Vulnerabilities of fuzzy vault schemes using biometric data with traces.
Maryam LafkihPatrick LacharmeChristophe RosenbergerMounia MikramSanaa GhouzaliMohamed El HazitiDriss AboutajdinePublished in: IWCMC (2015)
Keyphrases
- biometric data
- fuzzy vault
- smart card
- security systems
- information security
- security level
- biometric template
- biometric systems
- security mechanisms
- widely accepted
- biometric recognition
- security issues
- biometric authentication
- rule based systems
- information systems
- high quality
- fingerprint identification
- e government
- image processing