An overview of fingerprint template protection approaches

One possible attack in the biometric system is the template stored in the database. This attack can cause Biometric template information leakage, thus pose a serious privacy security threat.Most available template protection techniques fail to meet all the desired requirements of practical biometric...

Full description

Saved in:
Bibliographic Details
Main Authors: Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana, Abdul Kadir, Evizal
Format: Conference or Workshop Item
Language:English
Published: 2017
Subjects:
Online Access:http://repo.uum.edu.my/25682/1/ICoSET%20UIR%202017%2080%20105.pdf
http://repo.uum.edu.my/25682/
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Utara Malaysia
Language: English
id my.uum.repo.25682
record_format eprints
spelling my.uum.repo.256822019-02-28T03:15:35Z http://repo.uum.edu.my/25682/ An overview of fingerprint template protection approaches Siswanto, Apri Katuk, Norliza Ku-Mahamud, Ku Ruhana Abdul Kadir, Evizal QA75 Electronic computers. Computer science One possible attack in the biometric system is the template stored in the database. This attack can cause Biometric template information leakage, thus pose a serious privacy security threat.Most available template protection techniques fail to meet all the desired requirements of practical biometric systems such as diversity, revocability, security, and performance matching accuracy. This paper aims to review the various fingerprint template protection (ftp) approaches that have been proposed by researchers in recent decades. Some of the proposed schemes are standard encryption, biometric cryptosystem, template transformation, hybrid scheme and homomorphic encryption. 2017-11-08 Conference or Workshop Item PeerReviewed application/pdf en http://repo.uum.edu.my/25682/1/ICoSET%20UIR%202017%2080%20105.pdf Siswanto, Apri and Katuk, Norliza and Ku-Mahamud, Ku Ruhana and Abdul Kadir, Evizal (2017) An overview of fingerprint template protection approaches. In: International Conference on Science Engineering and Technology (ICoSET) and International Conference on Social Economic Education and Humaniora (ICoSEEH), 08 - 10 November 2017, Pekanbaru, Riau, Indonesia.
institution Universiti Utara Malaysia
building UUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Utara Malaysia
content_source UUM Institutionali Repository
url_provider http://repo.uum.edu.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Siswanto, Apri
Katuk, Norliza
Ku-Mahamud, Ku Ruhana
Abdul Kadir, Evizal
An overview of fingerprint template protection approaches
description One possible attack in the biometric system is the template stored in the database. This attack can cause Biometric template information leakage, thus pose a serious privacy security threat.Most available template protection techniques fail to meet all the desired requirements of practical biometric systems such as diversity, revocability, security, and performance matching accuracy. This paper aims to review the various fingerprint template protection (ftp) approaches that have been proposed by researchers in recent decades. Some of the proposed schemes are standard encryption, biometric cryptosystem, template transformation, hybrid scheme and homomorphic encryption.
format Conference or Workshop Item
author Siswanto, Apri
Katuk, Norliza
Ku-Mahamud, Ku Ruhana
Abdul Kadir, Evizal
author_facet Siswanto, Apri
Katuk, Norliza
Ku-Mahamud, Ku Ruhana
Abdul Kadir, Evizal
author_sort Siswanto, Apri
title An overview of fingerprint template protection approaches
title_short An overview of fingerprint template protection approaches
title_full An overview of fingerprint template protection approaches
title_fullStr An overview of fingerprint template protection approaches
title_full_unstemmed An overview of fingerprint template protection approaches
title_sort overview of fingerprint template protection approaches
publishDate 2017
url http://repo.uum.edu.my/25682/1/ICoSET%20UIR%202017%2080%20105.pdf
http://repo.uum.edu.my/25682/
_version_ 1644284395856592896