Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 819031, 8 pages
http://dx.doi.org/10.1155/2014/819031
Research Article

Palmprint Based Multidimensional Fuzzy Vault Scheme

1School of Computer & Information Technology, Beijing Jiaotong University, Beijing 100044, China
2Beijing Key Laboratory of Advanced Information Science and Network Technology, Beijing 100044, China

Received 5 December 2013; Accepted 11 February 2014; Published 16 April 2014

Academic Editors: F. Yu and G. Yue

Copyright © 2014 Hailun Liu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, “Biometric cryptosystems: issues and challenges,” Proceedings of the IEEE, vol. 92, no. 6, pp. 948–960, 2004. View at Publisher · View at Google Scholar · View at Scopus
  2. Y. Sutcu, Q. Li, and N. Memon, “Protecting biometric templates with sketch: theory and practice,” IEEE Transactions on Information Forensics and Security, vol. 2, no. 3, pp. 503–511, 2007. View at Publisher · View at Google Scholar · View at Scopus
  3. A. Juels and M. Wattenberg, “Fuzzy commitment scheme,” in Proceedings of the 1999 6th ACM Conference on Computer and Communications Security (ACM CCS '99), pp. 28–36, November 1999. View at Scopus
  4. Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, “Fuzzy extractors: how to generate strong keys from biometrics and other noisy data,” SIAM Journal on Computing, vol. 38, no. 1, pp. 97–139, 2008. View at Publisher · View at Google Scholar · View at Scopus
  5. A. Juels and M. Sudan, “A fuzzy vault scheme,” in Proceedings of the IEEE International Symposium on Information Theory, p. 408, July 2002. View at Scopus
  6. A. K. Jain, K. Nandakumar, and A. Nagar, “Biometric template security,” Eurasip Journal on Advances in Signal Processing, vol. 2008, Article ID 579416, 17 pages, 2008. View at Publisher · View at Google Scholar
  7. K. Nandakumar, A. K. Jain, and S. Pankanti, “Fingerprint-based fuzzy vault: implementation and performance,” IEEE Transactions on Information Forensics and Security, vol. 2, no. 4, pp. 744–757, 2007. View at Publisher · View at Google Scholar · View at Scopus
  8. Y. J. Lee, K. R. Park, S. J. Lee, K. Bae, and J. Kim, “A new method for generating an invariant iris private key based on the fuzzy vault system,” IEEE Transactions on Systems, Man, and Cybernetics B, vol. 38, no. 5, pp. 1302–1313, 2008. View at Publisher · View at Google Scholar · View at Scopus
  9. Y. Wang and K. N. Plataniotis, “Fuzzy vault for face based cryptographic key generation,” in Proceedings of the 2007 Biometrics Symposium (BSYM '07), September 2007. View at Publisher · View at Google Scholar · View at Scopus
  10. H. L. Liu, D. M. Sun, K. Xiong, and Z. D. Qiu, “3D fuzzy vault based on palmprint,” in Proceedings of the 2nd International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC '10), pp. 230–234, October 2010. View at Publisher · View at Google Scholar · View at Scopus
  11. H. L. Liu, D. M. Sun, K. Xiong, and Z. D. Qiu, “Is fuzzy vault scheme very effective for key binding in biometric cryptosystems?” in Proceedings of the 3rd International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC '11), pp. 279–284, October 2011. View at Publisher · View at Google Scholar · View at Scopus
  12. R. C. Shi and F. Wei, Matrix Analysis, Beijing Institute of Technology Press, Beijing, China, 2010.
  13. D. Zhang, W. K. Kong, J. You, and M. Wong, “Online palmprint identification,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 25, no. 9, pp. 1041–1050, 2003. View at Publisher · View at Google Scholar · View at Scopus
  14. A. Kong, D. Zhang, and M. Kamel, “Three measures for secure palmprint identification,” Pattern Recognition, vol. 41, no. 4, pp. 1329–1337, 2008. View at Publisher · View at Google Scholar · View at Scopus
  15. R. Williams, “A Painless Guide To CRC Error Detection Algorithms,” 1993, http://www.repairfaq.org/filipg/.
  16. Q. Y. Li, N. C. Wang, and D. Y. Yi, Numerical Analysis, Tsinghua University Press, Beijing, China, 2001.
  17. Q. Li, Research on handmetric recognition and feature level fusion method [Ph.D. thesis], Beijing Jiao Tong University, Beijing, China, 2006.
  18. K. Nandakumar and A. K. Jain, “Multibiometric template security using fuzzy vault,” in Proceedings of the IEEE 2nd International Conference on Biometrics: Theory, Applications and Systems (BTAS '08), October 2008. View at Publisher · View at Google Scholar · View at Scopus
  19. H. L. Liu, D. M. Sun, K. Xiong, and Z. D. Qiu, “A hybrid approach to protect palmprint templates,” The Scientific World Journal, vol. 2014, Article ID 686754, 9 pages, 2014. View at Publisher · View at Google Scholar