Table of Contents Author Guidelines Submit a Manuscript
BioMed Research International
Volume 2013, Article ID 623815, 12 pages
http://dx.doi.org/10.1155/2013/623815
Research Article

Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions

Department of Electrical Engineering, Chang Gung University, 259 Wen-Hwa 1st Road, Kwei-Shan, Taoyuan 333, Taiwan

Received 30 January 2013; Accepted 22 April 2013

Academic Editor: Zhirong Sun

Copyright © 2013 Shin-Yan Chiou. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. K. Lee, S. R. Ryu, and K. Y. Yoo, “Fingerprint-based remote user authentication scheme using smart cards,” Electronics Letters, vol. 38, no. 12, pp. 554–555, 2002. View at Publisher · View at Google Scholar · View at Scopus
  2. W. C. Ku, S. T. Chang, and M. H. Chiang, “Further cryptanalysis of fingerprint-based remote user authentication scheme using smartcards,” Electronics Letters, vol. 41, no. 5, pp. 240–241, 2005. View at Publisher · View at Google Scholar · View at Scopus
  3. M. K. Khan and J. Zhang, “An efficient and practical fingerprint-based remote user authentication scheme with smart cards,” in Information Security Practice and Experience, vol. 3903 of Lecture Notes in Computer Science, pp. 260–268, 2006. View at Google Scholar
  4. A. Baig, A. Bouridane, F. Kurugollu, and G. Qu, “Fingerprint-Iris fusion based identification system using a single hamming distance matcher,” International Journal of Bio-Science and Bio-Technology, vol. 1, no. 1, pp. 47–58, 2009. View at Google Scholar · View at Scopus
  5. J. Pedraza, M. A. Patricio, A. de Asís, and J. M. Molina, “Privacy and legal requirements for developing biometric identification software in context-based applications,” International Journal of Bio-Science and Bio-Technology, vol. 2, no. 1, pp. 13–24, 2010. View at Google Scholar · View at Scopus
  6. C. C. Chang, S. C. Chang, and Y. W. Lai, “An improved biometrics-based user authentication scheme without concurrency system,” International Journal of Intelligent Information Processing, vol. 1, no. 1, pp. 41–49, 2010. View at Google Scholar
  7. C. T. Li and M. S. Hwang, “An efficient biometrics-based remote user authentication scheme using smart cards,” Journal of Network and Computer Applications, vol. 33, no. 1, pp. 1–5, 2010. View at Publisher · View at Google Scholar · View at Scopus
  8. A. K. Das, “Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards,” IET Information Security, vol. 5, no. 3, pp. 541–552, 2011. View at Google Scholar
  9. Y. An, “Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards,” Journal of Biomedicine and Biotechnology, vol. 2012, Article ID 519723, 6 pages, 2012. View at Publisher · View at Google Scholar
  10. H. S. Kim, S. W. Lee, and K. Y. Yoo, “ID-based password authentication scheme using smart cards and fingerprints,” ACM Operating Systems Review, vol. 37, no. 4, pp. 32–41, 2003. View at Google Scholar
  11. T. S. Messerges, E. A. Dabbish, and R. H. Sloan, “Examining smart-card security under the threat of power analysis attacks,” IEEE Transactions on Computers, vol. 51, no. 5, pp. 541–552, 2002. View at Publisher · View at Google Scholar · View at Scopus
  12. S. M. Yen and M. Joye, “Checking before output may not be enough against fault-based cryptanalysis,” IEEE Transactions on Computers, vol. 49, no. 9, pp. 967–970, 2000. View at Publisher · View at Google Scholar · View at Scopus
  13. M. Scott, “Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints,” ACM SIGOPS Operation System Review, vol. 38, no. 2, pp. 73–75, 2004. View at Google Scholar
  14. N. K. Ratha, K. Karu, S. Chen, and A. K. Jain, “A real-time matching system for large fingerprint databases,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 18, no. 8, pp. 799–813, 1996. View at Google Scholar · View at Scopus
  15. C. J. Lee and S. D. Wang, “Gabor filter-based approach to fingerprint recognition,” in Proceedings of the IEEE Workshop on Signal Processing Systems (SiPS '99), pp. 371–378, 1999. View at Scopus
  16. G. Cao, Y. Mei, Z. Mao, and Q. S. Sun, “Fingerprint matching using local alignment based on multiple pairs of reference minutiae,” Journal of Electronic Imaging, vol. 18, no. 4, Article ID 043002, 2009. View at Publisher · View at Google Scholar · View at Scopus
  17. A. K. Hrechak and J. A. McHugh, “Automated fingerprint recognition using structural matching,” Pattern Recognition, vol. 23, no. 8, pp. 893–904, 1990. View at Publisher · View at Google Scholar · View at Scopus
  18. L. C. Jain, “An automated matching technique for fingerprint identification,” in Proceedings of the 1st International Conference on Knowledge-Based Intelligent Electronic Systems, pp. 21–23, May 1997.
  19. A. Wahab, S. H. Chin, and E. C. Tan, “Novel approach to automated fingerprint recognition,” IEE Proceedings Vision, Image & Signal Processing, vol. 145, no. 3, pp. 160–166, 1998. View at Google Scholar
  20. Y. J. Chang, W. Zhang, and T. Chen, “Biometrics-based cryptographic key generation,” in Proceedings of the IEEE International Conference on Multimedia and Expo (ICME '04), pp. 2203–2206, June 2004. View at Scopus
  21. Y. Dodis, L. Reyzin, and A. Smith, “Fuzzy extractors: how to generate strong keys from biometrics and other noisy data,” in Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT '04), Interlaken, Switzerland, May 2004.
  22. F. Hao, R. Anderson, and J. Daugman, “Combining cryptography with biometrics effectively,” Tech. Rep. UCAMCL-TR-640, University of Cambridge, Computer Laboratory, Cambridge, UK, 2005. View at Google Scholar
  23. W. Shalaby and M. O. Ahmad, “A multilevel structural technique for fingerprint representation and matching,” Signal Processing, vol. 93, no. 1, pp. 56–69, 2012. View at Google Scholar
  24. Q. Wang, G. Liu, Z. Guo, J. Guo, and X. Chen, “Structural fingerprint based hierarchical filtering in song identification,” in Proceedings of the IEEE International Conference on Multimedia and Expo (ICME '11), pp. 1–4, IEEE, 2011.
  25. D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint Recognition, Springer, 2009.
  26. Q. Tong and J. Zhu, “Research of improved gabor based on fingerprint image enhanced algorithm in wavelet domain,” in Proceedings of the International Conference on Computational Problem-Solving (ICCP '12), pp. 17–18, IEEE, 2012.
  27. H. Khazaei and A. Mohades, “Fingerprint matching and classification using an onion layer algorithm of computational geometry,” in Proceedings of the 13th International CSI Computer Conference, 2008.
  28. A. Panchenko, L. Niessen, A. Zinnen, and T. Engel, “Website fingerprinting in onion routing based anonymization networks,” in Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, pp. 103–114, ACM, 2011.
  29. S. Mazaheri, B. S. Bigham, and R. M. Tayebi, “Fingerprint matching using an onion layer algorithm of computational geometry based on level 3 features,” Communications in Computer and Information Science, vol. 166, no. 1, pp. 302–314, 2011. View at Publisher · View at Google Scholar · View at Scopus