[1] |
LAMPORT L . Password authentication with insecure communication[J]. Communications of the ACM, 1981,24(11): 770-772.
|
[2] |
JAIN A , ROSS A , PRABHAKAR S . An introduction to biometric recognition[J]. IEEE Transactions on Circuits and Systems for Video Technology, 2004,14(1): 4-20.
|
[3] |
JAIN A , HONG L , PANKANTI S . Biometric identification[J]. Communications of the ACM, 2000,43(2): 90-98.
|
[4] |
RUI Z , YAN Z . A survey on biometric authentication:toward secure and privacy-preserving identification[J]. IEEE Access, 2018,7: 5994-6009.
|
[5] |
SABHANAYAGAM T , VENKATESAN V P , SENTHAMARAK . A comprehensive survey on various biometric systems[J]. International Journal of Applied Engineering Research, 2018,13(5): 2276-2297.
|
[6] |
RIAZ N , RIAZ A , KHAN S A . Biometric template security:an overview[J]. Sensor Review, 2017,38(1): 120-127.
|
[7] |
SARKAR A , SINGH B K . A review on performance,security and various biometric template protection schemes for biometric authentication systems[J]. Multimedia Tools and Applications, 2020,79(37): 27721-27776.
|
[8] |
KHOLMATOV A , YANIKOGLU B . Identity authentication using improved online signature verification method[J]. Pattern Recognition Letters, 2005,26(15): 2400-2408.
|
[9] |
PRABHAKAR S , PANKANTI S , JAIN A . Biometric recognition:security and privacy concerns[J]. IEEE Security &Privacy. 2003,1(2): 33-42.
|
[10] |
RATHA NK , CONNELL J , BOLLE R . An analysis of minutiae matching strength[C]// International Conference on Audio and Video-Based Biometric Person Authentication. 2001: 223-228.
|
[11] |
TOMKO G , SOUTAR C , SCHMIDT G . Fingerprint controlled public key cryptographic system[P]. US5541994, 1996-7-30.
|
[12] |
李鹏, 田捷, 杨鑫 ,等. 生物特征模板保护[J]. 软件学报, 2009,20(6): 1553-1573.
|
|
LI P , TIAN J , YANG X ,et al. Biometric Template protection[J]. Journal of Software, 2009,20(6): 1553-1573.
|
[13] |
ULUDAG U , PANKANTI S , PRABHAKAR S ,et al. Biometric cryptosystems:issues and challenges[J]. Proceedings of the IEEE, 2004,92(6): 948-960.
|
[14] |
DAVIDA G , FRANKEL Y , MATT B . On enabling secure applications through off-line biometric identification[C]// IEEE Symposium on Security and Privacy. 1998: 148-157.
|
[15] |
JUELS A , SUDAN M . A fuzzy vault scheme[J]. Designs,Codes and Cryptography, 2006,38(2): 237-257.
|
[16] |
JUELS A , WATTENBERG M . A fuzzy commitment scheme[C]// The 6th ACM conference on Computer and Communications Security. 1999: 28-36.
|
[17] |
SOUTAR C , ROBERGE D , STOIANOV A ,et al. Biometric encryption using image processing[J]. Optical Security and Counterfeit Deterrence Techniques II, 1998,3314: 178-188.
|
[18] |
VERBITSKIY E , TUYLS P , DENTENEER D ,et al. Reliable biometric authentication with privacy protection[C]// Proc 24th Benelux Symposium on Information Theory. 2003:19.
|
[19] |
RATHGEB C , UHL A . A survey on biometric cryptosystems and cancelable biometrics[J]. EURASIP Journal on Information Security, 2011,2011(1): 1-25.
|
[20] |
张宁, 臧亚丽, 田捷 . 生物特征与密码技术的融合——一种新的安全身份认证方案[J]. 密码学报, 2015,2(2): 159-176.
|
|
ZHANG N , ZANG Y L , TIAN J . The integration of biometrics and cryptography——a new solution for secure identity authentication[J]. Journal of Crypto logic Research, 2015,2(2): 159-176.
|
[21] |
罗成行, 杨得新, 杨波 . 一个基于指纹和智能卡的密钥封装方案[J]. 信息安全与通信保密, 2009(8): 338-340.
|
|
LUO X C , YANG D X , YANG B . A key encapsulation scheme based on fingerprint and smartcard[J]. Information Security and Communication Privacy, 2009(8): 338-340.
|
[22] |
陈开志, 胡爱群, 宋宇波 ,等. 基于 BioHashing 和密钥绑定的双重可删除指纹模板方法[J]. 高技术通讯, 2010,20(11): 1115-1120.
|
|
CHEN K Z , HU A Q , SONG Y B ,et al. A dual cancellable fingerprint template method for securing the original finger print biometric in formation based on BioHashing and key bindings[J]. High Technology Letters, 2010,20(11): 1115-1120.
|
[23] |
SHENG W , HOWELLS G , FAIRHURST M ,et al. Reliable and secure encryption key generation from fingerprints[J]. Information Management & Computer Security, 2012,20(3): 207-221.
|
[24] |
高莹, 郑长春, 张凯 ,等. 更高效的指纹生物特征加密[J]. 密码学报, 2016,3(2): 157-170.
|
|
GAO Y , ZHENG C C , ZHANG K ,et al. More efficient fingerprint biometric encryption[J]. Journal of Cryptologic Research. 2016,3(2): 157-170.
|
[25] |
WANG P , YOU L , HU G ,et al. Biometric key generation based on generated intervals and two-layer error correcting technique[J]. Pattern Recognition, 2021,111:107733.
|
[26] |
张翔宇 . 基于指纹识别的认证方法研究[D]. 北京:北京邮电大学, 2021.
|
|
ZHANG X . Research on authentication method on fingerprint recognition[D]. Beijing:Beijing University of Posts and Telecommunications, 2021.
|
[27] |
ELSADAI A , ADAMOVI? S , ?ARAC M ,et al. New approach for fingerprint recognition based on stylometric features with blockchain and cancellable biometric aspects[J]. Multimedia Tools and Applications, 2022,81(25): 36715-36733.
|
[28] |
贾忠田, 马莉, 秦庆龙 ,等. 一种指纹密钥生成方法、系统、介质及设备[P]. 山东省:CN115720170A, 2023-02-28.
|
|
JIA Z , MA L , QIN Q . A method,system,medium and device for fingerprint key generation[P]. Shandong Province:CN115720170A, 2023-02-28.
|
[29] |
ALILOU V . Fingerprint matching:a simple approach[EB].
|