1 Efficiency and Security Optimization for Fingerprint Biometric System Thesis Submitted to Kurukshetra University For the Award of Degree Of Doctor of Philosophy In Computer Science and Applications Submitted By: Chander Kant Under the supervision of Dr. Rajender Nath Reader, Department of Computer Science & Applications Kurukshetra University, Kurukshetra Department of Computer Science & Applications Kurukshetra University, Kurukshetra 2009
164
Embed
Thesis Submitted to Kurukshetra University For the …ckverma.com/Downloads/CKThesis.pdf1 Efficiency and Security Optimization for Fingerprint Biometric System Thesis Submitted to
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
1
Efficiency and Security Optimization for
Fingerprint Biometric System Thesis Submitted to Kurukshetra University
For the Award of Degree
Of
Doctor of Philosophy In Computer Science and Applications
Submitted By:
Chander Kant
Under the supervision of
Dr. Rajender Nath Reader, Department of Computer Science & Applications
Kurukshetra University, Kurukshetra
Department of Computer Science & Applications Kurukshetra University, Kurukshetra
2009
2
CERTIFICATE
This is to certify that the thesis entitled “Efficiency and Security optimization for
Fingerprint Biometric System” submitted by Mr. Chander Kant for the award of
degree of Doctor of Philosophy in Computer Science and Applications to
Kurukshetra University, Kurukshetra is a record of bonafide research work carried
out by him under my supervision and guidance. The thesis in my opinion, worthy for
consideration for the award of Doctor of Philosophy in accordance with the
regulations of Kurukshetra University, Kurukshetra. The results embodied in this
thesis have not been submitted to any other institute or university for the award of
any degree or diploma.
(Rajender Nath) Reader, Department of Computer Science & Applications Kurukshetra University, Kurukshetra
DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONS KURUKSHETRA UNIVERSITY KURUKSHETRA
HARYANA (INDIA)
No: ____________
Dated: __________
3
No one can do everything all without someone’s help and guidance. Here I would like to mention the
name of those concerned persons, without their guidance and support I might not have been able to
complete this research work.
First of all I would like to thank my supervisor Dr. Rajender Nath, Reader, Department of Computer
Science & Applications, Kurukshetra University, Kurukshetra, for providing me the opportunity to
work under his guidance in an exciting and challenging field of research. His constant motivation,
support and infectious enthusiasm has guided me throughout my research work. I have been
privileged to work under his supervision, and I truly appreciate his help. His encouraging words
have often pushed me to put in my best possible efforts.
I express my sincere thanks to Prof. R.K. Chauhan, Chairman, Deptt. of Computer Science &
Application, Kurukshetra University, Kurukshetra for providing me computer and library facilities
in the Department. I also thank to all my colleagues in the Department for helping me directly and
indirectly.
My Special thanks goes to Sh. Layak Ram Dabbas, Inspector General, Madhuban, Karnal for
helping me acclimatize to the Forensic Science Laboratory during the research. I also thank
Inspector Sh. Ranbir Singh, Sh. Mahavir Singh and Sub Inspector Sh. Ramvir Singh, Sh. Bharat
Singh for their assistance in conducting the experimental work in the biometrics research
laboratory.
I am also thankful to Dr. Surya Kant and Dr. (Mrs.) Pragya Kant, Scientists at University of Guelph,
Canada for their help and support in the field of biometrics.
Finally, I would like to thank my parents and in-laws for their blessings and cooperation. I also
thank to my wife Sheetal Verma for her valuable suggestions during research work and my sweet
daughter Vaanya for providing cheerful environment throughout my research work.
Chander Kant
Acknowledgement
4
Table of Contents List of publications 1
List of Figures 10
List of Tables 12
Abstract 13
Chapter1. Introduction 15
1.1 Methods of Identification and Verification 17
1.2 Biometric Techniques 18
1.2.1 Physical Characteristics Based Techniques 18
1.2.2 Behavioral Characteristics Based Techniques 21
1.3 Fingerprints as Biometric Trait 24
1.3.1 Fingerprint Patterns 24
1.3.2 Minutia Points 24
1.3.3 Fingerprint Matching 25
1.4 Fingerprint Classification 26
1.4.1 Fingerprint Feature Extraction 29
1.4.2 Accuracy and Integrity of System 30
1.4.3 Types of Biometric Scanners 30
1.5 Multibiometrics 33
1.5.1 Sources of Biometric Information 33
1.5.2 Levels of Fusion 36
1.6 Soft Biometric 38
Chapter 2. Literature Survey 42
2.1 Comparison of various Biometric Technologies 61
Chander Kant
5
Chapter 3. Improving Security in Biometric Systems 67
3.1 Introduction 67
3.1.1 Threat Categorization in Biometric Security Systems 72
3.2 Securing Data using Biometric Cryptography 74
3.2.1 Problems to generate Biometric Cryptographic Key 75
3.2.2 Methods to Secure Biometric Key 76
3.2.3 Existing System: Traditional Cryptography 77
3.2.4 Proposed System: Biometric Cryptography 78
3.2.5 Enrollment / Verification Process 78
3.2.6 Biometric Encryption using other Biometric Templates 80
3.2.7 Advantages of Biometric Encryption 81
3.3 Securing Biometric Data Using Steganography 82
3.3.1 Steganographic Methods 83
3.3.2 LSB Insertion Method of Steganography 85
3.3.3 Limitations of LSB Insertion 87
3.3.4 Steganography in Biometrics 88
3.3.5 Applying Steganography in Biometrics 89
3.3.6 What happens to Pixel Value during Insertion? 91
3.4 Securing Biometric Data Using Cancelable Biometrics 93
3.4.1 Cancelable Biometrics 95
3.4.2 Proposed Work: Protection of Biometric Template 97
3.5 Summary 101
Chapter 4. Making Biometric Systems More Efficient 103
4.1 Introduction 103
6
4.2 Reducing Process-Time for Fingerprint Identification System 105
4.2.1 Henry Classification Scheme 107
4.2.2 The Proposed Method to Speed-up Fingerprint Matching Process 110
4.3 Performance Elevation of Fingerprint Verification System 116
4.3.1 Critical Factors Identified Affecting the Performance of 117 Biometric System
4.3.2 Memory Requirements for Biometric Templates 119
4.3.3 The Proposed Approach to Improve Response Time of 119 Biometric System
4.3.4 Performance Estimation for the Proposed Approach 122
4.4 Performance Improvement by using Soft Biometric Traits 123
4.4.1 The Proposed Scheme to Integrate Soft Biometrics with 127 Primary Biometrics 4.4.2 Performance Estimation of Proposed Scheme 128
4.5 Summary 130
Chapter 5. Conclusion and Future Scope 132
Bibliography 137
7
List of Publications
Publications in International Journals
1) “Improving Biometric security using Cryptography” published in
International Journal of Advance Research in Computer Engineering Vol-I Jan-
Dec 2007 PP 33-38. ISSN 0974-4320.
2) "Elevating Fingerprint Verification System", published in International
Journal of Physical Sciences. Vol. 19 (I) April 2007. PP 35-38 ISSN 0970-9150.
3) “Fingerprint As Biometric Traits: An Overview” Published in International
journal of Computer Science and knowledge Engineering Vol-I Jan-Dec 2007 PP
33-38. ISSN 0973-6735.
4) “Biometrics Security using Steganography” published in CSC online Journal
“International Journal of Security” Malashiya Vol-II Issue-I, PP 1-5 2008.
www.cscjournals.com. ISSN 1985-2320.
5) “Secure online Business: Exploring the security threats to e-commerce”
published in International journal of Intelligent Information Processing Vol-I
Jan-Dec 2007 PP 1-8. ISSN 0973-3892.
6) “Reducing Process-Time for Fingerprint Identification System” published in
“International Journals of Biometric and Bioinformatics” Malaysia Vol-III Issue–
I, 2009 PP 1-9. www.cscjournals.com ISSN 1985-2347.
7) "Soft Biometric: An Asset for Personal Recognition" published in
International Journal of Computing Science & Communication Technologies
It is obvious from the above calculation that the proposed scheme is approximately
ten times better than the existing biometric system. The system proves to be more
efficient when huge number templates are taken at input side.
4.4.3 Summary In this chapter the author has proposed three different techniques to improve the
efficiency of the biometric systems. The Henry finger print classification scheme,
which classifies the fingerprints in the database according to their relative Primary
Grouping Ratio (PGR) values has several limitations such as (i) it works only when
both palm-prints of person are available; (ii) it can not work when intruder has made
some trick while enrolling his palm-print to system, for instance, he can change the
normal order of his fingers on the sensor; (iii) a huge amount of computer memory is
required to store fingerprints of both hands. A new technique has been proposed to
address these problems.
Loops contribute 65% of the total fingerprint and they are further classified into left
loop and right loop. The remaining 35% of the total fingerprint is contributed by
whorl and arch. The proposed classifier as discussed in section 4.2.2, classifies the
input template into the four domains on the basis of left-loop, right-loop, whorl or
arch during the enrolment process in order to create the template database, which is
vertically classified into these four domains. During identification process, a
minutiae template is generated of a particular classification domain and that template
is searched in the corresponding domain of the template database thereby reducing
the response time of the biometric system. Theoretically, it has been shown that the
proposed approach is approximately forty times more efficient as compared with the
existing approaches.
131
The second approach based on hand geometry improves the performance of the
fingerprint verification system. The proposed algorithm works in two phases viz.
Phase-I and Phase-II as discussed in section 4.3.3. The algorithm proceeds to Phase-
II only when Phase-I is successful thereby reducing the processing time for rejecting
the input template. The proposed approach has been found more efficient than other
existing approaches on two accounts (i) on theoretical basis it has been shown that
the proposed approach has reduced the response time five times approximately as
compared to the existing approach; (ii) intuitively the proposed approach requires
lesser storage space as compared to multimodal based approaches.
The third approach is based on soft biometrics such as gender, height, ethnicity etc.
Though the soft biometric characteristics are not as permanent and reliable as the
traditional biometric identifiers like fingerprint, yet they can provide some
information about the identity of the user that leads to higher accuracy in establishing
the user identity. The proposed algorithm integrates soft biometrics with the primary
biometrics and works in two stages as discussed. Processing of stage II is required
only when stage I is passed successfully thereby reducing the processing time. On
theoretical basis, it has been shown that the proposed algorithm is ten times
approximately more efficient than the existing algorithm.
132
Chapter 5
Conclusion and Future Scope From system perspective, both security and privacy are open problems with no
satisfactory solutions on the horizon. In this thesis work, fundamental roadblocks for
widespread adoption of biometrics as effective and efficient means for ensuring
system integrity and system security have been explored and some solutions to these
roadblocks have been suggested. An extensive survey of the existing work in the
domain of fingerprint based biometric systems has been carried out and the
algorithms for fingerprint feature extraction, enhancement, matching, and
classification are critically analyzed. It was found that the loop holes still existed in
the biometric systems and an intelligent imposter could easily spoof these systems.
In this thesis work, three techniques to improve security and three techniques to
increase efficiency of the biometric systems have been proposed.
In the traditional cryptography the secret key is used to generate cipher text and at
the receiving end the same secret key is used to decode the message. The main
problems found in the traditional cryptographic systems are that of key entropy, key
uniqueness and key stability as discussed in section 3.2.1. In the proposed
cryptographic based approach, the biometric (secret) template replaces the secret key
to generate the cipher text and the same biometric template is used to decode the
133
message at the receiving end. Thus the proposed approach has eliminated the need to
remember complicated key sequences that could be forgotten, stolen or even guessed
thereby making the biometric system more secure.
Another proposed approach to secure the biometric system is based on
steganography. Steganography can be thought of as higher version of the
cryptography and hence its usage can further increase the integrity and security of
the biometric systems. The secret key in the proposed approach has been embedded
in the biometric template by changing the bit pattern information of individual pixel
as discussed in section 3.3.5. The algorithm has been developed for this purpose and
any security system based on this algorithm cannot be spoofed easily. The hacker
can not be able to break the system even he know both the secret templates and
secret key because he don’t know, how the key and templates are mixed with binding
algorithm.
The third proposed approach to secure biometric system is based on the concept of
cancelable biometrics. One of the most critical problems associated with the
biometric template is that if somehow biometric data is compromised then it is
compromised forever. In other words, unlike to the passwords or tokens based
security systems, another set of security (in case secret template is hacked or stolen)
cannot be issued to a person in the biometric-based systems. The proposed approach
has addressed this problem by using the cancelable biometric. Original biometric
template is distorted by using some hash function to produce new biometric template
that is used for authentication purpose. In case the secret biometric template is
hacked or stolen then a new biometric template can be generated by using some
another hash function. The original biometric template is always safe as it is never
stored anywhere and thereby increases the security of the system. Further, the
proposed approach can enhance the template security by generating a number of
templates from the single template and using them for different services.
134
The Henry finger print classification scheme [HEN, 2003], which classifies the
fingerprints in the database according to their relative Primary Grouping Ratio
(PGR) values as discussed in section 4.2.1. It has several limitations such as i) it
works only when both palm-prints of person are available ii) it can not work when
intruder has made some trick while enrolling his palm-print to system, for instance,
he can change the normal order of his fingers on the sensor; c) a huge amount of
computer memory is required to store fingerprints of both hands. A new technique
has been proposed to address these problems.
Loops contribute 65% of the total fingerprint and they are further classified into left
loop and right loop. The remaining 35% of the total fingerprint is contributed by
whorl and arch. The proposed classifier as discussed in section 4.2.2, classifies the
input template into the four domains on the basis of left-loop, right-loop, whorl or
arch during the enrolment process in order to create the template database, which is
vertically classified into these four domains. During identification process, a
minutiae template is generated of a particular classification domain and that template
is searched in the corresponding domain of the template database thereby reducing
the response time of the biometric system. Theoretically, it has been shown that the
proposed approach is approximately forty times more efficient as compared with the
existing approaches.
The author of the thesis has proposed another approach based on hand geometry to
improve the performance of the fingerprint verification system. The proposed
algorithm works in two phases viz. Phase I and Phase II as discussed in section 4.3.3.
The algorithm proceeds to Phase-II only when Phase-I is successful thereby reducing
the processing time for rejecting the input template. The proposed approach has been
135
found more efficient than other existing approaches on two accounts (i) on
theoretical basis it has been shown that the proposed approach has reduced the
response time five times approximately as compared to the existing approach; (ii)
intuitively the proposed approach requires lesser storage space as compared to
multimodel based approaches.
The third approach, which has been proposed to reduce the response time, is based
on soft biometrics. The proposed algorithm integrates soft biometrics with the
primary biometrics and works in two stages as discussed in section 4.4.1. Processing
of stage-II is required only when stage-I is passed successfully thereby reducing the
processing time. On theoretical basis, it has been shown that the proposed algorithm
is ten times approximately more efficient than the existing algorithm.
As biometric technology matures, there will be an increasing interaction among the
market, technology, and the applications. This interaction will be influenced by the
added value of the technology, user acceptance, and the credibility of the service
provider. As biometrics continues to advance scientifically and technologically, its
use and acceptability as a means of security and authorization across various sectors
will also grow. Biometrics would be a useful solution to the issue of security for
mobile banking in rural areas as only thumb impression is quite enough for money
transaction. Many biometric technology providers are already delivering biometric
authentication for a variety of web-based and client/server based applications.
Continued improvements in the technology will increase performance at a lower
cost.
Though biometric authentication is not a magical solution that solves all
authentication concerns and also it does not guarantee for 100% accuracy and
security yet it make easier and cheaper for us to use a variety of automated
136
information systems. It is too early to predict where and how biometric technology
would evolve and get embedded in which applications. But it is certain that
biometrics based identification will have a profound influence on the way we
conduct our daily business. It is also certain that, the fingerprints will remain an
integral part of the preferred biometric-based identification solutions as the most
mature and well understood biometric in the future generation.
Further a single template protection approach may not be sufficient to meet all the
application requirements. Hence, hybrid schemes that make use of the advantages of
the different template protection approaches must be developed.
137
Bibliography
[ADL 2003, 1] Adler. A, “Can images be regenerated from biometric templates?” in Biometrics Consortium Conference, (Arlington, VA), September 2003. [ADL 2003, 2] A. Adler, “Sample images can be independently restored from face recognition templates”, http://www.site.uottawa.ca/~adler/publications /2003/adler-2003-fr-templates.pdf [AIL, 2004] H. Aillisto, M. Lindholm, S. M. Makela, and E. Vildjiounaite. Unobtrusive User Identification with Light Biometrics. In Proceedings of the Third Nordic Conference on Human-Computer Interaction, pages 327–330, Tampere, Finland, October 2004.
[AND, 1996] RJ Anderson, “Stretching the Limits of Steganography”, In
Information Hiding, Springer Lecture Notes in Computer Science, vol 1174, pp 39-
48,1996.
[AND, 1996] RJ Anderson, FAP Petitcolas, “On the Limits of Steganography”, IEEE
Journal on Selected Areas in Communications, vol 16 no 4 pp 474-481, May 1998.
[ANG, 2005] R. Ang, R. Safavi-Naini and L. McAven. Cancelable key-based fingerprint templates. In ACISP, volume 3574 of LNCS, pages 242-252, 2005.
[ARA, 2007] A. Arakala, Jason Jeffers and Kathy J. Horadam. Fuzzy Extractors for Minutiae-Based Fingerprint Authentication. In International Conference on Biometrics, 2007.
[ARM, 2003] I. Armstrong. Passwords exposed: users are the weakest link available at http://www.safestone.com/downloads/news/news passwords exposed sc magazine may03.pdf, 2003. [ARU, 2002] Arun Ross,Anil Jain,James Reisman "A hybrid fingerprint matcher"in the Proceedings of the 16 th International Conference on Pattern Recognition (ICPR'02) Volume 3 - Volume 3 2002.
138
[ASH, 2008] Asha, S.; Chellappan, C. “Authentication of e-learners using multimodal biometric technology” Biometrics and Security Technologies, 2008. ISBAST 2008. International Symposium on Volume , Issue , 23-24 April 2008 Page(s):1 - 6 [BEI, 2003] American university of beirut faculty of engineering and architecture
department of electrical and computer engineering eece695c – adaptive filtering and
[BEI, 1992] T. Beier and S. Neely, “Feature-Based Image Metamorphosis,” Proceedings of SIGGRAPH, ACM, New York (1992), pp. 35–42. [BEL, 1999] BelCn Ruiz-Mezcua, D.G. Plaza, C.Fernandez, P.D.Garcia and F. Fernandez, “Biometrics verification in a real environment” Security Technology, 1999. Proceedings. IEEE 33rd Annual 1999 International Carnahan Conference. [BEN, 1999] S. Ben-Yacoub, Y. Abdeljaoued, and E. Mayoraz, “Fusion of Face and Speech Data for Person Identity Verification,” IDIAP, Martigny, Switzerland, Res. Paper IDIAP-RR 99–03, 1999. [BER, 1896] A. Bertillon, Signaletic Instructions including the theory and practice of Anthropometrical Identification, R.W McClaughry Translation, The Werner Company, 1896. [BES, 1992] P.J. Besl and N.D. McKay. A method for registration of 3-d shapes. IEEE Transactions on Pattern Analysis and Machine Intelligence, 14(2):239-256, February 1992. [BIG, 1997] E. S. Bigun, J. Bigun, B. Duc, and S. Fischer. Expert Conciliation for Multimodal Person Authentication Systems using Bayesian Statistics. In Proceedings of First International Conference on Audio- and Video-Based Biometric Person Authentication (AVBPA), pages 291–300, Crans-Montana, Switzerland, March 1997. [BIO,2001] IBG (2001). Biometrics Explained, International Biometric Group. [BIO,2003] I. Biometric Group, “The Henry Classification System.” Available at http://www.biometricgroup.com/Henry%20Fingerprint%20Classification.pdf, 2003. [BOD, 1994] A. Bodo, “Method for producing a digital signature with aid of a biometric feature”,German patent DE 42 43 90 A1, 1994.
139
[BOL, 1999] R.M. Bolle, N.K. Ratha, A. Senior, and S. Pankanti, “Minutiae template exchange format”, Proc. AutoID 1999, IEEE Workshop on Automatic Identification Advanced Technologies, pp. 74-77, 1999.
[BOU, 2006] T. Boult. Robust distance measures for face-recognition supporting revocable biometric tokens. In IEEE, 7th Intl. Conf. on Automatic Face and Gesture Recognition, pages 560-566, 2006.
[BOY, 2004] Xavier Boyen. Reusable cryptographic fuzzy extractors. In Proceedings of the 11th ACM conference on Computer and Communications Security, pages 82-91, 2004. ACM Press.
[BOY, 2005] X. Boyen, Y. Dodis, J. Katz, R. Ostrovsky and A. Smith. Secure Remote Authentication Using Biometric Data. In Eurocrypt, 2005.
[BRU, 1995] R. Brunelli and D. Falavigna, “Person identification using multiple cues,” IEEE Transactions on PAMI, vol. 12, no. 10, pp. 955–966, Oct 1995.
[BUH, 2007] Ileana Buhan, Jeroen Doumen, Pieter Hartel and Raymond Veldhuis. Feeling is Believing: a secure template exchange protocol. In International Conference on Biometrics, volume 4642 of LNCS, pages 897-906, 2007.
[BUH, 2007A] Ileana Buhan, Jeroen Doumen, Pieter Hartel and Raymond Veldhuis. Fuzzy extractors for continuous distributions. In ASIACCS, 2007.
[CAP, 2000] Cappelli. R, Erol R, Maio D, and Maltoni D, “Synthetic fingerprint-image generation,” in Proc. Int’l. Conf. Pattern Recognition (ICPR), vol. 3, pp. 475–478, (Barcelona, Spain), September 2000.
[CAM, 2008] P. Campisi, E. Maiorana and A. Neri. On-line signature based authentication: template security issues and countermeasures. In Biometrics: Theory, Methods, and Applications, N. V. Boulgouris and K.N. Plataniotis and E.Micheli-Tzanakou, editors, 2008. Wiley/IEEE
140
[CHA, 1999] V. Chatzis, A. G. Bors, and I. Pitas. Multimodal Decision-level Fusion for Person Authentication. IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans, 29(6):674–681, November 1999. [CHE, 1997] K. Chen, L. Wang, and H. Chi. Methods of Combining Multiple Classifiers with Different Features and Their Applications to Text-Independent Speaker Identification. International Journal of Pattern Recognition and Artificial Intelligence, 11(3):417–445, 1997. [CHE, 2005] Y. Chen, S. C. Dass, and A. K. Jain. Fingerprint Quality Indices for Predicting Authentication Performance. In Proceedings of Fifth International Conference on Audio and Video-Based Biometric Person Authentication (AVBPA) (To appear), New York, U.S.A., July 2005. [CHE, 2005A] Y. Chen and A. Jain. Fingerprint deformation for spoof detection. Biometric Consortium Conference, 2005, available at http://www.biometrics.org/ bc2005/program.htm.
[CHE, 2006] K.H. Cheung, A. Kong, D. Zhang, M. Kamel and J. You. Revealing the secret of FaceHashing. In Intl. Conf. on Biometrics, volume 3832 of LNCS, pages 106-112, 2006.
[CHE, 2007] H.Chen, Hongwei Sun,Kwok-Yan Lam "Key Management Using Biometrics" Proceedings of the The First International Symposium on Data, Privacy, and E-Commerce, 2007.
[CHI, 2007] Ee-Chien Chang and Sujoy Roy. Robust Extraction of Secrets Bits from Minutiae. In International Conference on Biometrics, 2007.
[CHO, 2007] Michał Chora´s "Emerging Methods of Biometrics Human Identification" in the Proceedings of the Second International Conference on Innovative Computing, Information and Control 2007.
141
[CLA,2003] Clancy, T. C., N. Kiyavash and D.J. Lin (2003). "Secure smartcard-based fingerprint authentication." Proceedings ACM SIGMM 2003 Multimedia, Biometrics Methods and Workshop: 45-52. [CON, 2002] Congress of the United States of America. Enhanced Border Security and Visa Entry Reform Act of 2002. Available at http://unitedstatesvisas.gov/pdfs/Enhanced Border SecurityandVisa Entry.pdf, 2002.
[CON, 2005] T. Connie, A. Teoh, M. Goh and D. Ngo. Palmhashing: a novel approach for cancelable biometrics. Information Processing Letters, 93:614-634, 2005.
[DAN, 2002] Daniel L. Hartl and Elizabeth W. Jones. Essential Genetics. Jones and Bartlett Publishers, 2002. [DAS, 2004] S. Dass and A. K. Jain. Fingerprint classification using orientation field curves. In Proc. Indian Conference on Computer Vision, Graphics and Image Processing, pages 650-655, 2004. [DAS, 2004A] S. C. Dass. Markov random field models for directional field and singularity extraction infingerprint images. IEEE Transactions on Image Processing, 13(10):1358-1367, October 2004. [DAS, 2005] S. C. Dass, K. Nandakumar, and A. K. Jain. A Principled Approach to Score Level Fusion in Multimodal Biometric Systems. In Proceedings of Fifth International Conferenceon Audio- and Video-based Biometric Person Authentication (AVBPA) (To appear), New York, U.S.A., July 2005. [DAU, 1993] J. G. Daugman. High confidence visual recognition of persons by a test of statistical independence. IEEE Transactions on Pattern Analysis and Machine Intelligence, 15(11):1148-1161, November 1993.
[DAU, 2004] John Daugman. How iris recognition works. IEEE Tran. Circuits and Systems for Video Technology, 14(1):21-30, 2004.
[DAV, 1998] G. I. Davida, Y. Frankel, and B. J. Matt. On enabling secure applications through online biometric identification. In Proc. 1998 IEEE Symposium on Privacy and Security, pages 148-157, 1998.
142
[DAV, 1999] G. I. Davida, Y. Frankel, B. J. Matt, and R. Peralta. On the relation of error correction and cryptography to an o²ine biometric based identification scheme. In Proc. Workshop on Coding and Cryptography (WCC), pages 129-138, 1999. [DER, 2003] R. Derakhshani, S. A. C. Schuckers, L. A. Hornak, and L. O. Gorman. Determination of vitality from a non-invasive biomedical measurement for use in fingerprint scanners. Pattern Recognition, 36(2):383-396, February 2003. [DOD, 2004] Y. Dodis, L. Reyzin, and A. Smith. Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In Proc. International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT), pages 523-540, 2004.
[DOD, 2005] Y. Dodis and A. Smith. Correcting Errors without Leaking Partial Information. In STOC, 2005.
[DOD, 2008] Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin and Adam Smith. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. SIAM Journal of Computing, 38(1):97-139, 2008.
[DRA, 2007] Stark C. Draper, Ashish Khistiy, Emin Martinianz, Anthony Vetro and Jonathan S. Yedidia. Secure Storage of Fingerprint Biometrics Using Slepian-Wolf Codes. In Information Theory and Applications Workshop, January 2007.
[DUD, 2001] R. O. Duda, P. E. Hart, and D. G. Stork. Pattern Classification. Wiley, New York, Second edition, 2001. [DUD, 2001A] R. Duda, P. Hart, and D. Stork. Pattern Classification. John Wiley & Sons, 2001. [EGG, 2002] Eggers . J.J, Bauml. R, Grid .B , “A Communication Approach to Image Steganography”, Proceedings of SPIE vol 4675, Jan 2002, Security and Watermarking of Multimedia Contents IV, San Jose, Callifornia. [ELL, 2007] Elliott, S.J.; Massie, S.A.; Sutton, M.J. “The Perception of Biometric Technology: A Survey” Automatic Identification Advanced Technologies, 2007 IEEE Workshop on Volume , Issue , 7-8 June 2007 Page(s):259 - 264
143
[FEN, 2003] Hao Feng and Chan Choong Wah. Online signature verification using a new extreme points warping technique. Pattern Recognition Letters, 24:2943–2951, 2003. [FER, 2002] L. C. Ferri, A. Mayerhofer, M. Frank, C. Vielhauer, and R. Steinmetz, “Biometric authentication for ID cards with hologram watermarks,” in Proc. SPIE, Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 629–640, (Bellingham, WA), January 2002. [FIE,2005] J. Fierrez-Aguilar, L. Nanni, J. Lopez-Penalba, J. Ortega-Garcia, and D. Maltoni. An on-line signature verification system based of fusion of local and global information. to appear in AVBPA, 2005. [FRA, 1996] E Franz, A Jerichow, S Moller, A Pfitzmann, I Stierand, “Computer
Based Steganography”, Information Hiding, Springer Lecture Notes in Computer
Science vol 1174 ,pp 7-21,1996.
[GIV, 2003] G. Givens, J. R. Beveridge, B. A. Draper, and D. Bolme. A Statistical Assessment of Subject Factors in the PCA Recognition of Human Subjects. In Proceedings of CVPR Workshop: Statistical Analysis in Computer Vision, June 2003. [GOL, 1997] M. Golfarelli, D. Maio, and D. Maltoni. On the Error-Reject Tradeoff in Biometric Verification Systems. IEEE Transactions on Pattern Analysis and Machine Intelligence, 19(7):786–796, July 1997. [GOR, 2003] O. Gorman “Comparing Passwords, Tokens, and Biometrics for User Authentication states” PROCEEDINGS OF THE IEEE, VOL. 91, NO. 12, DECEMBER 2003. [GRI, 2000] F. Griess. On-line signature verification. Master’s thesis, Michigan State University, 2000. [GUN, 2002] B. Gunsel, U. Uludag, and A. M. Tekalp. Robust watermarking fingerprint images. Pattern Recognition, 35(12):2739-2747, December 2002. [GUN, 2003] B. Gunsel, S. Sener, and Y. Yaslan. An adaptive encoder for audio watermarking. WSEAS Transactions on Computers, 2(4):1044-1048, October 2003.
144
[GUT, 2000] S. Gutta, J. R. J. Huang, P. Jonathon, and H. Wechsler, “Mixture of
Experts for Classification of Gender, Ethnic Origin, and Pose of Human Faces,”
IEEE Transactions on Neural Networks 11, pp. 948–960, July 2000.
[GUV, 2003] A. Güven, �. So�ukpınar, “Undestanding users’ keystroke patterns for computer access security”, Journal of Computers & Security, Vol 22, No 8, pp 695-706, 2003. [HAM, 1986] F. R. Hampel, P. J. Rousseeuw, E. M. Ronchetti, and W. A. Stahel. Robust Statistics: The Approach Based on Influence Functions. John Wiley & Sons, 1986. [HAN, 2000] S. Hangai, S. Yamanaka, and T. Hamamoto. Writer verification using altitude and direction of pen movement. Proceedings of the International Conference on Pattern Recognition, 3:483–486, 2000.
[HAO, 2002] F. Hao and C.W. Chan. Private key generation from on-line handwritten signatures. Information Management and Computer Security, 10(2):2002.
[HAO, 2005] Feng Hao, Ross Anderson and John Daugman. Combining cryptography with biometrics effectively. University of Cambridge Technical Report UCAM-CL-TR-640. 2005.
[HAO, 2006] Feng Hao, Ross Anderson and John Daugman. Combining crypto with biometrics effectively. IEEE Transactions on Computers, 55(9):1081-1088, 2006.
[HAR, 1999] F. Hartung and M. Kutter. Multimedia watermarking techniques. Proceedings of the IEEE, 87(7):1079-1107, July 1999. [HAY, 2002] J. Hayashi, M. Yasumoto, H. Ito, and H. Koshimizu. Age and Gender Estimation based on Wrinkle Texture and Color of Facial Images. In Proceedings of the Sixteenth International Conference on Pattern Recognition, pages 405–408, Quebec City, Canada, August 2002. [HEC, 1997] D. D. Heckathorn, R. S. Broadhead, and B. Sergeyev. A Methodology for Reducing Respondent Duplication and Impersonation in Samples of Hidden
[HIS, 1977] N. M. Herbst and C. N. Liu. Automatic signature verification based on accelerometry. IBM Journal Of Research And Development, 21:245–253, 1977. [HIL, 2001] C. J. Hill. Risk of masquerade arising from the storage of biometrics. Available at http://chris.fornax.net/biometrics.html, 2001. [HOL, 1994] T. K. Hol, J. J. Hull, and S. N. Srihari. Decision Combination in Multiple Classifier Systems. IEEE Transactions on Pattern Analysis and Machine Intelligence, 16(1):66–75, January 1994. [HON, 1998] L. Hong and A. K. Jain, “Integrating faces and fingerprints for
personal identification,” IEEE Trans. Pattern Anal. Machine Intell, vol. 20, pp.
1295–1307, Dec. 1998.
[HON, 1998A] L. Hong, Automatic Personal Identification Using Fingerprints, PhD
Thesis, Michigan State University, 1998
[HON, 1999] L. Hong, A. K. Jain, and S. Pankanti. Can Multibiometrics Improve Performance? In Proceedings of IEEE Workshop on Automatic Identification Advanced Technologies, pages 59–64, New Jersey, U.S.A., October 1999. [HRE, 1990] A. K. Hrechak and J. A. McHugh, Automated Fingerprint Recognition
using Structural Matching, Pattern Recognition, Vol. 23, No. 8, 1990.
[IND, 2003] M. Indovina, U. Uludag, R. Snelick, A. Mink, and A. K. Jain. Multimodal Biometric Authentication Methods: A COTS Approach. In Proceedings of Workshop on Multimodal User Authentication, pages 99–106, Santa Barbara, USA, December 2003. [IYE, 1995] S. S. Iyengar, L. Prasad, and H. Min. Advances in Distributed Sensor Technology. Prentice Hall, 1995.
146
[JAI, 1997] A. K. Jain, L. Hong, S. Pankanti, and R. Bolle. An identity authentication system using fingerprints. Proceedings of the IEEE, 85(9):1365-1388, September 1997. [JAI, 1998] A. K. Jain, R. Bolle, S. Pankanti (eds), Biometrics: Personal Identification in Networked Society, Kluwer Academic, December 1998. [JAI, 1999] A. K. Jain, A. Ross, and S. Pankanti, “A prototype hand geometry-based verification system,” in Proceedings AVBPA’99, Washington, D.C., USA, March 1999, pp. 166–171. [JAI, 1999A] Jain A.K, Bolle. R, and Pankanti .S, eds., Biometrics: Personal Identification in Networked Society. Kluwer Academic Publishers, 1999. [JAI, 1999B] Jain, L.C. et al. (Eds.). 1999. ‘’Intelligent Biometric Techniques in Fingerprint and Face Recognition.’’ Boca Raton, FL: CRC Press. [JAI, 2001] A. K. Jain, A. Ross, and S. Prabhakar, “Fingerprint Matching Using Minutiae and Texture Features”, to appear in the International Conference on Image Processing (ICIP), Greece, October 7-10, 2001. [JAI, 2002] A. Jain and A. Ross. Learning user-specific parameters in a multibiometric system. Proceedings of the International Conference on Image Processing, pages 57–60, 2002. [JAI, 2002A] A. K. Jain, Friederike D. Griess, and Scott D. Connell. On-line Signature Verification. Pattern Recognition, 35(12):2963–2972, December 2002. [JAI, 2003] A. K. Jain and U. Uludag. Hiding biometric data. IEEE Transactions on Pattern Analysis and Machine Intelligence, 25(11):1494-1498, November 2003. [JAI, 2004] Jain, A. K.; Ross, Arun; Prabhakar, Salil (January 2004), "An
introduction to biometric recognition", IEEE Transactions on Circuits and Systems
Fingerprints, and Soft Biometric Traits for User Recognition. Proceedings of
Biometric Authentication Workshop, LNCS 3087, pp. 259-269, Prague, May 2004
[JAI, 2004C] Anil Jain Sharath Pankanti, Fingerprint Classification and Matching 2004. [JAI, 2004D] Anil K. Jain, Sharath Pankanti, Salil Prabhakar, Lin Hong, and Arun Ross “Biometrics: A Grand Challenge” 0-7695-2128-2/04 $20.00 (C) 2004 IEEE [JAI, 2003] A. K. Jain and A. Ross. Information fusion in biometrics. Pattern Recognition Letters, 24(13):2115–2125, September 2003. [JAI, 2004] A. K. Jain and A. Ross. Multibiometric systems. Communications of the ACM, 47(1):34–40, January 2004. Special Issue on Multimodal Interfaces. [JAI, 2004A] Jain, A.K., Dass, S.C., Nandakumar, K.: Can soft biometric traits assist user recognition? In: Proceedings of SPIE International Symposium on Defense and Security: Biometric Technology for Human Identification (To appear). (2004) [JAI, 2005] A. K. Jain, K. Nandakumar, and A. Ross. Score normalization in multimodal biometric systems. to appear in Pattern Recognition, 2005. [JAI, 2005A] Jain A.K, Ross Arun and Uludag.U. “Biometrics Template security: Challenges and solutions” in Proc. of European Signal Processing Conference September 2005. [JAI 2006] Jain A.K, Ross A, and Pankanti S.. Biometrics: A Tool for Information Security. IEEE transactions on information forensics and security, vol. 1, No. 2, June 2006, pp. 125–143. [JEL, 1997] F. Jelinek. Statistical Methods for Speech Recognition. MIT Press, Cambridge MA, 1997. [JOH, 1998] Johnson N.F, Jajodia Sushil, “Steganalysis of Images Created Using Current Steganography Software”, Lecture Notes in Computer Science, vol 1525, 1998, Springer-Verlag.
148
[JUE, 2002] A. Juels and M. Sudan. A fuzzy vault scheme. In A. Lapidoth and E. Teletar, editors, Proc. IEEE International Symposium on Information Theory, page 408, 2002.
[JUE, 2003] Ari Juels and Madhu Sudan. A Fuzzy Vault Scheme. In IEEE Intl. Symp. on Information Theory, 2002.
[JUE, 2005] Ari Juels, David Molnar, and David Wagner. Security and Privacy Issues in E-passports. In Security and Privacy for Emerging Areas in Communications Networks, pages 74-88, September 2005.
[KAM, 2001] M. Kam, K. Gummadidala, G. Fielding, and R. Conn. Signature authentication by forensic document examiners. Journal of Forensic Sciences, 46:884–888, 2001. [KAN, 2003] A. Kanak, E. Erzin, Y. Yemez, A. M. Tekalp, “Joint Audio-Video
processing for biometric speaker identification”, Proc. Of the Int. Conf. On
Acoustics, Speech and signal Processing 2003, ICASSP 2003, vol II, pp. 377-380,
2003.
[KAN, 2006] Chander Kant, Rajender Nath "Off-line Optical Frustrated Total
Internal Reflection" Published in the proceedings of National Seminar on
“Information and Communication Technology- Recent Advances & Applications
ICT-2006 PP 237-240 Feb 09-11, 2006 at JMIT, Radaur Yamuna Nagar.
[KAN, 2007] Chander Kant, Rajender Nath “Improving Biometric security using
Cryptography” published in International Journal of Advance Research in Computer
Rajender Nath "Challenges in Biometrics" published in International Conference on
Emerging trends in Computer Sc. & IT April 23, 2008 at AL-FALAH School of
Engineering & Tech, Faridabad PP 69-77.
[KAN, 2008C] Chander Kant, Sukhdev Singh “Role of Biometrics in Modern
Business” published in National seminar on "Emerging Challenges in Commerce and
Management", Govt. College for Women, KARNAL 18-19 March, 2008.
[KAN, 2009] Chander Kant, Rajender Nath “Reducing Process-Time for Fingerprint
Identification System” published in “International Journals of Biometric and
Bioinformatics” Malaysia Vol-III Issue–I, 2009 PP 1-9. www.cscjournals.com ISSN
1985-2347.
[KAN, 2009A] Chander Kant, Rajender Nath "Soft Biometric: An Asset for
Personal Recognition" published in International Journal of Computing Science &
Communication Technologies [IJCSCT]. Vol-I, Issue-II, 2009 PP 160-163. ISSN -
0974-3375.
151
[KAN, 2009B] Chander Kant, Rajender Nath "Protection of Database Template
using Cancelable Biometric" published in IEEE-International advance computing
conference 6-7 March 2009, Thapar University, Patiala.
[KEL, 2007] E.J.C Kelkboom, B. G\"okberk, T.A.M. Kevenaar, A.H.M. Akkermans and M. van der Veen. "3D Face": Biometric Template Protection for 3D Face Recognition. In International Conference on Biometrics, volume 4642 of LNCS, pages 566-573, 2007.
[KEV, 2005] T.A.M. Kevenaar, G.J. Schrijen, M. Van der Veen, A.H.M. Akkermans and F. Zuo. Face recognition with renewable and privacy preserving binary templates. Fourth IEEE Workshop on Automatic Identification Advanced Technologies, 21-26, 2005.
[KHO, 2004] A. Kholmatov and B. Yanikoglu. Biometric authentication using online signatures. ISCIS, 3280:373–380, 2004. [KHO, 2003] Alisher Kholmatov. Biometric identity verification using on-line & off-line signature verification. Master’s thesis, Sabanci University, 2003.
[KHO, 2008] Alisher Kholmatov and Berrin Yanikoglu. Realization of correlation attack against fuzzy vault scheme. In Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, volume 6819 of Proceedings of SPIE, 2008.
[KIT, 1998] J. Kittler, M. Hatef, R. P. Duin, and J. G. Matas. On Combining Classifiers. IEEE Transactions on Pattern Analysis and Machine Intelligence, 20(3):226–239, March 1998.
[KON, 2006] A. Kong, K-H. Cheung, D. Zhang, M. Kamel and J. You. An analysis of BioHashing and its variants. Pattern Recognition, 39(7):1359-1368, 2006.
[KUM, 2003] A. Kumar, D. C. M. Wong, H. C. Shen, and A. K. Jain. Personal Verification Using palm-print and Hand Geometry Biometric. In Proceedings of Fourth International Conference on Audio- and Video-Based Biometric Person Authentication (AVBPA), pages 668–678, Guildford, U.K., June 2003.
152
[KUN, 2001] L. I. Kuncheva, C. J. Whitaker, C. A. Shipp, and R. P. W. Duin, “Is independence good for combining classifiers?,” in Proceedings ICPR, Barcelona, Spain, 2001, vol. 2, pp. 168–171. [KUT, 1997] M. Kutter, F. Jordan, and F. Bossen. Digital signature of color images using amplitude modulation. In Proc. SPIE, Storage and Retrieval for Image and Video Databases V, vol. 3022, pages 518-526, 1997. [KWO, 1994] Y. H. Kwon and N. V. Lobo. Age Classification from Facial Images. In Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, pages 762–767, April 1994. [LAM, 1989] Chan F. Lam and David Kamins. Signature recognition through spectral analysis. Pattern Recognition, 22:39–44, 1989. [LAM, 1995] L. Lam and C. Y. Suen. Optimal Combination of Pattern Classifiers. Pattern Recognition Letters, 16:945–954, 1995. L. Xu, A. Krzyzak, and C. Y. Suen. Methods for Combining Multiple Classifiers and their Applications to Handwriting Recognition. IEEE Transactions on Systems, Man, and Cybernetics, 22(3):418–435, 1992. [LAM, 1997] L. Lam and C. Y. Suen. Application of Majority Voting to Pattern Recognition: An Analysis of Its Behavior and Performance. IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans, 27(5):553–568, 1997. [LAN, 2004] A. Lanitis, C. Draganova, and C. Christodoulou. Comparing Different Classifiers for Automatic Age Estimation. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 34(1):621–628, February 2004. [LEE, 1991] H. C. Lee and R. E. Gaensslen, Advances in Fingerprint Technology, Elsevier, New York, 1991. [LEE, 1996] Luan Ling Lee. Neural approaches for human signature verification. Proceedings of the Third International Conference on Signal Processing, pages 1346–1349, 1996. [LEE, 1999] Yeuan-Kuen Lee, Ling-Hwei Chen, “An Adaptive Image
Steganographic Model Based on Minimum-Error LSB Replacement”, Proceedings of
9th National Conference on Information Security, Taichung, Taiwan, pp 8-15 ,May
Steganographic Model”,10th National Conference on Information Security, Hualien,
Taiwan, pp 275-284, May 2000.
[LIE, 2008] Qiming Lie, Muchuan Guo and Ee-Chien Chang. Fuzzy Extractors for Asymmetric Biometric Representations. In IEEE Computer Society Workshop on Biometrics, June 2008. [LIN, 1999] E. T. Lin and E. J. Delp. A review of fragile image watermarks. In Proc. ACM Multimedia and Security Workshop, pages 25-29, 1999. [LIN, 2003] Linnartz, J. a. P. T. (2003). "New shielding functions to enhance privacy and prevent misuse of biometric templates." Proceedings of the 4th International Conference on Audio and Video Based Person Authentication: 393-402. [LIN, 2004] S. Lin and D. J. Costello. Error Control Coding. Pearson Prentice Hall, New Jersey, Second edition, 2004. [LIU, 1979] C. N. Liu, N. M. Herbst, and N. J. Anthony. Automatic signature verification: System description and field test results. IEEE Transactions on Systems, Man, and Cybernetics, 9:35–38, 1979.
[LUM, 2007] A. Lumini and L. Nanni. An improved BioHashing for human authentication. Pattern Recognition, 40(3):1057-1065, March 2007.
[LUX, 2004] X. Luxer and A. K. Jain. Ethnicity Identification from Face Images. In Proceedings of SPIE Conference on Biometric Technology for Human Identification, volume 5404, pages 114–123, April 2004. [MAD, 2008] Madhuban Manuals, Forensic Science Laboratory, Karnal, 2008.
[MAI, 2002] D. Maio, D. Maltoni, R. Cappelli, J. L. Wayman, and A. K. Jain,
“FVC2002: Fingerprint verification competition,” in Proc. Int. Conf. Pattern
Recognition (ICPR), Quebec City, QC, Canada, Aug. 2002, pp. 744–747.
154
[MAI, 2002A] D. Maio, D. Maltoni, R. Cappelli, J. L. Wayman, and A. K. Jain. FVC2002: Second Fingerprint Verification Competition. In Proc. International Conference on Pattern Recognition, pages 811-814, 2002. [MAI, 2004] D. Maio, D. Maltoni, R. Cappelli, J. L. Wayman, and A. K. Jain. FVC2004: Third Fingerprint Verification Competition. In Proc. International Conference on Biometric Authentication (ICBA), pages 1-7, 2004.
[MAI, 2007] E. Maiorana, P. Campisi and A. Neri. Biometric Signature Authentication Using Radon Transform-Based Watermarking Techniques. In Biometric Symposium, 2007.
[MAI, 2008] E. Maiorana, P. Campisi and A. Neri. User Adaptive Fuzzy Commitment for Signature Templates Protection and Renewability. In SPIE Journal of Electronic Imaging, Special Section on Biometrics: Advances in Security, Usability and Interoperability, 2008.
[MAL, 2003] Maltoni D, Maio. D., Jain A.K, and Prabhakar. S, Handbook of Fingerprint Recognition. Springer- Verlag, 2003. [MAN, 2001] R. Manmatha, T. Rath, and F. Feng. Modeling Score Distributions for Combining the Outputs of Search Engines. In Proceedings of Twenty-Fourth International ACM SIGIR Conference on Research and Development in Information Retrieval, pages 267–275, New Orleans, USA, 2001.
[MAR, 2005] Emin Martinian, Sergey Yekhanin and Jonathan S. Yedidia. Secure Biometrics Via Syndromes. In 43rd Annual Allerton Conference on Communications, Control, and Computing, Monticello, IL, October 2005.
[MAT, 2002] T. Matsumoto, H. Matsumoto, K. Yamada, and S. Hoshino. Impact of artificial gummy fingers onfingerprint systems. In Proc. of SPIE, Optical Security and Counterfeit Deterrence Techniques IV, vol. 4677, pages 275-289, 2002. [MEM, 1998] N. Memon and P. W. Wong. Protecting digital media content. Communications of the ACM, 41(7):34-43, July 1998. [MES, 1999] K. Messer, J. Matas, J. Kittler, J. Luettin, and G. Maitre. XM2VTSDB: The Extended M2VTS Database. In Proceedings of Second International Conference on Audio- and Video-Based Biometric Person Authentication (AVBPA), pages 72–77, Washington D.C., U.S.A., March 1999.
155
[MIL,2002] Paul Miller. Analyzing genetic discrimination in the workplace. Human Genome News, 12(1-2), February 2002. [MOG, 2002] B. Moghaddam and M. H. Yang. Learning Gender with Support Faces. IEEE Transactions on Pattern Analysis and Machine Intelligence, 24(5):707–711, May 2002. [MON, 1977] F. Mosteller and J. W. Tukey. Data Analysis and Regression: A Second Course in Statistics. Addison-Wesley, 1977. [MON, 2001] M. Montague and J. A. Aslam. Relevance Score Normalization for Metasearch. In Proceedings of Tenth International Conference on Information and Knowledge Management, pages 427–433, Atlanta, USA, November 2001. [MON, 2001A] F. Monrose, M. K. Reiter, Q. Li, S. Wetzel, “Using voice to generate cryptographic keys: A position paper”, Proc. Of Odyssey 2001, The Speaer Verification Worshop, June 2001. [MON, 2001B] F. Monrose, M. K. Reiter, Q. Li, and S. Wetzel. Cryptographic key generation from voice. In Proc. IEEE Symposium on Security and Privacy, pages 202-213, 2001. [MON, 2002] F. Monrose, M. K. Reiter, Q. Li, D. P. Lopresti, and C. Shih. Towards speech generated cryptographic keys on resource constrained devices. In Proc. 11th USENIX Security Symposium, pages 283-296, 2002. [MOO, 2004] Y. S. Moon, H.W. Yeung, K. C. Chan, and S. O. Chan. Template Synthesis and Image Mosaicking for Fingerprint Registration:An Experimental Study. In Proceedings of International Conference on Acoustic Speech and Signal Processing (ICASSP), volume 5, pages 409–412, Quebec, Canada, May 2004. [NAG 2006] Nagar A, Chaudhury S. Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme. 18th International Conference on Pattern Recognition (ICPR‘06), 2006. ICPR (4) 2006: pp. 537-540.
[NAN, 2007] Karthik Nandakumar, Anil K. Jain and Sharath C. Pankanti. Fingerprint-Based Fuzzy Vault: Implementation and Performance. IEEE Transactions on Information Forensics and Security, 2(4):744-757, 2007.
[NAN, 2008] Karthik Nandakumar, Yi Chen, Sarat C. Dass and Anil K. Jain. Likelihood Ratio Based Biometric Score Fusion. IEEE Transactions on Pattern Analysis and Machine Intelligence, 30(2):2008.
156
[NEI, 1998] Neil F. Johnson, Sushil Jajodia, “Steganalysis of Images Created Using Current Steganography Software”, Lecture Notes in Computer Science, vol 1525, 1998, Springer-Verlag. [PAN, 1999] S. Pankanti and M.M. Yeung, “Verification watermarks on fingerprint recognition and retrieval”, Proc. SPIE EI, vol. 3657, pp. 66-78, 1999. [PEY, 1999] M. Peyravian, S. M. Matyas, A. Roginsky, N. Zunic, “Generating user-based Cryptographic keys and random numbers”, Journal of Computers & Security, Vol 18, No 7, pp 619-626, 1999. [PHI, 2002] P. J. Philips, P. Grother, R. J. Micheals, D. M. Blackburn, E. Tabassi, and J. M. Bone. FRVT2002: Overview and Summary. Available at http://www.frvt.org/FRVT2002/documents.htm. [PLA, 1989] Rejean Plamondon and Guy Lorette. Automatic signature verification and writer identification the state of the art. Pattern Recognition, 22:107–131, 1989. [PRA, 2002] S. Prabhakar and A. K. Jain. Decision-level Fusion in Fingerprint Verification. Pattern Recognition, 35(4):861–874, 2002. [PRA, 2003] S. Prabhakar, S. Pankanti, and A.K. Jain. Biometric recognition: Security & privacy concerns. IEEE Security & Privacy Magazine, 1(2):33–42, March-April 2003. [PUT, 2000] T. Putte and J. Keuning, “Biometrical fingerprint recognition: don’t get your fingers burned”, Proc. IFIP TC8/WG8.8, Fourth Working Conf. Smart Card Research and Adv. App., pp. 289-303, 2000. [RAT, 2000] N. K. Ratha, J. H. Connell, and R. M. Bolle. Secure data hiding in wavelet compressed fingerprint images. In Proc. ACM Multimedia, pages 127-130, 2000. [RAT, 2001] Ratha N, Connell J.H, and Bolle R.M, “An analysis of minutiae matching strength,” in Proc. Audio and Video-based Biometric Person Authentication (AVBPA), pp. 223–228, (Halmstad, Sweden), June 2001. [RAT, 2001A] N. Ratha, J. Connell, and R. bolle, “Enhancing security and privacy in biometrics-based authentication systems,” IBM Systems Journal, vol. 40, no. 3, pp. 614– 634, 2001.
157
[RAT, 2006] N. K. Ratha, J. Connell, R. M. Bolle, and S. Chikkerur: Cancelable
Biometrics: A Case Study in Fingerprints. Proceedings of the 18th International
Conference on Pattern Recognition (ICPR 2006), 20-24 August 2006, Hong Kong,
China. ICPR (4) 2006: 370-373.
[RAT, 2007] Nalini K. Ratha, Sharat Chikkerur, Jonathan H. Connell and Ruud M. Bolle. Generating Cancelable Fingerprint Templates. IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(4):561-572, 2007.
[REI, 2006] R.S. Reillo Judith Liu-Jimenez Michael G. Lorenz Luis Entrena “Improvement in Security Evaluation of Biometric Systems” appears in: Carnahan Conferences Security Technology, Proceedings 2006 40th Annual IEEE International Publication Date: Oct. 2006. [REY, 2005] D. A. Reynolds, W. Campbell, T. Gleason, C. Quillen, D. Sturim, P. Torres- Carrasquillo, and A. Adami. The 2004 MIT Lincoln Laboratory Speaker Recognition System. In Proceedings of IEEE International Conference on Acoustics, Speech, and Signal Processing, Philadelphia, PA, March 2005. [REY, 1996] D. Reynolds. The effect of handset variability on speaker recognition performance: Experiments on the switchboard corpus. Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, 1:113–116, 1996. [ROG, 2004] Roginsky, A. (2004). A New Method for Generating RSA Keys, International Business Machines Consulting Group. [ROS, 2002] A. Ross and A. K. Jain. Fingerprint Mosaicking. In Proceedings of International Conference on Acoustic Speech and Signal Processing (ICASSP), pages 4064–4067, Florida, U.S.A., May 2002. [ROS, 2003] A. Ross and A. K. Jain. Information Fusion in Biometrics. Pattern Recognition Letters, Special Issue on Multimodal Biometrics, 24(13):2115–2125, 2003.
158
[ROS, 2004] A. Ross and Anil Jain “Biometric Sensor Interoperability: A Case
Study In Fingerprints”, Appeared in Proc. of International ECCV Workshop on
Biometric Authentication (BioAW), May 2004
[ROS, 2004A] A. Ross and A. Jain. Multimodal biometrics: An overview. Proceedings of the 12th European Signal Processing Conference, pages 1221–1224, 2004. [ROS, 2005] Ross. A, Shah J, and Jain A.K, “Towards reconstructing fingerprints from minutiae points,” in Proc. SPIE, Biometric Technology for Human Identification II, vol. 5779, pp. 68–80, (Orlando, FL), March 2005. [ROS, 2005A] A. Ross and R. Govin darajan. Feature Level Fusion Using Hand and Face Biometrics. In Proceedings of of SPIE Conference on Biometric Technology for Human Identification,volume 5779, pages 196–204, Florida, U.S.A., March 2005. [ROS, 2006] A. Ross, J. Shah, and A. K. Jain. Generating fingerprints from minutiae using streamlines. In IEEE Computer Society Conference on Computer Vision and Pattern Recognition (submitted), 2006. [RUG, 1996] Comparison Of Biometric Techniques Prepared By Thomas Ruggles.
[SAV, 2004] M. Savvides, B. Vijaya Kumar and P.K. Khosla. Cancelable biometric filters for face recognition. In Proceedings of the 17th International Conference on Pattern Recognition, ICPR 2004, volume 3. pages 922-925, 2004.
[SAN, 2002] C. Sanderson and K. K. Paliwal. Information Fusion and Person Verification using speech and face information. Research Paper IDIAP-RR 02-33, IDIAP, September 2002. [SCH, 1994] RG van Schyndel, AZ Tirkel, CF Osborne, “A Digital Watermark”,
IEEE International Conference on Image Processing, vol 2 , pp 86-90, Nov 1994.
[SCH, 1999] B. Schneier. The uses and abuses of biometrics. Communications of the ACM, 42(8):136, August 1999.
159
[SCH, 2007] Walter J. Scheirer and Terrance E. Boult. Cracking Fuzzy Vaults and Biometric Encryption. In Biometrics Symposium, 2007.
[SHA, 2002] G.C. Sharp, S.W. Lee, and D.K. Wehe. ICP registration using invariant features. IEEE Transactions on Pattern Analysis and Machine Intelligence, 24(1):90-102, January 2002. [SHA, 2002A] G. Shakhnarovich, P. Viola, and B Moghaddam. A Unified Learning Framework for Real Time Face Detection and Classification. In Proceedings of International Conference on Automatic Face and Gesture Recognition, Washington D.C., USA, May 2002.
[SHA, 2002B] Ronen Shaltiel. Recent Developments in Explicit Constructions of Extractors. Bulletin of the {EATCS}, 77:67-95, 2002.
[SHA, 2008] Shaikh, S.A.; Dimitriadis, C.K. “My fingers are all mine: Five reasons why using biometrics may not be a good idea” Biometrics and Security Technologies, 2008. ISBAST 2008. International Symposium on Volume, Issue, 23-24 April 2008 Page(s):1-5
[SHE, 2005] Shenglin Yang and Ingrid Verbauwhede. Automatic Secure Fingerprint Verification System Based on Fuzzy Vault Scheme. In IEEE Intl. Conf. on Acoustics, Speech, and Signal Processing (ICASSP), pages 609-612, 2005.
[SIM, 1983] GJ Simmons, “The Prisoners’ Problem and the Subliminal Channel”,
Proceedings of Crypto’83, Plenum Press, pp 51-67,1983.
[SIN, 2004] Parvinder Singh, Sudhir Batra, H R Sharma, "Message Hidden in 6th and 7th Bit", Proceedings of International Conference on Controls, Automation and Communication System, Dec. 22-24, 2004, Allied Publishers, ISBN- 81-7764-726-1, pp-281-284 [SIN, 2005] Singh P., Batra Sudhir, Sharma H.R., “Evaluating the Performance of Message Hidden in 1st and 2nd Bit Plane”, WSEAS Transactions on Information Science and Applications”, issue 8, vol 2, Aug 2005, pp 1220-1227. [SNE, 2003] R. Snelick, M. Indovina, J. Yen, and A. Mink. Multimodal Biometrics: Issues in Design and Testing. In Proceedings of Fifth International Conference on Multimodal Interfaces, pages 68–72, Vancouver, Canada, November 2003
160
[SNE, 2005] R. Snelick, U. Uludag, A. Mink, M. Indovina, and A. K. Jain. Large Scale Evaluation of Multimodal Biometric Authentication Using State-of-the-Art Systems. IEEE Transactions on Pattern Analysis and Machine Intelligence, 27(3):450–455, March 2005. [SNE, 2005] R. Snelick, U. Uludag, A. Mink, M. Indovina, and A. K. Jain. Large-scale evaluation of multimodal biometric authentication using state-of-the-art systems. IEEE Transactions on Pattern Analysis and Machine Intelligence, 27(3):450-455, March 2005. [SOU, 1998] C. Soutar, D. Roberge, S. A. Stojanov, R. Gilroy, and B. V. K. Vijaya Kumar. Biometric encryption - enrollment and verification procedures. In Proc. SPIE, Optical Pattern Recognition IX, vol. 3386, pages 24-35, 1998. [SOU, 1998 A] C. Soutar, D. Roberge, A. Stoianov, R. Gilroy and B.V.K. V. Kumar, “BiometricEncryption� using image processing”, Proc. SPIE 3314, 178-188, 1998. [STA, 20043] W. Stallings. Cryptography and Network Security: Principles and Practices. Prentice Hall, New York, Third edition, 2003.
[SUT, 2007] Yagiz Sutcu, Qiming Li and Nasir Memon. Protecting Biometric Templates with Sketch: Theory and Practice. IEEE Transactions on Information Forensics and Security, 2(3):503-512, 2007.
[SUT, 2007A] Yagiz Sutcu, Husrev Taha Sencar and Nasir Memon. A Geometric Transformation to Protect Minutiae-Based Fingerprint Templates. In SPIE International Defense and Security Symposium, 2007.
[SWA, 2005] Danuwat Swangpol and Thanarat ChalidabhongseAutomatic Person Identification using Multiple Cues, June 2-5, KINTEX, Gyeonggi-Do, Korea 2005.
[TAN, 2006] Tanya Ignatenko and Frans Willems. On the security of the xor-method in biometric authentication systems. In International Symposium on Information Theory, pages 197-204, 2006.
[TEO, 2004] A.B.J. Teoh, D.C.L. Ngo and A. Goh. Personalised Cryptographic key generation based on FaceHashing. Computers and Security, 23:606-614, 2004.
161
[TEO, 2005] Andrew B.J. Teoh and David C.L. Ngo. Cancellable biometerics featuring with tokenised random number. Pattern Recognition Letters, 26:1454-1460, 2005.
[TEO, 2006] A.B.J. Teoh, T. Connie and D. Ngo. Remarks on BioHash and Its Mathematical Foundation. Information Processing Letters, 100:145-150, 2006.
[TRI, 2007] V. Viet Triem Tong, H. Sibert, J. Lecoeur and M. Girault. Biometric fuzzy extractors made practical: a proposal based on fingercodes. In International Conference on Biometrics, 2007.
[TUL, 2005] S. Tulyakov, F. Farooq and V. Govindaraju. Symmetric hash functions for fingerprint minutiae. In Lecture Notes in Computer Science, LNCS, 2005.
[TUR, 1991] M. Turk and A. Pentland, “Eigenfaces for recognition,” Journal of Cognitive Neuroscience, vol. 3, no. 1, pp. 71–86, 1991.
[TUY, 2004] P. Tuyls and J. Goseling. Capacity and Examples of Template-Protecting Biometric Authentication Systems. In ECCV Workshop BioAW, pages 158-170, 2004.
[TUY, 2005] P. Tuyls, A.H.M. Akkermans, T.A.M. Kevenaar, G.J. Schrijen, A.M. Bazen and R.N.J. Veldhuis. Practical Biometric Authentication with Template Protection. In AVBPA, pages 436-446, 2005.
[TRU, 1979] G. V. Trunk. A problem of dimensionality: A simple example. IEEE Transactions on Pattern Analysis and Machine Intelligence, PAMI-1(3), July 1979. [UKB, 2003] U.K. Biometric Working Group, “Biometric security concerns,” Technical Report, CESG, September 2003, http://www.cesg.gov.uk/site/ast/biometrics/media/ BiometricSecurityConcerns.pdf. [ULU, 2004] Umut Uludag, Anil K. Jain, Attacks on Biometric Systems: A Case Study in Fingerprints, http://biometrics.cse.msu.edu [ULU, 2003] U. Uludag and A. K. Jain. Multimedia content protection via biometrics-based encryption. In Proc. IEEE Conference on Multimedia & Expo (ICME), pages 237-240, 2003.
162
[ULU, 2004] Uludag U, Pankanti S. , Prabhakar S, and Jain A.K, “Biometric cryptosystems: issues and challenges,” Proceedings of the IEEE, vol. 92, no. 6, pp. 948–960, 2004. [ULU, 2004A] U. Uludag and A. K. Jain, “Attacks on biometric systems: a case study in fingerprints,” in Proc. SPIE, Security, Seganography and Watermarking of Multimedia Contents VI, vol. 5306, pp. 622–633, (San Jose, CA), January 2004. [ULU, 2005] Uludag U, Pankanti S, and Jain A.K, “Fuzzy vault for fingerprints,” AVBPA 2005 : audio and video-based biometric person authentication (Hilton Rye Town NY, 20-22 July 2005). Springer, 20051973, vol. 3546, p.p. 310-319. [VER, 1999] P. Verlinde and G. Cholet. Comparing Decision Fusion Paradigms using k-NN based Classifiers, Decision Trees and Logistic Regression in a Multi-modal Identity Verification Application. In Proceedings of Second International Conference on Audio- and Video-Based Biometric Person Authentication (AVBPA), pages 188–193, Washington D.C., U.S.A., March 1999. [VER 2003] Verbitskiy E, Tuyls P, Denteneer D, and Linnartz J.P. Reliable biometric authentication with privacy protection. In Proc. of the 24th Symp. on Inf. Theory in the Benelux, pp.125–132, Veldhoven, The Netherlands, 2003.
[VIE, 2002] C. Vielhauer, R. Steinmetz and A. Mayerhoefer. Biometric Hash based on Statistical Features of Online Signatures. IEEE International Conference on Pattern Recognition (ICPR), 123-126, 2002.
[VOD 2006] Voderhobli K, Pattinson C, and Donelan.H. A schema for cryptographic keys generation using hybrid biometrics. In: 7th annual postgraduate symposium: The convergence of telecommunications, networking and broadcasting, 26-27 June 2006, Liverpool, UK. [WAN, 2003] Y. Wang, T. Tan, and A. K. Jain. Combining Face and Iris Biometrics for Identity Verification. In Proceedings of Fourth International Conference on Audio- and Video-Based Biometric Person Authentication (AVBPA), pages 805–813, Guildford, U.K., June 2003. [WAY, 1997] J. L. Wayman. Large-scale Civilian Biometric Systems-Issues and Feasibility. In Proceedings of Card Tech / Secur Tech ID, 1997.
163
[WES, 2001] F.Wessel, R. Schluter, K. Macherey, and H. Ney. Confidence Measures for Large Vocabulary Continuous Speech Recognition. IEEE Transactions on Speech and Audio Processing, 9(3):288–298, March 2001. [WIL, 2004] C. Wilson, A. R. Hicklin, H. Korves, B. Ulery, M. Zoepfl, M. Bone, P. Grother, R. J. Micheals, S. Otto, and C. Watson. Fingerprint Vendor Technology Evaluation 2003: Summary of Results and Analysis Report. NIST Internal Report 7123; available at http://fpvte.nist.gov/report/ir_7123_summary.pdf, June 2004. [WOL, 1998] G. Wolberg, “Image Morphing: A Survey,” The Visual Computer 360–372 (1998). [WOO, 1997] J. D. Woodward, Biometrics: Privacy’s foe or privacy’s friend? Proceedings of the IEEE (Special Issue on Automated Biometrics), vol. 85, pp. 1480–1492, September 1997. [WOO, 1997A] K. Woods, K. Bowyer, and W. P. Kegelmeyer. Combination of Multiple Classifiers using Local Accuracy Estimates. IEEE Transactions on Pattern Analysis and Machine Intelligence, 19(4):405–410, April 1997. [WUO, 2001] C. P. Wuo and C. C. J. Kuo. Efficient multimedia encryption via entropy codec design. In Proc. SPIE, vol. 4314, pages 128-138, 2001. [YAN, 2000] Jianxin Yan, Alan Blackwell, Ross Anderson, and Alasdair Grant. The memorability and security of passwords - some empirical results. Technical report, University of Cambridge, 2000. [YAN 2004] Yang S. and Verbauwhede I., “Secure fuzzy vault based fingerprint verification system.” In Thirty-Eighth Asilomar Conference on Signals, Systems, and Computers (2004), v. 1, pp. 577–581, 2004.
[YAN, 2004A] B. Yanikoglu and A. Kholmatov. Combining Multiple Biometrics to Protect Privacy. In ICPR-BCTP Workshop, Cambridge, England, August 2004.
[YAN, 2005] S. Yang and I. Verbauwhede. Automatic securefingerprint verification system based on fuzzy vault scheme. In Proc. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pages 609-612, 2005. [YEU, 1999] M. Yeung and S. Pankanti, “Verification watermarks on fingerprint recognition and retrieval,” in Proc. SPIE, Security and Watermarking of Multimedia Contents, vol. 3657, pp. 66–78, (San Jose, USA), January 1999.
164
[YEU, 2004] D. Yeung, H. Chang, Y. Xiong, S. George, R. Kashi, T. Matsumoto, and G. Rigoll. Svc2004: First international signature verification competition. Proceedings of the International Conference on Biometric Authentication, 2004.
[ZHA, 2004] W. Zhang, Y.-J. Chang and T. Chen. Optimal thresholding for key generation based on biometrics. In Intl. Conf. on Image Processing, 2004.