JOURNA Cryptographic Key Generation from Finger Vein

r proposes the method of cryptographic key generati on from finger -processing methods and authors’

[1]  Paulina Belle Nissenblatt Fingers , 1997, The Lancet.

[2]  J. Roerdink,et al.  Mathematical Morphology and its Applications to Image and Signal Processing , 1998 .

[3]  Naoto Miura,et al.  Automatic Feature Extraction from non-uniform Finger Vein Image and its Application to Personal Identification , 2002, MVA.

[4]  Naoto Miura,et al.  Feature Extraction of Finger-vein Patterns Based on Repeated Line Tracking and Its Application to Personal Identification , 2022 .

[5]  Tsuhan Chen,et al.  Biometrics-based cryptographic key generation , 2004, 2004 IEEE International Conference on Multimedia and Expo (ICME) (IEEE Cat. No.04TH8763).

[6]  Stelvio Cimato,et al.  Encyclopedia of Cryptography and Security , 2005 .

[7]  J. Hashimoto,et al.  Finger Vein Authentication Technology and Its Future , 2006, 2006 Symposium on VLSI Circuits, 2006. Digest of Technical Papers..

[8]  Wai Lok Woo,et al.  Crypto Key Generation using Contour Graph Algorithm , 2006, SPPRA.

[9]  Wanqing Li,et al.  Cryptographic Key Generation from Biometric Data Using Lattice Mapping , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[10]  Umut Uludag,et al.  Secure biometric systems , 2006 .

[11]  Kathy Buckner,et al.  Fingers, veins and the grey pound: accessibility of biometric technology , 2007, ECCE '07.

[12]  C.R. Costanzo Active Biometric Cryptography (ABC): Key Generation Using Feature and Parametric Aggregation , 2007, Second International Conference on Internet Monitoring and Protection (ICIMP 2007).

[13]  David Zhang,et al.  An Iris Cryptosystem for Information Security , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[14]  Bernadette Dorizzi,et al.  Cancelable iris biometrics and using Error Correcting Codes to reduce variability in biometric data , 2009, CVPR.

[15]  Mark Stamp,et al.  Handbook of Information and Communication Security , 2010, Handbook of Information and Communication Security.

[16]  Dr.K. Duraiswamy,et al.  Cryptographic Key Generation from Multiple Biometric Modalities: Fusing Minutiae with Iris Feature , 2010 .

[17]  Vladislav A. Kuznetsov,et al.  Extraction of Binary Features from Fingerprint Topology , 2011, 2011 International Conference on Hand-Based Biometrics.

[18]  Algimantas Venčkauskas,et al.  Study of Finger Vein Authentication Algorithms for Physical Access Control , 2012 .

[19]  Algimantas Venckauskas,et al.  Generation of the Secret Encryption Key Using the Signature of the Embedded System , 2012, Inf. Technol. Control..