Multi-modal and multi-instance fusion for biometric cryptosystems
dc.contributor.author | Merkle, Johannes | |
dc.contributor.author | Kevenaar, Tom | |
dc.contributor.author | Korte, Ulrike | |
dc.contributor.editor | Brömme, Arslan | |
dc.contributor.editor | Busch, Christoph | |
dc.date.accessioned | 2018-11-19T13:16:41Z | |
dc.date.available | 2018-11-19T13:16:41Z | |
dc.date.issued | 2012 | |
dc.description.abstract | Biometric cryptosystems allow cryptographic privacy protection for biometric reference data without storing a secret key. However, their security is inherently limited by the discriminative information content of the biometric feature data. Given the currently exploitable entropy of biometric features, one of the most promising approaches to achieve high privacy levels is to combine several biometric modalities or several instances of the same biometric modality. In this contribution, we theoretically analyze multibiometric fusion strategies for biometric cryptosystems with respect to their impact on security and recognition accuracy. We also introduce hash level as a new fusion level. Furthermore, we give a more detailed analysis for the most prominent schemes, the Fuzzy Commitment Scheme and the Fuzzy Vault. | en |
dc.identifier.isbn | 978-3-88579-290-1 | |
dc.identifier.pissn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/18320 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | BIOSIG 2012 | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-196 | |
dc.title | Multi-modal and multi-instance fusion for biometric cryptosystems | en |
dc.type | Text/Conference Paper | |
gi.citation.endPage | 62 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 51 | |
gi.conference.date | 06.-07. September 2012 | |
gi.conference.location | Darmstadt | |
gi.conference.sessiontitle | Regular Research Papers |
Dateien
Originalbündel
1 - 1 von 1