{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:12:48Z","timestamp":1750306368428,"version":"3.41.0"},"reference-count":41,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2016,8,2]],"date-time":"2016-08-02T00:00:00Z","timestamp":1470096000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ARC Linkage","award":["LP110100602"],"award-info":[{"award-number":["LP110100602"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2016,9]]},"abstract":"<jats:p>As a promising bio-cryptographic technique, the fuzzy extractor seamlessly binds biometrics and cryptography for template protection and key generation. However, most existing methods hardly solve the following issues simultaneously: (1) Fingerprint registration, (2) Verification accuracy, (3) Security strength, and (4) Computational efficiency. In this article, we introduce a bio-crypto-oriented fingerprint verification scheme - Selective Vertex-indexed Triangulation (SViT) which maps minutia global topology to local triangulation with minimum information loss. Then, a SViT-based fuzzy extractor framework (FE-SViT) is proposed and high verification accuracy is achieved. The FE-SViT is highly parallelizable and efficient which makes it suitable for embedded devices.<\/jats:p>","DOI":"10.1145\/2930669","type":"journal-article","created":{"date-parts":[[2016,8,4]],"date-time":"2016-08-04T13:26:34Z","timestamp":1470317194000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["FE-SViT"],"prefix":"10.1145","volume":"15","author":[{"given":"Kai","family":"Xi","sequence":"first","affiliation":[{"name":"Monash University, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0230-1432","authenticated-orcid":false,"given":"Jiankun","family":"Hu","sequence":"additional","affiliation":[{"name":"University of New South Wales, Canberra, Australia"}]},{"given":"B. V. K. Vijaya","family":"Kumar","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA"}]}],"member":"320","published-online":{"date-parts":[[2016,8,2]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Open MPI 1.8.2. 2015. Open Source High Performance Computing. Retrieved from https:\/\/www.open-mpi.org\/.  Open MPI 1.8.2. 2015. Open Source High Performance Computing. Retrieved from https:\/\/www.open-mpi.org\/."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2011.03.015"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/2391659.2391745"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2003.1195995"},{"key":"e_1_2_1_5_1","unstructured":"Marina Blanton and Mehrdad Aliasgari. 2012. On the (non-)reusability of fuzzy sketches and extractors and security improvements in the computational setting. In IACR Cryptol ePrint Archive.  Marina Blanton and Mehrdad Aliasgari. 2012. On the (non-)reusability of fuzzy sketches and extractors and security improvements in the computational setting. In IACR Cryptol ePrint Archive."},{"key":"e_1_2_1_6_1","unstructured":"Jess Bolluyt. 2015. How Much Can You Trust Your Phone's Fingerprint Unlock? http:\/\/www.cheatsheet.com\/technology\/how-much-can-you-trust-your-phones-fingerprint-unlock.html.  Jess Bolluyt. 2015. How Much Can You Trust Your Phone's Fingerprint Unlock? http:\/\/www.cheatsheet.com\/technology\/how-much-can-you-trust-your-phones-fingerprint-unlock.html."},{"key":"e_1_2_1_7_1","doi-asserted-by":"crossref","unstructured":"V. E. Brindha and A. M. Natarajan. 2012. Multi-modal biometric template security: Fingerprint and palmprint based fuzzy vault. Journal of Biometrics and Biostatistics (2012).  V. E. Brindha and A. M. Natarajan. 2012. Multi-modal biometric template security: Fingerprint and palmprint based fuzzy vault. Journal of Biometrics and Biostatistics (2012).","DOI":"10.4172\/2155-6180.1000150"},{"volume-title":"Constructing practical fuzzy extractors usingQIM","author":"Buhan Ileana","key":"e_1_2_1_8_1","unstructured":"Ileana Buhan , Jeroen Doumen , Pieter Hartel , and Raymond Veldhuis . 2007. Constructing practical fuzzy extractors usingQIM . In University of Twente , CTIT technical report, 07-52. Ileana Buhan, Jeroen Doumen, Pieter Hartel, and Raymond Veldhuis. 2007. Constructing practical fuzzy extractors usingQIM. In University of Twente, CTIT technical report, 07-52."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"},{"key":"e_1_2_1_10_1","volume-title":"Egan","author":"Goscinski Wojtek James","year":"2014","unstructured":"Wojtek James Goscinski , Paul McIntosh , Ulrich Felzmann , Anton Maksimenko , Christopher J. Hall , Timur Gureyev , Darren Thompson , Andrew Janke , Graham Galloway , Neil E. B. Killeen , Parnesh Raniga , Owen Kaluza , Amanda Ng , Govinda Poudel , David G. Barnes , Toan Nguyen , Paul Bonnington , and Gary F . Egan . 2014 . The multi-modal Australian sciences imaging and visualisation environment (MASSIVE) high performance computing infrastructure: Applications in neuroscience and neuroinformatics research. Frontiers in Neuroinformatics 8, 30 (2014). Wojtek James Goscinski, Paul McIntosh, Ulrich Felzmann, Anton Maksimenko, Christopher J. Hall, Timur Gureyev, Darren Thompson, Andrew Janke, Graham Galloway, Neil E. B. Killeen, Parnesh Raniga, Owen Kaluza, Amanda Ng, Govinda Poudel, David G. Barnes, Toan Nguyen, Paul Bonnington, and Gary F. Egan. 2014. The multi-modal Australian sciences imaging and visualisation environment (MASSIVE) high performance computing infrastructure: Applications in neuroscience and neuroinformatics research. Frontiers in Neuroinformatics 8, 30 (2014)."},{"volume-title":"Handbook of Fingerprint Recognition","author":"Jain A. K.","key":"e_1_2_1_11_1","unstructured":"A. K. Jain and David Maltoni . 2003. Handbook of Fingerprint Recognition . Springer , New York . A. K. Jain and David Maltoni. 2003. Handbook of Fingerprint Recognition. Springer, New York."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/579416"},{"volume-title":"Biometric Consortium Conference. 1--6.","author":"Jeffers J.","key":"e_1_2_1_13_1","unstructured":"J. Jeffers and A. Arakala . 2006. Minutiae-based structures for a fuzzy vault . In Biometric Consortium Conference. 1--6. J. Jeffers and A. Arakala. 2006. Minutiae-based structures for a fuzzy vault. In Biometric Consortium Conference. 1--6."},{"key":"e_1_2_1_14_1","unstructured":"Xudong Jiang and Wei-Yun Yau. 2000. Fingerprint minutiae matching based on the local and global structures. In ICPR.  Xudong Jiang and Wei-Yun Yau. 2000. Fingerprint minutiae matching based on the local and global structures. In ICPR."},{"volume-title":"IEEE International Information Theory Symposium.","author":"Juels A.","key":"e_1_2_1_15_1","unstructured":"A. Juels and M. Sudan . 2002. A fuzzy vault scheme . In IEEE International Information Theory Symposium. A. Juels and M. Sudan. 2002. A fuzzy vault scheme. In IEEE International Information Theory Symposium."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2009.12.003"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.12.048"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2010.12.015"},{"key":"e_1_2_1_19_1","unstructured":"Emanuele Maiorana and Chiara Ercole. 2007. Secure Biometric Authentication System Architecture Using Error Correcting Codes and Distributed Cryptography. GTTI.  Emanuele Maiorana and Chiara Ercole. 2007. Secure Biometric Authentication System Architecture Using Error Correcting Codes and Distributed Cryptography. GTTI."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.01.042"},{"key":"e_1_2_1_21_1","doi-asserted-by":"crossref","unstructured":"A. Nagar K. Nandakumar and A. K. Jain. 2008. Securing fingerprint template: Fuzzy vault with minutiae descriptors. In ICPR.  A. Nagar K. Nandakumar and A. K. Jain. 2008. Securing fingerprint template: Fuzzy vault with minutiae descriptors. In ICPR.","DOI":"10.1109\/ICPR.2008.4761459"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.908165"},{"key":"e_1_2_1_23_1","unstructured":"NeuroTechnology. 2015. Verifinger SDK. Retrieved from www.neurotechnology.com.  NeuroTechnology. 2015. Verifinger SDK. Retrieved from www.neurotechnology.com."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/646073.677597"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1004"},{"key":"e_1_2_1_26_1","unstructured":"Leonid Reyzin. 2015. Implementation of PinSketch (the BCH-based secure sketch). Retrieved from https:\/\/www.cs.bu.edu\/reyzin\/code\/fuzzy.html.  Leonid Reyzin. 2015. Implementation of PinSketch (the BCH-based secure sketch). Retrieved from https:\/\/www.cs.bu.edu\/reyzin\/code\/fuzzy.html."},{"key":"e_1_2_1_27_1","doi-asserted-by":"crossref","unstructured":"M. Savvides B. V. K. Vijaya Kumar and P. K. Khosla. 2004. Cancelable biometric filters for face recognition. In ICPR.  M. Savvides B. V. K. Vijaya Kumar and P. K. Khosla. 2004. Cancelable biometric filters for face recognition. In ICPR.","DOI":"10.1109\/ICPR.2004.1334679"},{"key":"e_1_2_1_28_1","volume-title":"NTL: A Library for doing Number Theory.","author":"Shoup Victor","year":"2015","unstructured":"Victor Shoup . 2015 . NTL: A Library for doing Number Theory. Retrieved from http:\/\/www.shoup.net\/ntl. Victor Shoup. 2015. NTL: A Library for doing Number Theory. Retrieved from http:\/\/www.shoup.net\/ntl."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.24"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.250"},{"volume-title":"International Conference of the Biometrics Special Interest Group (BIOSIG). 1--12","author":"Topcu B.","key":"e_1_2_1_31_1","unstructured":"B. Topcu , H. Erdogan , C. Karabat , and B. Yanikoglu . 2013. Biohashing with fingerprint spectral minutiae . In International Conference of the Biometrics Special Interest Group (BIOSIG). 1--12 . B. Topcu, H. Erdogan, C. Karabat, and B. Yanikoglu. 2013. Biohashing with fingerprint spectral minutiae. In International Conference of the Biometrics Special Interest Group (BIOSIG). 1--12."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2046965"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2012.05.004"},{"key":"e_1_2_1_34_1","volume-title":"A fingerprint based bio-cryptographic security protocol designed for client\/server authentication in mobile computing environment. Security Comm. Networks (dec","author":"Xi Kai","year":"2010","unstructured":"Kai Xi , Tohari Ahmad , Fengling Han , and Jiankun Hu. 2010. A fingerprint based bio-cryptographic security protocol designed for client\/server authentication in mobile computing environment. Security Comm. Networks (dec . 2010 ). Kai Xi, Tohari Ahmad, Fengling Han, and Jiankun Hu. 2010. A fingerprint based bio-cryptographic security protocol designed for client\/server authentication in mobile computing environment. Security Comm. Networks (dec. 2010)."},{"key":"e_1_2_1_35_1","volume-title":"IEEE Conference on Industrial Electronics and Applications.","author":"Xi Kai","year":"2009","unstructured":"Kai Xi and Jiankun Hu . 2009 . Dual layer structure check (DLSC) fingerprint verification scheme designed for biometric mobile template protection . In IEEE Conference on Industrial Electronics and Applications. Kai Xi and Jiankun Hu. 2009. Dual layer structure check (DLSC) fingerprint verification scheme designed for biometric mobile template protection. In IEEE Conference on Industrial Electronics and Applications."},{"volume-title":"An alignment free fingerprint fuzzy extractor using near-equivalent dual layer structure check (NeDLSC) algorithm","author":"Xi Kai","key":"e_1_2_1_36_1","unstructured":"Kai Xi , Jiankun Hu , and Fengling Han . 2011a. An alignment free fingerprint fuzzy extractor using near-equivalent dual layer structure check (NeDLSC) algorithm . In ICIEA. Kai Xi, Jiankun Hu, and Fengling Han. 2011a. An alignment free fingerprint fuzzy extractor using near-equivalent dual layer structure check (NeDLSC) algorithm. In ICIEA."},{"volume-title":"Statistical analysis and security estimation of fingerprint minutia local structure in bio-cryptographic system","author":"Xi Kai","key":"e_1_2_1_37_1","unstructured":"Kai Xi , Jiankun Hu , and Fengling Han . 2011b. Statistical analysis and security estimation of fingerprint minutia local structure in bio-cryptographic system . In IEEE ICIEA. Kai Xi, Jiankun Hu, and Fengling Han. 2011b. Statistical analysis and security estimation of fingerprint minutia local structure in bio-cryptographic system. In IEEE ICIEA."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2013.10.001"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2012.23"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2328095"},{"key":"e_1_2_1_41_1","unstructured":"Weiwei Zhang and Yangsheng Wang. 2002. Core-based structure matching algorithm of fingerprint verification. In ICPR.   Weiwei Zhang and Yangsheng Wang. 2002. Core-based structure matching algorithm of fingerprint verification. In ICPR."}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2930669","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2930669","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:56:25Z","timestamp":1750222585000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2930669"}},"subtitle":["A SViT-Based Fuzzy Extractor Framework"],"short-title":[],"issued":{"date-parts":[[2016,8,2]]},"references-count":41,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,9]]}},"alternative-id":["10.1145\/2930669"],"URL":"https:\/\/doi.org\/10.1145\/2930669","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"type":"print","value":"1539-9087"},{"type":"electronic","value":"1558-3465"}],"subject":[],"published":{"date-parts":[[2016,8,2]]},"assertion":[{"value":"2015-07-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-04-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-08-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}