The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Delaunay triangulation based structures, e.g., the Delaunay triangle and Voronoi neighbor structure, have been utilized in fingerprint authentication due to their desirable features in terms of dealing with non-linear distortion and spurious and missing minutiae. However, no existing research has shed light on the effect of spurious and missing minutiae on Delaunay triangulation when it is applied...
Following the wide use of cloud services, the volume of data stored in the data center has experienced a dramatically growth which makes real-time information retrieval much more difficult than before. Furthermore, text information is usually encrypted before being outsourced to data centers in order to protect users' data privacy. Current techniques to search on encrypted data do not perform well...
The problem of recognizing an individual using minutiae of fingerprints can be considered as a point matching problem. However, several factors such as the translation, rotation and deformation of the fingerprints as well as the presence of spurious minutiae and the absence of genuine minutiae, make it difficult to find correspondent minutia-pairs. In this paper, we proposed a novel topology-based...
Bio-cryptographic systems, such as Fuzzy Vault and Fuzzy Extractor, can not only verify a person but also protect a pre-stored user feature template. Nearly all of the existing bio-cryptographic systems work in encrypted domain, and hence all biometric features should be transformed from biometric domain to encrypted domain, usually referred to the encoding and decoding process. The selection of biometric...
Biometric techniques provide a feasible solution for protecting personal information at a high security level. However, biometric features themselves demand protection. As a promising method, fuzzy extractor seamlessly binds a cryptographic key to biometric features, in order to prevent both keys and features being exposed to attackers. Some related research has been done in this area however three...
Cancelable (revocable) fingerprint templates have been proposed to protect fingerprint data. However, many of them have incurred significant authentication performance degradation. In this paper, we propose a cancelable fingerprint template design mechanism to protect fingerprint data while maintaining a satisfactory authentication performance. The proposed scheme transforms fingerprint minutiae points...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.