Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme
Citations
1,119 citations
Cites methods from "Biometrics based Asymmetric Cryptos..."
...The fuzzy vault scheme proposed by Juels and Sudan [58] has become one of the most popular approaches for biometric template protection and its implementations for fingerprint [66]–[70], face [71], iris [72] and signature [73] modalities have been proposed....
[...]
620 citations
Cites background from "Biometrics based Asymmetric Cryptos..."
...Nagar and Chaudhury [64] arrange encoded keys and biometric data of fingerprints in the same order into separate grids, which form the vault....
[...]
118 citations
Cites methods from "Biometrics based Asymmetric Cryptos..."
...A modified fuzzy vault scheme was used for designing an asymmetric cryptosystem in [141]....
[...]
...The fuzzy vault scheme proposed by Juels and Sudan [102] has become one of the most popular approaches for biometric template protection and its implementations for fingerprint [41, 42, 141, 196, 209], face [62], iris [117] and signature [68] modalities have been proposed....
[...]
103 citations
52 citations
References
[...]
1,481 citations
1,207 citations
"Biometrics based Asymmetric Cryptos..." refers background or methods in this paper
...We have tested our Modified Fuzzy Vault on fingerprint features extracted using the gabor feature based filterbank as proposed by A.K. Jain et al. [ 3 ]....
[...]
...Anil. K. Jain et al. [ 3 ] for our system but this approach is not limited to fingerprints, in fact other biometrics like iris data, face features etc can also be used with minor calibrations....
[...]
942 citations
"Biometrics based Asymmetric Cryptos..." refers methods in this paper
...Finally we propose the use of invariant features as a key to producing a hierarchical security system where the same key (fingerprint) can be used to generate encrypted messages at different levels of security....
[...]
472 citations
"Biometrics based Asymmetric Cryptos..." refers methods in this paper
...We have presented the design of a novel asymmetric cryptosystem based on biometrics having features like hierarchical group security and which eliminates the use of passwords and smart cards as opposed to earlier cryptosystems like [5, 6 ] though it requires special hardware support which is present with any other biometrics system....
[...]
297 citations
"Biometrics based Asymmetric Cryptos..." refers methods in this paper
...Finally we propose the use of invariant features as a key to producing a hierarchical security system where the same key (fingerprint) can be used to generate encrypted messages at different levels of security....
[...]