A Matching Algorithm Secure against the Wolf Attack in Biometric Authentication Systems.
Yoshihiro KojimaRie ShigetomiManabu InumaAkira OtsukaHideki ImaiPublished in: COST 2101/2102 Conference (2009)
Keyphrases
- matching algorithm
- biometric authentication systems
- biometric authentication
- random effects
- user authentication
- authentication protocol
- authentication systems
- image matching
- data fusion
- matching process
- authentication scheme
- security requirements
- security analysis
- secret key
- fingerprint matching
- key management
- security issues
- lightweight
- hidden markov models
- similarity measure
- security mechanisms
- feature extraction
- hierarchical structure