A review on protection and cancelable techniques in biometric systems
JC Bernal-Romero, JM Ramirez-Cortes… - Ieee …, 2023 - ieeexplore.ieee.org
An essential part of cloud computing, IoT, and in general the broad field of digital systems, is
constituted by the mechanisms which provide access to a number of services or …
constituted by the mechanisms which provide access to a number of services or …
Towards efficient privacy-preserving face recognition in the cloud
Face recognition (FR) has become increasingly significant in many computer vision
applications. However, with the rapid deployment of FR, the privacy of face images has been …
applications. However, with the rapid deployment of FR, the privacy of face images has been …
Privacy-preserving face recognition method based on extensible feature extraction
W Hu, D Zhou, Z Zhu, T Qiao, Y Yao… - Journal of Visual …, 2024 - Elsevier
Face recognition (FR) technique has become a pervasive and ubiquitous part of daily lives,
from unlocking our smartphones with a glance to being scanned by surveillance cameras in …
from unlocking our smartphones with a glance to being scanned by surveillance cameras in …
A taxonomy of biometric system vulnerabilities and defences
The interest in biometric technology is received much attention in the recent years. However,
the security issue still persists the main challenge for the reliable functioning of biometric …
the security issue still persists the main challenge for the reliable functioning of biometric …
[图书][B] Biometrics: from fiction to practice
YE Du - 2013 - books.google.com
This book introduces readers to the basic concepts, classical approaches, and the newest
design, development, and applications of biometrics. It also provides a glimpse of future …
design, development, and applications of biometrics. It also provides a glimpse of future …
A hybrid approach to protect palmprint templates
H Liu, D Sun, K Xiong, Z Qiu - The Scientific World Journal, 2014 - Wiley Online Library
Biometric template protection is indispensable to protect personal privacy in large‐scale
deployment of biometric systems. Accuracy, changeability, and security are three critical …
deployment of biometric systems. Accuracy, changeability, and security are three critical …
On random transformations for changeable face verification
Y Wang, D Hatzinakos - … Systems, Man, and Cybernetics, Part B …, 2010 - ieeexplore.ieee.org
The generation of changeable and privacy-preserving biometric templates is important for
the pervasive deployment of biometric technology in a wide variety of applications. This …
the pervasive deployment of biometric technology in a wide variety of applications. This …
Cancelable face recognition using random multiplicative transform
Y Wang, D Hatzinakos - 2010 20th International Conference on …, 2010 - ieeexplore.ieee.org
The generation of cancelable and privacy preserving biometric templates is important for the
pervasive deployment of biometric technology in a wide variety of applications. This paper …
pervasive deployment of biometric technology in a wide variety of applications. This paper …
Effective web service retrieval based on clustering
D Shou, CH Chi - 2008 Fourth International Conference on …, 2008 - ieeexplore.ieee.org
Due to user¿ s inability to define his service requirement in a precise way, the services
returned by service search engine (SSE) are mostly inadequate or inaccurate. Taking a …
returned by service search engine (SSE) are mostly inadequate or inaccurate. Taking a …