Secure fingerprint fuzzy vault using hadamard transformation to defy correlation attack.
Manvjeet KaurSanjeev SofatPublished in: ISED (2016)
Keyphrases
- fuzzy vault
- smart card
- authentication protocol
- secret key
- security requirements
- biometric data
- security level
- security analysis
- biometric template
- security mechanisms
- key exchange protocol
- security measures
- key management
- authentication mechanism
- user authentication
- information security
- encryption scheme
- block cipher
- widely accepted
- security systems
- protection scheme
- image enhancement