A fingerprint fuzzy vault scheme using a fast chaff point generation algorithm
2013 IEEE International Conference on Signal Processing …, 2013•ieeexplore.ieee.org
Fuzzy vault is one of the most popular algorithms, which is used to protect the biometric
templates and secret key simultaneously. In the fuzzy vault scheme, the biometric features
are used to lock and unlock the secret key, which is encoded in the coefficients of a
polynomial equation. Its security depends on the infeasibility of the polynomial
reconstruction problem. Additionally, the vault performance can be enhanced by adding
more noise (chaff) points to the vault. For a real-time implementation of the bio-cryptosystem …
templates and secret key simultaneously. In the fuzzy vault scheme, the biometric features
are used to lock and unlock the secret key, which is encoded in the coefficients of a
polynomial equation. Its security depends on the infeasibility of the polynomial
reconstruction problem. Additionally, the vault performance can be enhanced by adding
more noise (chaff) points to the vault. For a real-time implementation of the bio-cryptosystem …
Fuzzy vault is one of the most popular algorithms, which is used to protect the biometric templates and secret key simultaneously. In the fuzzy vault scheme, the biometric features are used to lock and unlock the secret key, which is encoded in the coefficients of a polynomial equation. Its security depends on the infeasibility of the polynomial reconstruction problem. Additionally, the vault performance can be enhanced by adding more noise (chaff) points to the vault. For a real-time implementation of the bio-cryptosystem, as would be required in today's information security system, existing methods for chaff generation is inadequate. This paper proposed and employed a new fast chaff point generation algorithm which is less time-consuming for producing more points to improve the performance and security of fingerprint fuzzy vault scheme. Our experimental results show that the proposed algorithm achieves faster than existing algorithms and still satisfies the typical security need.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果