{"title":"基于gh的模糊指纹库验证精度、内存消耗和执行时间的权衡分析","authors":"Sungju Lee, Daesung Moon, W. Choi, Yongwha Chung","doi":"10.1109/SECTECH.2008.25","DOIUrl":null,"url":null,"abstract":"The fuzzy fingerprint vault solution has been proposed as a way to protect the registered fingerprint template, and the geometric hashing solution has been applied to implement it. Although this Geometric Hashing-based fuzzy fingerprint vault solution can solve the auto-alignment problem and provide higher security, it requires more memory space due to the large size of the hash table. To solve this problem, we make the GH-based fuzzy fingerprint vault to be configurable, and study the tradeoffs among the verification accuracy, the memory consumption, and the execution time of it. The experimental results show that the configurable approach can either maximize the verification accuracy or minimize the memory consumption and/or the execution time by setting a performance parameter properly.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Analysis of Tradeoffs among Verification Accuracy, Memory Consumption, and Execution Time in the GH-Based Fuzzy Fingerprint Vault\",\"authors\":\"Sungju Lee, Daesung Moon, W. Choi, Yongwha Chung\",\"doi\":\"10.1109/SECTECH.2008.25\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The fuzzy fingerprint vault solution has been proposed as a way to protect the registered fingerprint template, and the geometric hashing solution has been applied to implement it. Although this Geometric Hashing-based fuzzy fingerprint vault solution can solve the auto-alignment problem and provide higher security, it requires more memory space due to the large size of the hash table. To solve this problem, we make the GH-based fuzzy fingerprint vault to be configurable, and study the tradeoffs among the verification accuracy, the memory consumption, and the execution time of it. The experimental results show that the configurable approach can either maximize the verification accuracy or minimize the memory consumption and/or the execution time by setting a performance parameter properly.\",\"PeriodicalId\":377461,\"journal\":{\"name\":\"2008 International Conference on Security Technology\",\"volume\":\"4 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-12-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 International Conference on Security Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SECTECH.2008.25\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECTECH.2008.25","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analysis of Tradeoffs among Verification Accuracy, Memory Consumption, and Execution Time in the GH-Based Fuzzy Fingerprint Vault
The fuzzy fingerprint vault solution has been proposed as a way to protect the registered fingerprint template, and the geometric hashing solution has been applied to implement it. Although this Geometric Hashing-based fuzzy fingerprint vault solution can solve the auto-alignment problem and provide higher security, it requires more memory space due to the large size of the hash table. To solve this problem, we make the GH-based fuzzy fingerprint vault to be configurable, and study the tradeoffs among the verification accuracy, the memory consumption, and the execution time of it. The experimental results show that the configurable approach can either maximize the verification accuracy or minimize the memory consumption and/or the execution time by setting a performance parameter properly.