
to a better protection of privacy without worrying
about databases.
Related Entries
▶ Encryption, Biometric
▶ Fake Finger Detection
▶ Fingerprint Features
▶ Fingerprint Matching, Automatic
▶ Fingerprint Templates
References
1. Cavoukian, A., Stoianov, A.: Biometric encryption: A positive-
sum technology that achieves strong authentication, security
and privacy. White paper, Information and privacy commiss-
ioner of Ontario, March (2007)
2. Soutar, C., Roberge, D., Stoianov, A., Gilroy, R., Vijaya Kumar,
B.V.K.: Biometric Encryption, chap. 22, McGraw-Hill (1999)
3. Ratha, N.K., Connell, J.H., Bolle, R.M.: Enhancing security and
privacy in biometrics-based authentication systems. IBM Syst. J.
40(3), 614–634 (2001)
4. Davida, G.I., Frankel, Y., Matt, B.J., Peralta, R.: On the relation of
error correction and cryptography to an off-line biometric based
identification scheme. In: Proceedings of the Workshop on Cod-
ing and Cryptography, Paris, France, pp. 129–138 (1999)
5. Linnartz, J.P., Tuyls, P.: New shielding functions to
enhance privacy and prevent misuse of biometric templates.
In: Proceedings of the Fourth International Conference on
Audio and Video based Biometric Person Authentication, Guild-
ford, UK, pp. 393–402 (2003)
6. Lumini, A., Nanni, L.: An improved biohashing for human
authentication. Pattern Recognit. 40, 1057–4065 (2007)
7. Boult, T.E., Scheirer, W.J., Woodworth, R.: Revocable Fingerprint
Biotokens: Accuracy and Security Analysis. In: Proceedings of
the IEEE Conference on Computer Vision and Pattern Recogni-
tion (CVPR’07), Minneapolis, USA, pp. 1–8, 17–22 June (2007)
8. Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: How to gener-
ate strong keys from biometrics and other noisy data. In:
Proceedings of the Eurocrypt 2004, pp. 523–540 (2004)
9. Burnett, A., Byrne, F., Dowling, T., Dury, A.: A biometric identity
based signature scheme. In: Proceedings of the Applied Cryptog-
raphy and Network Security Conference, New York, USA (2005)
10. Costanzo, C.R.: Biometric cr yptography: Key generation using
feature and parametric aggregation. Online techreport, School
of Engineering and Applied Sciences, Department of Computer
Science, The George Washington University, October (2004)
11. Al-Tarawneh, M.S., Khor, L.C., Woo, W.L., Dlay, S.S.: Crypto key
generation using contour graph algorithm. In: Proceedings of
the 24th IASTED International Multi-Conference Signal Proces-
sing, Pattern Recognition and Applications, Insbruck, Austria,
February (2005)
12. Juels, A., Sudan, M.: A fuzzy vault scheme. In: Lapidoth, A.,
Teletar, E. (eds.) Proceedings of the IEEE International Sympo-
sium on Information Theory, p. 408. IEEE Press (2002)
13. Chang, E.-C., Li, Q.: Hiding secret points amidst Chaff. In:
Proceedings of the Eurocrypt, Saint Petersburg, Russia (2006)
14. Zheng, G., Li, W., Zhan, C.: Cryptographic key generation from
biometric data using lattice mapping. In: Proceedings of the 18th
International Conference on Pattern Recognition (ICPR’06),
Washington, DC, USA, pp. 513–516. IEEE Computer Society
(2006)
15. Uludag, U., Jain, A.K.: Fuzzy fingerprint vault. In: Proceedings
on Workshop: Biometrics: Challenges Arising from Theory to
Practice, August 2004, pp. 13–16 (2004)
16. Uludag, U., Jain, A.: Securing fingerprint template: Fuzzy vault
with helper data. In: Proceedings of the 2006 Conference on
Computer Vision and Pattern Recognition Workshop, June
2006, pp. 163–170 (2006)
First Level Detail
This reflects the general flow of the papillary ridges
which may form certain patterns such as arches, loops,
whorls, and deltas.
▶ Fingerprint Matching, Manual
Fisher Criterion
Fisher criterion is a discriminant criterion function
that was first presented by Fisher in 1936. It is defined
by the ratio of the between-class scatter to the within-
class scatter. By maximizing this criterion, one can
obtain an optimal discriminant projection axis. After
the sample being projected on to this projection axis,
the within-class scatter is minimized and the bet ween-
class scatter is maximized.
▶ Non-linear Techniques for Dimension Reduction
Fixed Pattern Noise
It is characterized by the same pattern of ‘‘hot’’ pixels
occurring with images taken under the same condi-
tions of temperature and exposure.
▶ Face Device
Fixed Pattern Noise
F
549
F