AK Jain, A Ross, S Prabhakar, An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 14, 4–20 (2004).
Article
Google Scholar
S Prabhakar, S Pankanti, AK Jain, Biometric recognition: Security and privacy concerns. IEEE Secur. Privacy. 1(2), 33–42 (2003).
Article
Google Scholar
AK Jain, K Nandakumar, A Nagar, Biometric template security. EURASIP J. Adv. Signal Process. 2008, 113–111317 (2008).
Article
Google Scholar
NK Ratha, JH Connell, RM Bolle, Enhancing security and privacy in biometrics-based authentication systems. IBM Syst. J. 40(3), 614–634 (2001).
Article
Google Scholar
C Roberts, Biometric attack vectors and defences. Comput. Secur. 26(1), 14–25 (2007).
Article
Google Scholar
F Hao, R Anderson, J Daugman, Combining crypto with biometrics effectively. IEEE Trans. Comput. 55(9), 1081–1088 (2006).
Article
Google Scholar
S Kanade, D Petrovska-Delacretaz, B Dorizzi, in Computer Vision and Pattern Recognition, 2009. CVPR 2009. IEEE Conference On. Cancelable iris biometrics and using error correcting codes to reduce variability in biometric data (Miami, FL, 2009), pp. 120–127.
A Juels, M Wattenberg, in CCS ’99, Proceedings of the 6th ACM Conference on Computer and Communications Security. A fuzzy commitment scheme (Singapore, 1999), pp. 28–36.
TAM Kevenaar, GJ Schrijen, M van der Veen, AHM Akkermans, F Zuo, in Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies. AUTOID ’05. Face recognition with renewable and privacy preserving binary templates, (2005), pp. 21–26. 10.1109/AUTOID.2005.24.
GI Davida, Y Frankel, BJ Matt, in IEEE Symposium on Security and Privacy. On enabling secure applications through off-line biometric identification (Oakland, CA, 1998), pp. 148–157.
S Tulyakov, F Farooq, V Govindaraju, in ICAPR (2). Symmetric hash functions for fingerprint minutiae, (2005), pp. 30–38. doi:10.1007/11552499_4.
Y Sutcu, Q Li, N Memon, in SPIE Conf on Security, Steganography and Watermarking of Multimedia Contents IX. How to protect biometric templates, (2007). doi:10.1007/978-3-319-07857-1_27.
A Stoianov, T Kevenaar, M van der Veen, in Science and Technology for Humanity (TIC-STH), 2009 IEEE Toronto International Conference. Security issues of biometric encryption (Toronto, ON, 2009), pp. 34–39.
X Zhou, Privacy and security assessment of biometric template protection. IT - Inform. Technol. 54(4), 197 (2012).
Article
Google Scholar
X Zhou, A Kuijper, R Veldhuis, C Busch, in Proceedings of the 2011 International Joint Conference on Biometrics, IJCB ’11. Quantifying privacy and security of biometric fuzzy commitment (IEEE Computer SocietyWashington, DC, USA, 2011), pp. 1–8.
Chapter
Google Scholar
S Cimato, M Gamassi, V Piuri, R Sassi, F Scotti, in CIS. A biometric verification system addressing privacy concerns (Harbin, 2007), pp. 594–598.
T Matsumoto, H Matsumoto, K Yamada, S Hoshino, Impact of artificial "gummy" fingers on fingerprint systems. Datenschutz und Datensicherheit. 26(8) (2002). doi:10.1117/12.462719.
T van der Putte, J Keuning, in CARDIS. Biometrical fingerprint recognition: Don’t get your fingers burned, (2000), pp. 289–306. ISBN:0-7923-7953-5.
J Bringer, H Chabanne, GD Cohen, B Kindarji, G Zémor, Optimal iris fuzzy sketches. CoRR abs/0705.3740 (2007). doi:10.1109/BTAS.2007.4401904.
M Barni, T Bianchi, D Catalano, M Di Raimondo, R Donida Labati, P Failla, D Fiore, R Lazzeretti, V Piuri, F Scotti, A Piva, in Proceedings of the 12th ACM Workshop on Multimedia and Security. Privacy-preserving fingercode authentication (ACMNew York, NY, USA, 2010), pp. 231–240.
Chapter
Google Scholar
K Nandakumar, AK Jain, S Pankanti, Fingerprint-based fuzzy vault: Implementation and performance. IEEE Trans. Inform. Forensics Secur. 2(4), 744–757 (2007).
Article
Google Scholar
YC Feng, PC Yuen, AK Jain, A hybrid approach for generating secure and discriminating face template. Trans. Info. For. Sec. 5(1), 103–117 (2010).
Article
Google Scholar
FM Bui, K Martin, H Lu, KN Plataniotis, D Hatzinakos, Fuzzy key binding strategies based on quantization index modulation (QIM) for biometric encryption (be) applications. IEEE Trans. Inform. Forensics Secur. 5(1), 118–132 (2010).
Article
Google Scholar
A Juels, M Sudan, A fuzzy vault scheme. Des. Codes Cryptography. 38(2), 237–257 (2006).
Article
MathSciNet
MATH
Google Scholar
C Karabat, H Erdogan, in Proceedings of the 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. A cancelable biometric hashing for secure biometric verification system (Kyoto, 2009), pp. 1082–1085.
Z Bai, D Hatzinakos, in Control Automation Robotics Vision (ICARCV), 2010 11th International Conference On. Lbp-based biometric hashing scheme for human authentication (Singapore, 2010), pp. 1842–1847.
YW Kuan, ABJ Teoh, DCL Ngo, Secure hashing of dynamic hand signatures using wavelet-fourier compression with biophasor mixing and 2n discretization. EURASIP J. Adv. Sig. Proc. 2007 (2007). doi:10.1155/2007/59125.
C Rathgeb, A Uhl, Iris-biometric hash generation for biometric database indexing. Pattern Recognit. Int. Conf., 2848–2851 (2010). doi:10.1109/ICPR.2010.698.
R Lumini, L Nanni, An improved biohashing for human authentication. Pattern Recognit. 40, 1057–1065 (2006).
Article
Google Scholar
WJ Scheirer, TE Boult, in Proceedings of Biometrics Symposium. Cracking fuzzy vaults and biometric encryption (Baltimore, MD, 2007), pp. 1–6.
A Adler, in In International Conference on Audio and Video Based Biometric Person Authentication. Vulnerabilities in biometric encryption systems (Springer-VerlagBerlin, Heidelberg, 2005), pp. 1100–1109.
Chapter
Google Scholar
TE Boult, WJ Scheirer, R Woodworth, in CVPR. Revocable fingerprint biotokens: Accuracy and security analysis (Minneapolis, MN, 2007).
A Kong, K-H Cheung, D Zhang, M Kamel, J You, An analysis of biohashing and its variants. Pattern Recogn. 39, 1359–1368 (2006).
Article
MATH
Google Scholar
K Kommel, C Vielhauer, in Proceedings of the 12th ACM Workshop on Multimedia and Security. MMSec ’10. Reverse-engineer methods on a biometric hash algorithm for dynamic handwriting (ACMNew York, NY, USA, 2010), pp. 67–72.
Chapter
Google Scholar
KH Cheung, AW-K Kong, J You, D Zhang, in CISST. An analysis on invertibility of cancelable biometrics based on biohashing (Springer-VerlagBerlin, Heidelberg, 2005), pp. 40–45.
Google Scholar
K Kummel, C Vielhauer, T Scheidat, D Franke, J Dittmann, in Proceedings of the 11th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security. Handwriting biometric hash attack: a genetic algorithm with user interaction for raw data reconstruction, (2010), pp. 178–190. doi:10.1007/978-3-642-13241-4_17.
K Simoens, P Tuyls, B Preneel, in Proceedings of the 2009 30th IEEE Symposium on Security and Privacy. IEEE SP’09. Privacy weaknesses in biometric sketches (Berkeley, CA, 2009), pp. 188–203.
T Ignatenko, FMJ Willems, Information leakage in fuzzy commitment schemes. IEEE Trans. Inform. Forensics Security. 5(2), 337–348 (2010).
Article
Google Scholar
K Simoens, J Bringer, H Chabanne, S Seys, A framework for analyzing template security and privacy in biometric authentication systems. IEEE Trans. Inform. Forensics Secur. 7(2), 833–841 (2012).
Article
Google Scholar
T Ignatenko, FMJ Willems, Biometric systems: privacy and secrecy aspects. Trans. Info. For. Sec. 4(4), 956–973 (2009).
Article
Google Scholar
Z Erkin, M Franz, J Guajardo, S Katzenbeisser, I Lagendijk, T Toft, in Proceedings of the 9th International Symposium on Privacy Enhancing Technologies. PETS ’09. Privacy-preserving face recognition (Seattle, WA, USA, 2009), pp. 235–253.
A-R Sadeghi, T Schneider, I Wehrenberg, in ICISC. Efficient privacy-preserving face recognition (Springer-VerlagBerlin, Heidelberg, 2009), pp. 229–244.
Google Scholar
M Barni, T Bianchi, D Catalano, M Di Raimondo, RD Labati, P Failla, D Fiore, R Lazzeretti, V Piuri, A Piva, F Scotti, in Biometrics: Theory Applications and Systems (BTAS), 2010 Fourth IEEE International Conference On. A privacy-compliant fingerprint recognition system based on homomorphic encryption and fingercode templates (Washington, DC, Sept. 2010).
Y Sutcu, HT Sencar, N Memon, in Proceedings of the 7th Workshop on Multimedia and Security. A secure biometric authentication scheme based on robust hashing (ACMNew York, NY, USA, 2005), pp. 111–116.
Google Scholar
ATB Jin, K-A Toh, WK Yip, in ICB. 2 ns discretisation of biophasor in cancellable biometrics (Seoul, Korea, 2007), pp. 435–444.
B Yang, C Busch, P Bours, D Gafurov, in Media Forensics and Security. Robust minutiae hash for fingerprint template protection (San Jose, CA, USA, 2010).
U Uludag, S Pankanti, AK Jain, in Proceedings of the IEEE. Biometric cryptosystems: Issues and challenges, (2004), pp. 948–960. doi:10.1109/JPROC.2004.827372.
C Rathgeb, A Uhl, in Computer Vision and Pattern Recognition Workshops (CVPRW), 2011 IEEE Computer Society Conference On. Statistical attack against iris-biometric fuzzy commitment schemes (Colorado Springs, CO, 2011), pp. 23–30.
T Ignatenko, F Willems, in Proceedings of the 2009 IEEE International Conference on Symposium on Information Theory - Volume 4. ISIT’09. Secret rate - privacy leakage in biometric systems (Seoul, 2009), pp. 2251–2255.
A Stoianov, in Privacy Security and Trust (PST), 2010 Eighth Annual International Conference On. Security of error correcting code for biometric encryption (Ottawa, ON, 2010), pp. 231–235.
E-C Chang, R Shen, FW Teo, in Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security. Finding the original point set hidden among chaff (ACMNew York, NY, USA, 2006), pp. 182–188.
Google Scholar
A Kholmatov, B Yanikoglu, Realization of correlation attack against the fuzzy vault scheme (2008). doi:10.1117/12.766861.
Y Dodis, R Ostrovsky, L Reyzin, A Smith, Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97–139 (2008).
Article
MathSciNet
MATH
Google Scholar
Y Dodis, B Kanukurthi, J Katz, L Reyzin, A Smith, Robust fuzzy extractors and authenticated key agreement from close secrets. IEEE Trans. Inform. Theory. 58(9), 6207–6222 (2012).
Article
MathSciNet
Google Scholar
Y Sutcu, L Qiming, N Memon, in Proceedings of SPIE Optics and Photonics in Global Homeland Security V and Biometric Technology for Human Identification VI, 7305. Design and analysis of fuzzy extractors for faces, (2009). doi:10.1117/12.820571.
TS Ong, ABJ Teoh, in Proceedings of the Third International Symposium on Information Assurance and Security. Fuzzy key extraction from fingerprint biometrics based on dynamic quantization mechanism (Manchester, 2007), pp. 71–76.
A Arakala, J Jeffers, KJ Horadam, in ICB’07. Fuzzy extractors for minutiae-based fingerprint authentication (Seoul, Korea, 2007), pp. 760–769.
P Tuyls, AHM Akkermans, TAM Kevenaar, GJ Schrijen, AM Bazen, RNJ Veldhuis, in AVBPA. Practical biometric authentication with template protection, (2005), pp. 436–446. doi:10.1007/11527923_45.
X Boyen, in Proceedings of the 11th ACM Conference on Computer and Communications Security. CCS ’04. Reusable cryptographic fuzzy extractors, (2004), pp. 82–91. doi:10.1145/1030083.1030096.
MG Qiming Li, E-C Chang, in Proceedings of IEEE Workshop on Biometrics (In Association with CVPR). Fuzzy extractors for asymmetric biometric representation (Anchorage, AK, 2008).
F Kerschbaum, MJ Atallah, D M’Raïhi, JR Rice, in ICBA. Private fingerprint verification without local storage (Hong Kong, China, 2004), pp. 387–394.
RW Hamming, Error detecting and error correcting codes. Bell Syst. Technical J. 29, 147–160 (1950).
Article
MathSciNet
Google Scholar
MA Turk, AP Pentland, in Proc. IEEE Conference on Computer Vision and Pattern Recognition (CVPR). Face recognition using eigenfaces (Maui, HI, 1991), pp. 586–591.
R Kulkarni, A Namboodiri, in Biometrics (ICB), 2013 International Conference On. Secure hamming distance based biometric authentication (Madrid, 2013), pp. 1–6.
D Boneh, E-J Goh, K Nissim, in Proceedings of the Second International Conference on Theory of Cryptography. TCC’05. Evaluating 2-dnf formulas on ciphertexts (SpringerBerlin, Heidelberg, 2005), pp. 325–341.
Google Scholar
M Osadchy, B Pinkas, A Jarrous, B Moskovich, in Security and Privacy (SP), 2010 IEEE Symposium On. Scifi - a system for secure face identification (Oakland, CA, USA, 2010), pp. 239–254.
SD Rane, W Sun, A Vetro, in Image Processing (ICIP), 2009 16th IEEE International Conference On. Secure distortion computation among untrusting parties using homomorphic encryption (Cairo, 2009), pp. 1485–1488.
J Bringer, H Chabanne, A Patey, in Financial Cryptography Workshops. Shade: Secure hamming distance computation from oblivious transfer (Okinawa, Japan, 2013), pp. 164–176.
MS Kiraz, B Schoenmakers, J Villegas, in Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings. Efficient committed oblivious transfer of bit strings, (2007), pp. 130–144.
T El Gamal, in Proceedings of CRYPTO 84 on Advances in Cryptology. A public key cryptosystem and a signature scheme based on discrete logarithms, (1985), pp. 10–18. doi:10.1109/TIT.1985.1057074.
P Paillier, D Pointcheval, in Advances in Cryptology - Proceedings of ASIACRYPT ’99. LNCS, 1716, ed. by K-Y Lam, E Okamoto, and C Xing. Efficient public-key cryptosystems provably secure against active adversaries (SpringerSingapore, 1999), pp. 165–179.
Chapter
Google Scholar
J Katz, M Yung, Threshold cryptosystems based on factoring. 2501, 192–205 (2002). doi:10.1007/3-540-36178-2_12.
S Goldwasser, S Micali, Probabilistic encryption. J. Comput. Syst. Sci. 28(2), 270–299 (1984).
Article
MathSciNet
MATH
Google Scholar
R Cramer, I Damgård, JB Nielsen, in Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology. EUROCRYPT ’01. Multiparty computation from threshold homomorphic encryption, (2001), pp. 280–299. doi:10.1007/3-540-44987-6_18.
M Raginsky, S Lazebnik, in Advances in Neural Information Processing Systems. Locality-sensitive binary codes from shift-invariant kernels, (2009), pp. 1509–1517. web.engr.illinois.edu.
A Gionis, P Indyk, R Motwani, in VLDB’99, Proceedings of 25th International Conference on Very Large Data Bases, September 7-10, 1999. Similarity search in high dimensions via hashing (Edinburgh, Scotland, UK, 1999), pp. 518–529.
J Bringer, H Chabanne, B Kindarji, Identification with encrypted biometric data. Secur. Commun. Netw. 4(5), 548–562 (2011).
Article
Google Scholar
MS Charikar, in Proceedings of the Thiry-fourth Annual ACM Symposium on Theory of Computing. STOC ’02. Similarity estimation techniques from rounding algorithms (ACMNew York, NY, USA, 2002), pp. 380–388.
Chapter
Google Scholar
DCL Ngo, ATB Jin, A Goh, Biometric hash: high-confidence face recognition. IEEE Trans. Circuits Syst. Video Techn. 16(6), 771–775 (2006).
Article
Google Scholar
O Goldreich, Foundations of Cryptography: Volume 1 (Cambridge University Press, New York, NY, USA, 2006).
Google Scholar
A Miyamoto, N Homma, T Aoki, A Satoh, Systematic design of RSA processors based on high-radix montgomery multipliers. IEEE Trans. VLSI Syst. 19(7), 1136–1146 (2011).
Article
Google Scholar
Y Yang, Z Guan, H Sun, Z Chen, in Information Security Practice and Experience. Lecture Notes in Computer Science, 9065, ed. by J Lopez, Y Wum. Accelerating RSA with fine-grained parallelism using GPU (Beijing, China, 2015), pp. 454–468.
NK Ratha, JH Connell, RM Bolle, in Proc. 3rd AVBPA. An analysis of minutiae matching strength (Halmstad, Sweden, 2001), pp. 223–228.