{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T22:47:53Z","timestamp":1773355673604,"version":"3.50.1"},"reference-count":27,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2012,4,26]],"date-time":"2012-04-26T00:00:00Z","timestamp":1335398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>In a biometric authentication system using protected templates, a pseudonymous identifier is the part of a protected template that can be directly compared. Each compared pair of pseudonymous identifiers results in a decision testing whether both identifiers are derived from the same biometric characteristic. Compared to an unprotected system, most existing biometric template protection methods cause to a certain extent degradation in biometric performance. Fusion is therefore a promising way to enhance the biometric performance in template-protected biometric systems. Compared to feature level fusion and score level fusion, decision level fusion has not only the least fusion complexity, but also the maximum interoperability across different biometric features, template protection and recognition algorithms, templates formats, and comparison score rules. However, performance improvement via decision level fusion is not obvious. It is influenced by both the dependency and the performance gap among the conducted tests for fusion. We investigate in this paper several fusion scenarios (multi-sample, multi-instance, multi-sensor, multi-algorithm, and their combinations) on the binary decision level, and evaluate their biometric performance and fusion efficiency on a multi-sensor fingerprint database with 71,994 samples.<\/jats:p>","DOI":"10.3390\/s120505246","type":"journal-article","created":{"date-parts":[[2012,4,26]],"date-time":"2012-04-26T11:04:10Z","timestamp":1335438250000},"page":"5246-5272","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Performance Evaluation of Fusing Protected Fingerprint Minutiae Templates on the Decision Level"],"prefix":"10.3390","volume":"12","author":[{"given":"Bian","family":"Yang","sequence":"first","affiliation":[{"name":"Norwegian Biometric Laboratory, Gj\u00f8vik University College, Teknologivegen 22, N2802 Gj\u00f8vik, Norway"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Christoph","family":"Busch","sequence":"additional","affiliation":[{"name":"Norwegian Biometric Laboratory, Gj\u00f8vik University College, Teknologivegen 22, N2802 Gj\u00f8vik, Norway"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Koen","family":"De Groot","sequence":"additional","affiliation":[{"name":"Philips Research Eindhoven, High Tech Campus 5, 5656 AE Eindhoven, The Netherlands"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Haiyun","family":"Xu","sequence":"additional","affiliation":[{"name":"Faculty EEMCS at University of Twente, P.O. Box 217, 7500 AE Enschede, The Netherlands"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Raymond N. J.","family":"Veldhuis","sequence":"additional","affiliation":[{"name":"Faculty EEMCS at University of Twente, P.O. Box 217, 7500 AE Enschede, The Netherlands"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1968","published-online":{"date-parts":[[2012,4,26]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Juels, A., and Wattenberg, M. (1999, January 1\u20134). A fuzzy Commitment Scheme. Singapore.","DOI":"10.1145\/319709.319714"},{"key":"ref_2","unstructured":"Juels, A., and Sudan, M. (July, January 30). A Fuzzy Vault Scheme. Lausanne, Switzerland."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1892","DOI":"10.1109\/TPAMI.2006.250","article-title":"Random multispace quantisation as an analytic mechanism for biohashing of biometric and random identity inputs","volume":"28","author":"Teoh","year":"2006","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"561","DOI":"10.1109\/TPAMI.2007.1004","article-title":"Generating cancelable fingerprint templates","volume":"29","author":"Ratha","year":"2007","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Boult, T.E., Scheirer, W.J., and Woodworth, R. (2007, January 18\u201323). Revocable Fingerprint Biotokens: Accuracy and Security Analysis. Minneapolis, MN, USA.","DOI":"10.1109\/CVPR.2007.383110"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1109\/TIFS.2009.2021692","article-title":"Fingerprint verification using spectral minutiae representations","volume":"4","author":"Xu","year":"2009","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Bringer, J., and Despiegel, V. (2010, January 27\u201329). Binary Feature Vector Fingerprint Representation from Minutiae Vicinities. Washington, DC, USA.","DOI":"10.1109\/BTAS.2010.5634488"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Yang, B., and Busch, C. (2010, January 27\u201329). Dynamic Random Projection for Biometric Template Protection. Washington, DC, USA.","DOI":"10.1109\/BTAS.2010.5634538"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1137\/060651380","article-title":"Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data","volume":"38","author":"Dodis","year":"2008","journal-title":"SIAM J. Comput."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1109\/TIFS.2007.902022","article-title":"Protecting biometric templates with sketch: Theory and practice","volume":"2","author":"Sutcu","year":"2007","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_11","unstructured":"(2011). Information Technology\u2014Security Techniques\u2014Biometric Information Protection. ISO\/IEC IS 24745, International Organization for Standardization."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Jain, A.K., Nandakumar, K., and Nagar, A. (2008). Biometric Template Security. EURASIP J. Adv. Signal Process., 2008.","DOI":"10.1155\/2008\/579416"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Nagara, A., Nandakumar, K., and Jain, A.K. (2010, January 17\u201321). Biometric Template Transformation: A Security Analysis. San Jose, USA.","DOI":"10.1117\/12.839976"},{"key":"ref_14","unstructured":"(2007). Information Technology\u2014Biometrics\u2014Multimodal and Other Multibiometric Fusion. ISO\/IEC TR 24722, International Organization for Standardization."},{"key":"ref_15","unstructured":"EU-FP7 project Trusted Revocable Biometric Identities. Available online: http:\/\/www.turbine-project.eu\/ (accessed on 21 February 2012)."},{"key":"ref_16","unstructured":"Simoens, K. TURBINE Security Assessment: How to Build Trust. Available online: http:\/\/www.turbine-project.eu\/dowloads\/Day1.4.3.TURBINE_Workshop_17012011_K.Simoens.pdf (accessed on 21 February 2012)."},{"key":"ref_17","unstructured":"GUC100 Multi-sensor Fingerprint Database. Available online: http:\/\/www.nislab.no\/guc100\/ (accessed on 21 February 2012)."},{"key":"ref_18","unstructured":"(2007). Information Technology\u2014Biometric Data Interchange Formats\u2014Part 2: Finger Minutiae Data. ISO\/IEC IS 19794-2, International Organization for Standardization."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Simoens, K., Tuyls, P., and Preneel, B. (2009, January 17\u201320). Privacy Weaknesses in Biometric Sketches. Oakland, CA, USA.","DOI":"10.1109\/SP.2009.24"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1109\/TIFS.2010.2091637","article-title":"Preventing the Decodability Attack Based Cross-Matching in a Fuzzy Commitment Scheme","volume":"6","author":"Kelkboom","year":"2011","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Scheirer, W.J., and Boult, T.E. (2007, January 11\u201313). Cracking Fuzzy Vaults and Biometric Encryption. Baltimore, MD, USA.","DOI":"10.1109\/BCC.2007.4430534"},{"key":"ref_22","unstructured":"Mihailescu, P., Munk, A., and Tams, B. (2009, January 17\u201318). The Fuzzy Vault for Fingerprints is Vulnerable to Brute Force Attack. Darmstadt, Germany."},{"key":"ref_23","unstructured":"Bringer, J., Chabanne, H., Kevenaar, T.A.M., and Kindarji, B. Extending Match-On-Card to Local Biometric Identification. LNCS 5707."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1789","DOI":"10.1016\/j.patcog.2009.11.018","article-title":"Performance evaluation of score level fusion in multimodal biometric systems","volume":"43","author":"He","year":"2010","journal-title":"Pattern Recognit."},{"key":"ref_25","unstructured":"Daugman, J. Combining Multiple Biometrics. Available online: http:\/\/www.cl.cam.ac.uk\/~jgd1000\/combine\/combine.html\/ (accessed on 21 February 2012)."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"861","DOI":"10.1016\/S0031-3203(01)00103-0","article-title":"Decision-level fusion in biometric verification","volume":"35","author":"Prabhakar","year":"2002","journal-title":"Pattern Recognit."},{"key":"ref_27","unstructured":"NIST Fingerprint Image Quality (NFIQ). Available online: http:\/\/www.nist.gov\/itl\/iad\/ig\/nbis.cfm\/ (accessed on 9 April 2012)."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/12\/5\/5246\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T21:49:59Z","timestamp":1760219399000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/12\/5\/5246"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,4,26]]},"references-count":27,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2012,5]]}},"alternative-id":["s120505246"],"URL":"https:\/\/doi.org\/10.3390\/s120505246","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,4,26]]}}}