a curve coordinate system is established, and the coordinates of other minutiae in this coordinate system is computed. Thus, the coordinate relationship between each pair of minutiae can be evaluated. These relationships are used for pairing minutiae between the template fingerprint and the query fingerprint by means of transferring reference minutiae. The algorithm is tested on FVC2004DBs which include many highly distorted fingerprints. Results have shown that the proposed algorithm achieves improved matching accuracy and is able to cope with highly distorted fingerprints.
APA, Harvard, Vancouver, ISO, and other styles
11

Uz, Tamer, George Bebis, Ali Erol, and Salil Prabhakar. "Minutiae-based template synthesis and matching for fingerprint authentication." Computer Vision and Image Understanding 113, no. 9 (September 2009): 979–92. http://dx.doi.org/10.1016/j.cviu.2009.04.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Ramírez Flores, Manuel, Gualberto Aguilar Torres, Gina Gallegos García, and Miguel Ángel García Licona. "Fingerprint verification using computational geometry." DYNA 83, no. 195 (February 23, 2016): 128–37. http://dx.doi.org/10.15446/dyna.v83n195.46323.

Full text
Abstract:
This paper presents a robust minutiae based method for fingerprint verification. The proposed method uses Delaunay Triangulation to represent minutiae as nodes of a connected graph composed of triangles. The minimum angle over all triangulations is maximized, which gives local stability to the constructed structures against rotation and translation variations. Geometric thresholds and minutiae data were used to characterize the triangulations created from input and template fingerprint images. The effectiveness of the proposed method is confirmed through calculations of false acceptance rate (FAR), false rejected rate (FRR) and equal error rate (EER) over FVC2002 databases compared to the results of other approaches.
APA, Harvard, Vancouver, ISO, and other styles
13

Wong, Wei Jing, Andrew B. J. Teoh, M. L. Dennis Wong, and Yau Hee Kho. "Enhanced multi-line code for minutiae-based fingerprint template protection." Pattern Recognition Letters 34, no. 11 (August 2013): 1221–29. http://dx.doi.org/10.1016/j.patrec.2013.03.039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Vibert, Benoit, Jean-Marie Le Bars, Christophe Charrier, and Christophe Rosenberger. "Logical Attacks and Countermeasures for Fingerprint On-Card-Comparison Systems." Sensors 20, no. 18 (September 21, 2020): 5410. http://dx.doi.org/10.3390/s20185410.

Full text
Abstract:
Digital fingerprints are being used more and more to secure applications for logical and physical access control. In order to guarantee security and privacy trends, a biometric system is often implemented on a secure element to store the biometric reference template and for the matching with a probe template (on-card-comparison). In order to assess the performance and robustness against attacks of these systems, it is necessary to better understand which information could help an attacker successfully impersonate a legitimate user. The first part of the paper details a new attack based on the use of a priori information (such as the fingerprint classification, sensor type, image resolution or number of minutiae in the biometric reference) that could be exploited by an attacker. In the second part, a new countermeasure against brute force and zero effort attacks based on fingerprint classification given a minutiae template is proposed. These two contributions show how fingerprint classification could have an impact for attacks and countermeasures in embedded biometric systems. Experiments show interesting results on significant fingerprint datasets.
APA, Harvard, Vancouver, ISO, and other styles
15

Olatubosun, Olabode, and Fasoranbaku O.A. "Fingerprint Image Enhancement Algorithms for Identification in an Electoral Process." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 2 (December 13, 2014): 5453–63. http://dx.doi.org/10.24297/ijct.v14i2.2090.

Full text
Abstract:
Electoral process in many developing nations is characterized with fraud and failure as a result of inefficient and effective system of voter’s register and voting system. This usually leads to crises. This paper presents enhancement algorithms of Denoising fingerprint images using Moving Average Filter, the Segmentation of Fingerprint using Chen algorithm, Gradient-Based Local Ridge Orientation, Binarization using Otsu Algorithm, Thinning of Fingerprint Image using the linear interactive approach and Minutiae Extraction using the minutiae location and minutiae angles for the purpose of verification and Identification in electoral process. The input to the system is a Gray-scale Fingerprint image of electorate and it detailed information while the Output is a Verified and enrolled fingerprint image with matching score and details of electorates’ information store as Template using the Matlab 2013a.
APA, Harvard, Vancouver, ISO, and other styles
16

Yang, Yijun, Jianping Yu, Peng Zhang, and Shulan Wang. "A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication." Computational and Mathematical Methods in Medicine 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/673867.

Full text
Abstract:
A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users’ fingerprints, the personal authentication can be determined only by the fingerprint features. This paper proposes an irreversible transforming function (using the improved SHA1 algorithm) to transform the original minutiae which are extracted from the thinned fingerprint image. Then, Chinese remainder theorem is used to obtain the biokey from the integration of the transformed minutiae and the private key. The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes.
APA, Harvard, Vancouver, ISO, and other styles
17

Wong, Wei Jing, Andrew B. J. Teoh, Yau Hee Kho, and M. L. Dennis Wong. "Kernel PCA enabled bit-string representation for minutiae-based cancellable fingerprint template." Pattern Recognition 51 (March 2016): 197–208. http://dx.doi.org/10.1016/j.patcog.2015.09.032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Jin, Zhe, Bok-Min Goi, Andrew Teoh, and Yong Haur Tay. "A two-dimensional random projected minutiae vicinity decomposition-based cancellable fingerprint template." Security and Communication Networks 7, no. 11 (August 19, 2013): 1691–701. http://dx.doi.org/10.1002/sec.865.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Sandhya, Mulagala, and Munaga V. N. K. Prasad. "Cancelable Fingerprint Cryptosystem Using Multiple Spiral Curves and Fuzzy Commitment Scheme." International Journal of Pattern Recognition and Artificial Intelligence 31, no. 04 (February 2, 2017): 1756004. http://dx.doi.org/10.1142/s0218001417560043.

Full text
Abstract:
The increased use of biometric-based authentication systems in a variety of applications has made biometric template protection an important issue. Unlike conventional systems, biometric cannot be revoked or changed. This made template protection a critical issue to be considered in the recent years. This paper proposes a cancelable fingerprint cryptosystem using multiple spiral curves and fuzzy commitment scheme. The method is built by combining cancelable biometrics and biometric cryptosystems. First, we compute transformed minutiae features using multiple spiral curves. Further, these transformed features are encrypted using fuzzy commitment scheme. Hence, a secure template is obtained. Experimental results and analysis prove the credibility of proposed method with recently presented methods of fingerprint template protection.
APA, Harvard, Vancouver, ISO, and other styles
20

HUI, Yan, and Xuefeng ZHANG. "A fingerprint-template-generating method based on the 3D mapping of local minutiae." SCIENTIA SINICA Informationis 49, no. 1 (January 1, 2019): 42–56. http://dx.doi.org/10.1360/n112018-00018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Jin, Zhe, Andrew Beng Jin Teoh, Thian Song Ong, and Connie Tee. "Fingerprint template protection with minutiae-based bit-string for security and privacy preserving." Expert Systems with Applications 39, no. 6 (May 2012): 6157–67. http://dx.doi.org/10.1016/j.eswa.2011.11.091.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Krivokuća, Vedrana, and Waleed Abdulla. "Cancellability and diversity analysis of fingerprint template protection scheme based on compact minutiae pattern." Information Security Journal: A Global Perspective 25, no. 1-3 (April 4, 2016): 109–23. http://dx.doi.org/10.1080/19393555.2016.1179375.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Krivokuća, Vedrana, and Waleed Abdulla. "Fingerprint template protection scheme based on partial minutiae patterns: a comprehensive non-invertibility analysis." International Journal of Biometrics 7, no. 4 (2015): 326. http://dx.doi.org/10.1504/ijbm.2015.076136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Li, Mengxing, Quan Feng, Jian Zhao, Mei Yang, Lijun Kang, and Lili Wu. "Minutiae Matching with Privacy Protection Based on the Combination of Garbled Circuit and Homomorphic Encryption." Scientific World Journal 2014 (2014): 1–13. http://dx.doi.org/10.1155/2014/525387.

Full text
Abstract:
Biometrics plays an important role in authentication applications since they are strongly linked to holders. With an increasing growth of e-commerce and e-government, one can expect that biometric-based authentication systems are possibly deployed over the open networks in the near future. However, due to its openness, the Internet poses a great challenge to the security and privacy of biometric authentication. Biometric data cannot be revoked, so it is of paramount importance that biometric data should be handled in a secure way. In this paper we present a scheme achieving privacy-preserving fingerprint authentication between two parties, in which fingerprint minutiae matching algorithm is completed in the encrypted domain. To improve the efficiency, we exploit homomorphic encryption as well as garbled circuits to design the protocol. Our goal is to provide protection for the security of template in storage and data privacy of two parties in transaction. The experimental results show that the proposed authentication protocol runs efficiently. Therefore, the protocol can run over open networks and help to alleviate the concerns on security and privacy of biometric applications over the open networks.
APA, Harvard, Vancouver, ISO, and other styles
25

Saquib, Zia, Santosh Kumar Soni, Sweta Suhasaria, and Anamika Singh. "Standardized Biometric Templates in Indian Scenario: Interoperability Issues and Solutions." International Journal of Computer and Communication Technology, January 2014, 8–15. http://dx.doi.org/10.47893/ijcct.2014.1212.

Full text
Abstract:
The compelling need for establishing the identity of a person is becoming critical in our vastly interconnected society. Biometrics is beginning to gain wide acceptance as a legitimate method for determining an individual’s identity in India. Minutiae features extracted from fingerprint images are widely used for automated fingerprint recognition. The conformance of minutiae templates to standardized data interchange formats and the interoperability of minutiae extraction and comparison subsystems from multiple suppliers are important to prevent proprietary lock-in. Further, just by achieving vendor-neutral fingerprint biometric templates, doesn’t guarantee seamless integration and exchange of information amongst different government agencies in India, viz., Aadhaar-enabled citizen services/applications, Seafarers' Identity Cards (ILO-SID) of DG Shipping, State-police AFISs (Automated Fingerprint Identification Systems) etc. One of the key reasons to this interoperability issue is the existence of multiple international standards for generation of minutiae-based fingerprint templates, which are primarily not interoperable. This paper focuses on conformance and interoperability issues that are likely to arise at the time of integration of such virtually isolated govt. agencies, specifically, in applications like, conducting nation-wide criminal background checks, de-duplication of data, etc. The paper further proposes viable solutions to address these issues.
APA, Harvard, Vancouver, ISO, and other styles
26

Basha, S. Shanawaz, and N. Musrat Sultana. "Spectral Minutiae Fingerprint Recognition System." International Journal of Computer and Communication Technology, April 2014, 103–8. http://dx.doi.org/10.47893/ijcct.2014.1228.

Full text
Abstract:
Biometrics refers to the automatic recognition of individuals based on their physiological and/or behavioral characteristics, such as faces, finger prints, iris, and gait. In this paper, we focus on the application of finger print recognition system. The spectral minutiae fingerprint recognition is a method to represent a minutiae set as a fixedlength feature vector, which is invariant to translation, and in which rotation and scaling become translations, so that they can be easily compensated for. Based on the spectral minutiae features, this paper introduces two feature reduction algorithms: the Column Principal Component Analysis and the Line Discrete Fourier Transform feature reductions, which can efficiently compress the template size with a reduction rate of 94%.With reduced features, we can also achieve a fast minutiae-based matching algorithm. This paper presents the performance of the spectral minutiae fingerprint recognition system, this fast operation renders our system suitable for a large-scale fingerprint identification system, thus significantly reducing the time to perform matching, especially in systems like, police patrolling, airports etc,. The spectral minutiae representation system tends to significantly reduce the false acceptance rate with a marginal increase in the false rejection rate.
APA, Harvard, Vancouver, ISO, and other styles
27

Lahmidi, Ayoub, Khalid Minaoui, Chouaib Moujahdi, and Mohammed Rziza. "Fingerprint Template Protection Using Irreversible Minutiae Tetrahedrons." Computer Journal, August 5, 2021. http://dx.doi.org/10.1093/comjnl/bxab111.

Full text
Abstract:
Abstract The use of fingerprint continues to increase constantly with the propagation of biometric authentication technologies. Fingerprint is today the most widely used biometric modality for human verification and identification, due to its practical use and its discriminative structure that allows to different identities to be easily distinguished. Unfortunately, this emergence has been accompanied by a number of problems and challenges related to identity theft and to security issues in general. To address these concerns, many approaches have been proposed in which only few of them were able to reach an acceptable level of both security and performance. In this paper, we propose a new fingerprint template protection scheme that enhances the security of protected system while preserving performance. The proposed approach is a minutiae-based technique that performs fingerprint matching in a transformed space using irreversible minutiae tetrahedrons. Using the original Fingerprint Verification Competition (FVC) protocol, the provided experimental results on FVC2002 DB1, DB2 and DB3 fingerprint databases have shown satisfactory recognition rates. Our results are compared to some existing techniques that use the same protocol of test. We have proved as well that the proposed scheme meets the requirements of revocability, unlinkability and irreversibility.
APA, Harvard, Vancouver, ISO, and other styles
28

Kant, Chander. "NEW APPROACH TOWARDS EFFICIENT BIOMETRIC SYSTEMS." International Journal of Computing, December 20, 2011, 108–13. http://dx.doi.org/10.47839/ijc.10.2.741.

Full text
Abstract:
Fingerprints possess two main types of features that are used for automatic fingerprint identification and verification: (i) Ridge and Furrow structure that forms a special pattern in the central region of the fingerprint and (ii) Minutiae details associated with the local ridge and furrow structure. In a traditional biometric recognition system, the biometric template is usually stored on a central server during enrollment. The candidate biometric template captured by the biometric device is sent to the server where the processing and matching steps are performed. The proposed work presents an approach to the processing time during fingerprint matching process in a Biometric System. The proposed work is based upon four major classifications of fingerprint, whorl, arch, left-loop and right-loop and is more efficient as compared with the existing system.
APA, Harvard, Vancouver, ISO, and other styles
29

"Fingerprint verification using the traveling salesman problem solution and decomposition of the vicinity of the minutiae." Computer Science and Cybersecurity, no. 2 (2020). http://dx.doi.org/10.26565/2519-2310-2020-2-03.

Full text
Abstract:
The article presents an example of verification of the fingerprint database by the method of solving the problem of a salesman using the decomposition of the neighborhood of the nearest minutes. The solution of this problem is resistant to linear, angular deformations, mixing of points. This method provides the correct solution for a small number of points, for a large number of points there is a cross section of the contours, the solution is not optimal. Therefore, to reduce the processing time and calculate the metric, a modified algorithm for solving the problem by the method of branches and boundaries, namely the alignment and exclusion of arcs on each cycle of the optimal route. Verification is based on the creation of local structures for each minute of the imprint, because it is the local structures that are resistant to deformation. Building global structures very often does not lead to good quality indicators, as there is a problem with the centering of the entire sample. A complete list of tests of fingerprint database templates during their verification by this method has been carried out. The use of decomposition of characteristic features provides greater stability when adding false and erasing true minutes. The results of the article show the values of pairwise comparisons of two templates for true and false tests. The indicators of false rejection rate (FRR), false access rate (FAR), single equivalent error rate (EER) were studied.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography