scispace - formally typeset
Journal ArticleDOI

Fuzzy Commitment for Function Based Signature Template Protection

Emanuele Maiorana, +1 more
- 01 Mar 2010 - 
- Vol. 17, Iss: 3, pp 249-252
TLDR
Experimental results show that the proposed protected on-line signature recognition system guarantees recognition rates comparable with those of unprotected approaches, and outperforms already proposed protection schemes for signature biometrics.
Abstract
In this paper we propose a biometric cryptosystem able to provide security and renewability to a function based on- line signature representation. A novel reliable signature traits selection procedure, along with a signature binarization algorithm, are introduced. Experimental results, evaluated on the public MCYT signature database, show that the proposed protected on-line signature recognition system guarantees recognition rates comparable with those of unprotected approaches, and outperforms already proposed protection schemes for signature biometrics.

read more

Citations
More filters
Journal ArticleDOI

Biometric template security

TL;DR: This work presents a high-level categorization of the various vulnerabilities of a biometric system and discusses countermeasures that have been proposed to address these vulnerabilities.
Journal ArticleDOI

A survey on biometric cryptosystems and cancelable biometrics

TL;DR: A comprehensive survey of biometric cryptosystems and cancelable biometrics is presented and state-of-the-art approaches are reviewed based on which an in-depth discussion and an outlook to future prospects are given.
Journal ArticleDOI

Multibiometric Cryptosystems Based on Feature-Level Fusion

TL;DR: A feature-level fusion framework to simultaneously protect multiple templates of a user as a single secure sketch based on two different databases, each containing the three most popular biometric modalities, namely, fingerprint, iris, and face.
Journal ArticleDOI

A Perspective Analysis of Handwritten Signature Technology

TL;DR: A systematic review of the last 10 years of the literature on handwritten signatures with respect to the new scenario is reported, focusing on the most promising domains of research and trying to elicit possible future research directions in this subject.
Journal ArticleDOI

Biometric Template Protection Using Universal Background Models: An Application to Online Signature

TL;DR: Experimental results show that the proposed template protection scheme can guarantee competitive recognition accuracy while providing protection to the employed biometric data.
References
More filters
Book ChapterDOI

Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

TL;DR: This work provides formal definitions and efficient secure techniques for turning biometric information into keys usable for any cryptographic application, and reliably and securely authenticating biometric data.
Proceedings ArticleDOI

A fuzzy commitment scheme

TL;DR: Because the fuzzy commitment scheme is tolerant of error, it is capable of protecting biometric data just as conventional cryptographic techniques, like hash functions, are used to protect alphanumeric passwords.
Journal ArticleDOI

Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data

TL;DR: In this article, the authors provide formal definitions and efficient secure techniques for turning noisy information into keys usable for any cryptographic application, and, in particular, reliably and securely authenticating biometric data.
Journal ArticleDOI

Biometric template security

TL;DR: This work presents a high-level categorization of the various vulnerabilities of a biometric system and discusses countermeasures that have been proposed to address these vulnerabilities.
Journal ArticleDOI

Generating Cancelable Fingerprint Templates

TL;DR: This paper demonstrates several methods to generate multiple cancelable identifiers from fingerprint images to overcome privacy concerns and concludes that feature-level cancelable biometric construction is practicable in large biometric deployments.
Related Papers (5)