Table of Contents Author Guidelines Submit a Manuscript
Computational and Mathematical Methods in Medicine
Volume 2015, Article ID 673867, 10 pages
http://dx.doi.org/10.1155/2015/673867
Research Article

A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication

ATR Key Laboratory of National Defense Technology, Shenzhen University, Shenzhen 518060, China

Received 27 June 2014; Accepted 24 August 2014

Academic Editor: Shengyong Chen

Copyright © 2015 Yijun Yang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. Juels and M. Sudan, “A fuzzy vault scheme,” in Proceedings of the IEEE International Symposium on Information Theory, p. 408, July 2002. View at Scopus
  2. T. C. Clancy, N. Kiyavash, and D. J. Lin, “Secure smartcard-based fingerprint authentication,” in Proceedings of the ACM SIGMM Workshop on Biometrics Methods and Applications (WBMA '03), pp. 45–52, New York, NY, USA, 2003.
  3. U. Uludag and A. Jain, “Securing fingerprint template: fuzzy vault with helper data,” in Proceedings of the Conference on Computer Vision and Pattern Recognition Workshops (CVPRW '06), pp. 163–169, Washington, DC, USA, June 2006. View at Publisher · View at Google Scholar · View at Scopus
  4. K. Nandakumar, A. K. Jain, and S. Pankanti, “Fingerprint-based fuzzy vault: implementation and performance,” IEEE Transactions on Information Forensics and Security, vol. 2, no. 4, pp. 744–757, 2007. View at Publisher · View at Google Scholar · View at Scopus
  5. Q. Caixia and Y. Lin, “Encrypted fuzzy vault based on password,” Bulletin of Science and Technology, vol. 27, no. 2, pp. 282–287, 2011. View at Google Scholar
  6. R. Zhang, E. Liu, H. Zhao, and L. Pang, “Improved cancelable fingerprint fuzzy vault system,” Journal of Xidian University, vol. 38, no. 4, pp. 173–180, 2011. View at Publisher · View at Google Scholar · View at Scopus
  7. C. Cattani and G. Pierro, “On the fractal geometry of DNA by the binary image analysis,” Bulletin of Mathematical Biology, vol. 75, no. 9, pp. 1544–1570, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  8. M. Li, “A class of negatively fractal dimensional Gaussian random functions,” Mathematical Problems in Engineering, vol. 2011, Article ID 291028, 18 pages, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  9. M. Li, “Power spectrum of generalized fractional Gaussian noise,” Advances in Mathematical Physics, vol. 2013, Article ID 315979, 3 pages, 2013. View at Publisher · View at Google Scholar · View at MathSciNet
  10. M. Li and S. C. Lim, “Power spectrum of generalized Cauchy process,” Telecommunication Systems, vol. 43, no. 3-4, pp. 219–222, 2010. View at Publisher · View at Google Scholar · View at Scopus
  11. C. Cattani, A. Ciancio, and B. Lods, “On a mathematical model of immune competition,” Applied Mathematics Letters, vol. 19, no. 7, pp. 678–683, 2006. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  12. X. Wang, Y. L. Yin, and H. Yu, “Finding collisions in the full SHA-1,” in Advances in Cryptology—CRYPTO 2005, vol. 3621 of Lecture Notes in Computer Science, pp. 17–36, Springer, Berlin, Germany, 2005. View at Publisher · View at Google Scholar · View at MathSciNet
  13. N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, “Generating cancelable fingerprint templates,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 29, no. 4, pp. 561–572, 2007. View at Publisher · View at Google Scholar · View at Scopus