Feature extraction and learning approaches for cancellable biometrics: A survey

W Yang, S Wang, J Hu, X Tao… - CAAI Transactions on …, 2024 - Wiley Online Library
Biometric recognition is a widely used technology for user authentication. In the application
of this technology, biometric security and recognition accuracy are two important issues that …

Noninvertible minutia cylinder-code representation

M Ferrara, D Maltoni, R Cappelli - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Although several fingerprint template protection methods have been proposed in the
literature, the problem is still unsolved, since enforcing nonreversibility tends to produce an …

Latent fingerprint matching using descriptor-based hough transform

AA Paulino, J Feng, AK Jain - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
Identifying suspects based on impressions of fingers lifted from crime scenes (latent prints) is
a routine procedure that is extremely important to forensics and law enforcement agencies …

Cancelable fingerprint template design with randomized non-negative least squares

JB Kho, J Kim, IJ Kim, ABJ Teoh - Pattern Recognition, 2019 - Elsevier
Although biometrics is considered more competent than password-based or token-based
approach in identity management, biometric templates are vulnerable to adversary attacks …

A two-factor protection scheme for MCC fingerprint templates

M Ferrara, D Maltoni, R Cappelli - … international conference of …, 2014 - ieeexplore.ieee.org
Minutia Cylinder-Code (MCC) is an effective representation for robust and fast fingerprint
matching. To avoid that MCC templates can disclose sensitive information about position …

Design of cancelable MCC-based fingerprint templates using Dyno-key model

A Bedari, S Wang, W Yang - Pattern Recognition, 2021 - Elsevier
Abstract Minutia Cylinder Code (MCC) is an effective, high-quality representation of local
minutia structures. MCC templates demonstrate fast and excellent fingerprint matching …

An IoT-oriented privacy-preserving fingerprint authentication system

X Yin, S Wang, M Shahzad, J Hu - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Identity authentication has become an essential component for access control in the Internet
of Things (IoT) environment. To overcome the inherent weakness of password-based …

Low‐quality fingerprint classification using deep neural network

P Tertychnyi, C Ozcinar, G Anbarjafari - IET Biometrics, 2018 - Wiley Online Library
Fingerprint recognition systems mainly use minutiae points information. As shown in many
previous research works, fingerprint images do not always have good quality to be used by …

A novel Length-Flexible lightweight cancelable fingerprint template for Privacy-Preserving authentication systems in Resource-Constrained IoT applications

X Yin, S Wang, Y Zhu, J Hu - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Fingerprint authentication techniques have been employed in various Internet of Things
(IoT) applications for access control to protect private data, but raw fingerprint template …

Large-scale fingerprint identification on GPU

R Cappelli, M Ferrara, D Maltoni - Information Sciences, 2015 - Elsevier
This paper proposes a new parallel algorithm to speed up fingerprint identification using
GPUs. A careful design of the algorithm and data structures, guided by well-defined …