A review on protection and cancelable techniques in biometric systems

JC Bernal-Romero, JM Ramirez-Cortes… - Ieee …, 2023 - ieeexplore.ieee.org
An essential part of cloud computing, IoT, and in general the broad field of digital systems, is
constituted by the mechanisms which provide access to a number of services or …

Towards efficient privacy-preserving face recognition in the cloud

S Guo, T Xiang, X Li - Signal Processing, 2019 - Elsevier
Face recognition (FR) has become increasingly significant in many computer vision
applications. However, with the rapid deployment of FR, the privacy of face images has been …

Privacy-preserving face recognition method based on extensible feature extraction

W Hu, D Zhou, Z Zhu, T Qiao, Y Yao… - Journal of Visual …, 2024 - Elsevier
Face recognition (FR) technique has become a pervasive and ubiquitous part of daily lives,
from unlocking our smartphones with a glance to being scanned by surveillance cameras in …

A taxonomy of biometric system vulnerabilities and defences

YN Singh, SK Singh - International journal of biometrics, 2013 - inderscienceonline.com
The interest in biometric technology is received much attention in the recent years. However,
the security issue still persists the main challenge for the reliable functioning of biometric …

[HTML][HTML] Cancelable biometrics

ATB Jin, LM Hui - Scholarpedia, 2010 - scholarpedia.org
Methods The first attempt towards this direction was recorded by Soutar et al.(1998) but the
concrete idea of cancelable biometrics was furnished by Bolle et al.(2002). This area is …

[图书][B] Biometrics: from fiction to practice

YE Du - 2013 - books.google.com
This book introduces readers to the basic concepts, classical approaches, and the newest
design, development, and applications of biometrics. It also provides a glimpse of future …

A hybrid approach to protect palmprint templates

H Liu, D Sun, K Xiong, Z Qiu - The Scientific World Journal, 2014 - Wiley Online Library
Biometric template protection is indispensable to protect personal privacy in large‐scale
deployment of biometric systems. Accuracy, changeability, and security are three critical …

On random transformations for changeable face verification

Y Wang, D Hatzinakos - … Systems, Man, and Cybernetics, Part B …, 2010 - ieeexplore.ieee.org
The generation of changeable and privacy-preserving biometric templates is important for
the pervasive deployment of biometric technology in a wide variety of applications. This …

Cancelable face recognition using random multiplicative transform

Y Wang, D Hatzinakos - 2010 20th International Conference on …, 2010 - ieeexplore.ieee.org
The generation of cancelable and privacy preserving biometric templates is important for the
pervasive deployment of biometric technology in a wide variety of applications. This paper …

Effective web service retrieval based on clustering

D Shou, CH Chi - 2008 Fourth International Conference on …, 2008 - ieeexplore.ieee.org
Due to user¿ s inability to define his service requirement in a precise way, the services
returned by service search engine (SSE) are mostly inadequate or inaccurate. Taking a …