A review on performance, security and various biometric template protection schemes for biometric authentication systems

A Sarkar, BK Singh - Multimedia Tools and Applications, 2020 - Springer
Identifying a person based on their behavioral and biological qualities in an automated
manner is called biometrics. The authentication system substituting traditional password and …

Biometric template protection: A systematic literature review of approaches and modalities

M Sandhya, MVNK Prasad - … and Privacy: Opportunities & Challenges in …, 2017 - Springer
With the emergence of biometric authentication systems, template protection for biometrics
captured attention in the recent years. The privacy concern arises due to storage and misuse …

Privacy protection for e-health systems by means of dynamic authentication and three-factor key agreement

L Zhang, Y Zhang, S Tang, H Luo - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
During the past decade, the electronic healthcare (e-health) system has been evolved into a
more patient-oriented service with smaller and smarter wireless devices. However, these …

Biometric cryptosystems: a new biometric key binding and its implementation for fingerprint minutiae-based representation

Z Jin, ABJ Teoh, BM Goi, YH Tay - Pattern Recognition, 2016 - Elsevier
Despite fuzzy commitment (FC) is a theoretically sound biometric-key binding scheme, it
relies on error correction code (ECC) completely to mitigate biometric intra-user variations …

Entropy measurement for biometric verification systems

MH Lim, PC Yuen - IEEE transactions on cybernetics, 2015 - ieeexplore.ieee.org
Biometric verification systems are designed to accept multiple similar biometric
measurements per user due to inherent intrauser variations in the biometric data. This is …

Cancelable multibiometrics template security using deep binarization and secure hashing

A Singh, YN Singh - International Journal of Pattern Recognition and …, 2023 - World Scientific
Template security and privacy is of utmost significance while designing a biometric system.
Several biometric template protection systems have been presented in the past, but none of …

Computational fuzzy extractor from LWE

Y Zhou, S Liu, N Cui - Theoretical Computer Science, 2023 - Elsevier
Fuzzy extractors are able to derive uniform and stable strings from noisy sources. Traditional
fuzzy extractors are defined as information-theoretical primitive. Unfortunately, the …

Privacy-preserving and efficient truly three-factor authentication scheme for telecare medical information systems

D Xu, J Chen, S Zhang, Q Liu - Journal of medical systems, 2018 - Springer
Significant development of information technologies has made Telecare Medical Information
Systems (TMISs) increasingly popular. In a TMIS, patients upload their medical data through …

A review on different biometric template protection methods

A Sarkar, BK Singh - Recent Advances in Computer Science …, 2021 - ingentaconnect.com
Biometrics is a universally used automatic identification of persons, depending on their
behavioral and biological quality. Biometric authentication represents a significant role in the …

A new design for alignment-free chaffed cancelable iris key binding scheme

TY Chai, BM Goi, YH Tay, Z Jin - Symmetry, 2019 - mdpi.com
Iris has been found to be unique and consistent over time despite its random nature.
Unprotected biometric (iris) template raises concerns in security and privacy, as numerous …