Skip to main content

Analysis and Improvement of Vault Algorithm Theory Based on Fuzzy Extraction Technology

  • Conference paper
  • 1347 Accesses

Part of the book series: Advances in Intelligent and Soft Computing ((AINSC,volume 106))

Abstract

Based on fuzzy extraction technology a fingerprint key algorithm to improve vault algorithm is designed, which has proved a device error in fuzzy vault algorithm: the use of RS code is unreasonable. The algorithm overcomes most of the problems in the existing fingerprint key algorithm.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Juels, A.: A Fuzzy Vault Scheme. In: IEEE International Symposium on Information Theory, pp. 408–409 (2002)

    Google Scholar 

  2. Hang, L.: Fingerprint key algorithm. Harbin Institute of Technology, Harbin (2006)

    Google Scholar 

  3. Jia, C.: Fingerprint identification system and implementation of the matching algorithm. University of Electronic Technology (2004)

    Google Scholar 

  4. Lu, S., Wang, T.: Modern cryptography technology limitations. Computer Applications 7, 45–47 (2000)

    Google Scholar 

  5. Zhu, L., Xu, W., Liu, Y.: Web-based fingerprint authentication technology research and implementation. Computer Engineering and Applications 31, 56–58 (2003)

    Google Scholar 

  6. Su, W., Chung, D.: A one-time password and fingerprint-based authentication scheme. Computer Engineering S1, 22–25 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Xia, M., Liu, Q. (2011). Analysis and Improvement of Vault Algorithm Theory Based on Fuzzy Extraction Technology. In: Jin, D., Lin, S. (eds) Advances in Computer Science, Intelligent System and Environment. Advances in Intelligent and Soft Computing, vol 106. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23753-9_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23753-9_32

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23752-2

  • Online ISBN: 978-3-642-23753-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics