Fuzzy face vault: How to implement fuzzy vault with weighted features

Dae Hun Nyang, Kyung Hee Lee

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

Ari Juel et al from ISIT 2002 presented a fuzzy vault scheme, which is a framework to encrypt a cryptographic key with a fuzzy key [5]. Following their framework, many trials to implement mainly a fuzzy finger vault have been proposed that enables us to keep secretly a key with our finger print. Our work is to focus on instantiating the fuzzy information of the fuzzy vault scheme with human faces instead of fingers. Most of face authentication algorithms are dependent upon weighted features, which are incompatible with the original fuzzy vault scheme. To reflect the level of importance of individual features from feature set, we introduce another layer between captured feature set and points in the polynomial to be interpolated.

Original languageEnglish
Title of host publicationUniversal Access in Human-Computer Interaction
Subtitle of host publicationCoping with Diversity - 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007. Held as Part of HCI Int. 2007 Proc.
PublisherSpringer Verlag
Pages491-496
Number of pages6
EditionPART 1
ISBN (Print)9783540732785
DOIs
StatePublished - 2007
Event4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007 - Beijing, China
Duration: 22 Jul 200727 Jul 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
NumberPART 1
Volume4554 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007
Country/TerritoryChina
CityBeijing
Period22/07/0727/07/07

Fingerprint

Dive into the research topics of 'Fuzzy face vault: How to implement fuzzy vault with weighted features'. Together they form a unique fingerprint.

Cite this