Biometric Template Security Scheme using Fuzzy Vault
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 110 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

Informative Article | Computer Science & Engineering | India | Volume 5 Issue 3, March 2016

Biometric Template Security Scheme using Fuzzy Vault

Purva Gabhane, Anisa Anjum

To protect the biometric templates and secret key simultaneously fuzzy vault is one of the most popular algorithms. In fuzzy vault generation at first, the preprocessing steps are applied and subsequently, the features are extracted and combined. For recognition, we match the feature vectors of images. The biometric template along with the input key are used to generate the fuzzy vault. In the decoding process, the template is given as input and is combined with the stored fuzzy vault to generate the corresponding final key. In this fuzzy vault scheme the biometric features are used to lock and unlock the secret key which is encoded in the coefficient of polynomial equation. The security of fuzzy vault system is depend on the infeasibility of polynomial reconstruction problem. By adding more noise points that are the chaff points to the vault enhance the performance of vault.

Keywords: Biometric, fuzzy vault, chaff point, template protection, key generation

Edition: Volume 5 Issue 3, March 2016

Pages: 2058 - 2060

Share this Article

How to Cite this Article?

Purva Gabhane, Anisa Anjum, "Biometric Template Security Scheme using Fuzzy Vault", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV162389, Volume 5 Issue 3, March 2016, 2058 - 2060

Enter Your Email Address and Click Download Button





Similar Articles with Keyword 'Biometric'

Downloads: 66 | Weekly Hits: ⮙2 | Monthly Hits: ⮙35

Research Paper, Computer Science & Engineering, Congo, Volume 10 Issue 3, March 2021

Pages: 61 - 70

Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution

Bopatriciat Boluma Mangata, Eugene Mbuyi Mukendi, Jean-Didier Batubenga

Share this Article

Downloads: 67 | Weekly Hits: ⮙3 | Monthly Hits: ⮙16

Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 890 - 894

A Survey on Types of Crawlers and Web Searching Algorithms

T. Yogameera, Dr. D. Shanthi

Share this Article

Downloads: 82 | Monthly Hits: ⮙6

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 165 - 167

Statistical Analysis of DCT Coefficients for Ascertaining Ears Biometrics

Nisha, Jatinder Kansal, JPS Raina

Share this Article

Downloads: 105 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1520 - 1522

Survey of Various Techniques for Signature Recognition and Verification

Sharayu S. Sangekar, D. C. Dhanwani

Share this Article

Downloads: 105 | Weekly Hits: ⮙3 | Monthly Hits: ⮙10

Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2049 - 2052

Fingerprint Compression Technique using Sparse Representation

Swapnil Raut, Nisha Wankhade

Share this Article

Similar Articles with Keyword 'fuzzy vault'

Downloads: 110 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 2058 - 2060

Biometric Template Security Scheme using Fuzzy Vault

Purva Gabhane, Anisa Anjum

Share this Article

Downloads: 116 | Weekly Hits: ⮙3 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2417 - 2421

Fingerprints Template Security Using Daes with Secure Fuzzy Vault

Silky Chhabra, Supreet Kaur

Share this Article

Downloads: 134 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 249 - 252

Multibiometric Template Security Based on Fuzzy Behavior

Praveer Tigga, Akash Wanjari

Share this Article

Similar Articles with Keyword 'template protection'

Downloads: 110 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 2058 - 2060

Biometric Template Security Scheme using Fuzzy Vault

Purva Gabhane, Anisa Anjum

Share this Article

Downloads: 113 | Weekly Hits: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1090 - 1094

A Survey of Multi-Biometric Cryptographic Security System

Vaibhavkumar S. Gaikawad, S. N. Kini

Share this Article

Downloads: 114 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 12, December 2016

Pages: 1999 - 2004

Multi-Biometric Cryptographic Security System with Dynamic Password Protection

Vaibhavkumar Suprao Gaikawad, S. N. Kini

Share this Article

Downloads: 129 | Weekly Hits: ⮙2 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 768 - 772

A Survey on Template Protection Scheme for Multimodal Biometric System

Praveer Tigga, Akash Wanjari

Share this Article

Similar Articles with Keyword 'key generation'

Downloads: 101 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1525 - 1529

Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image

Maulik P. Chaudhari, Neha Parmar

Share this Article

Downloads: 104 | Weekly Hits: ⮙3 | Monthly Hits: ⮙14

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this Article

Downloads: 105 | Weekly Hits: ⮙2 | Monthly Hits: ⮙7

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 781 - 785

Implementation of Fast Transmission to Remote Cooperative Groups: A New Key Management Scenario in Wireless Sensor Networks

P. Harikrishna, K. V. Srinivasa Rao

Share this Article

Downloads: 108 | Monthly Hits: ⮙6

Informative Article, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1548 - 1550

Joint Task Migration and Power Management in Wireless Computing

Dayanand G Savakar, Anand S Ghuli

Share this Article

Downloads: 109 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1093 - 1096

Integrity Auditing for Dynamic Cloud Using Homomorphic Encryption with Group User Revocation

Madhuri. P, Jayavarthini. C

Share this Article



Top