Polynomial Vault: A secure and robust fingerprint based authentication
Syed Sadaf Ali1, Iyyakutti
Iyappan Ganapathi1, Sajid Mahyo2, Surya Prakash1
1Discipline
of Computer Science and Engineering, Indian Institute of Technology Indore,
Indore-453552, India
2Ecole Internationale des Sciences du Traitement de l'Information,
France
* E-mail: phd1301101006@iiti.ac.in, phd1501101002@iiti.ac.in,
mahyosajid@eisti.eu, surya@iiti.ac.in
Code for :
Few examples of sample fingerprint images :
![]() |
![]() |
![]() |
![]() |
![]() |
Few examples of singular and minutiae points detected from the fingerprint sample images shown above
Secured template generated from the fingerprint images using key-set :
![]() |
![]() |
![]() |
![]() |
![]() |