Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 686754, 9 pages
http://dx.doi.org/10.1155/2014/686754
Research Article

A Hybrid Approach to Protect Palmprint Templates

1School of Computer & Information Technology, Beijing Jiaotong University, Beijing 100044, China
2Beijing Key Laboratory of Advanced Information Science and Network Technology, Beijing 100044, China

Received 5 December 2013; Accepted 11 February 2014; Published 27 March 2014

Academic Editors: F. Yu and G. Yue

Copyright © 2014 Hailun Liu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. K. Nandakumar, A. K. Jain, and A. Nagar, “Biometric template security,” EURASIP Journal on Advances in Signal Processing, vol. 2008, Article ID 579416, pp. 1–17, 2008. View at Publisher · View at Google Scholar · View at Scopus
  2. A. B. J. Teoh, A. Goh, and D. C. L. Ngo, “Random multispace quantization as an analytic mechanism for BioHashing of biometric and random identity inputs,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 28, no. 12, pp. 1892–1901, 2006. View at Google Scholar · View at Scopus
  3. C. Rathgeb and A. Uhl, “A survey on biometric cryptosystems and cancelable biometrics,” EURASIP Journal on Information Security, vol. 2011, article 3, pp. 1–25, 2011. View at Google Scholar
  4. U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, “Biometric cryptosystems: issues and challenges,” Proceedings of the IEEE, vol. 92, no. 6, pp. 948–959, 2004. View at Publisher · View at Google Scholar · View at Scopus
  5. A. Nagar, K. Nandakumar, and A. K. Jain, “A hybrid biometric cryptosystem for securing fingerprint minutiae templates,” Pattern Recognition Letters, vol. 31, no. 8, pp. 733–741, 2010. View at Publisher · View at Google Scholar · View at Scopus
  6. Y. C. Feng, P. C. Yuen, and A. K. Jain, “A hybrid approach for generating secure and discriminating face template,” IEEE Transactions on Information Forensics and Security, vol. 5, no. 1, pp. 103–117, 2010. View at Publisher · View at Google Scholar · View at Scopus
  7. A. Juels and M. Sudan, “A fuzzy vault scheme,” Designs, Codes, and Cryptography, vol. 38, no. 2, pp. 237–257, 2006. View at Publisher · View at Google Scholar · View at Scopus
  8. A. B. J. Teoh and C. T. Yuang, “Cancelable biometrics realization with multispace random projections,” IEEE Transactions on Systems, Man, and Cybernetics B: Cybernetics, vol. 37, no. 5, pp. 1096–1106, 2007. View at Publisher · View at Google Scholar · View at Scopus
  9. K. Nandakumar, A. K. Jain, and S. Pankanti, “Fingerprint-based fuzzy vault: implementation and performance,” IEEE Transactions on Information Forensics and Security, vol. 2, no. 4, pp. 744–757, 2007. View at Publisher · View at Google Scholar · View at Scopus
  10. Y. J. Lee, K. R. Park, S. J. Lee, K. Bae, and J. Kim, “A new method for generating an invariant iris private key based on the fuzzy vault system,” IEEE Transactions on Systems, Man, and Cybernetics B: Cybernetics, vol. 38, no. 5, pp. 1302–1313, 2008. View at Publisher · View at Google Scholar · View at Scopus
  11. Y. Wang and K. N. Plataniotis, “Fuzzy vault for face based cryptographic key generation,” in Proceedings of the Biometrics Symposium (BSYM '07), September 2007. View at Publisher · View at Google Scholar · View at Scopus
  12. R. I. Arriaga and S. Vempala, “Algorithm theory of learning: robust concepts and random projection,” in Proceedings of the 40th Annual Conference on Foundations of Computer Science, pp. 616–623, October 1999. View at Scopus
  13. D. Achlioptas, “Database-friendly random projections,” in Proceedings of the 20th Annual Symposium on Principles Databse Systems, pp. 274–281, Santa Barbara, Calif, USA, 2001.
  14. P. Li, T. J. Hastie, and K. W. Church, “Very sparse random projections,” in Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 287–296, August 2006. View at Scopus
  15. Y. Wang and D. Hatzinakos, “Sorted index numbers for privacy preserving face recognition,” EURASIP Journal on Advances in Signal Processing, vol. 2009, Article ID 260148, pp. 1–16, 2009. View at Publisher · View at Google Scholar · View at Scopus
  16. Y. Wang and D. Hatzinakos, “On random transformations for changeable face verification,” IEEE Transactions on Systems, Man, and Cybernetics B: Cybernetics, vol. 41, no. 3, pp. 840–854, 2011. View at Publisher · View at Google Scholar · View at Scopus
  17. Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, “Fuzzy extractors: how to generate strong keys from biometrics and other noisy data,” SIAM Journal on Computing, vol. 38, no. 1, pp. 97–139, 2008. View at Publisher · View at Google Scholar · View at Scopus
  18. Y. Wang and K. N. Plataniotis, “An analysis of random projection for changeable and privacy-preserving biometric verification,” IEEE Transactions on Systems, Man, and Cybernetics B: Cybernetics, vol. 40, no. 5, pp. 1280–1293, 2010. View at Publisher · View at Google Scholar · View at Scopus
  19. Q. Li, Research on handmetric recognition and feature level fusion method [Ph.D. thesis], BeiJing Jiao Tong University, 2006.
  20. F. Hao, R. Anderson, and J. Daugman, “Combining crypto with biometrics effectively,” IEEE Transactions on Computers, vol. 55, no. 9, pp. 1081–1088, 2006. View at Publisher · View at Google Scholar · View at Scopus
  21. A. Nagar, K. Nandakumar, and A. K. Jain, “Multibiometric cryptosystems based on feature-level fusion,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 1, pp. 255–268, 2012. View at Publisher · View at Google Scholar · View at Scopus
  22. H. L. Liu, D. M. Sun, K. Xiong, and Z. D. Qiu, “Is fuzzy vault scheme very effective for key binding in biometric cryptosystems?” in Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC '11), pp. 279–284, 2011.