A review on performance, security and various biometric template protection schemes for biometric authentication systems
Identifying a person based on their behavioral and biological qualities in an automated
manner is called biometrics. The authentication system substituting traditional password and …
manner is called biometrics. The authentication system substituting traditional password and …
Biometric template protection: A systematic literature review of approaches and modalities
M Sandhya, MVNK Prasad - … and Privacy: Opportunities & Challenges in …, 2017 - Springer
With the emergence of biometric authentication systems, template protection for biometrics
captured attention in the recent years. The privacy concern arises due to storage and misuse …
captured attention in the recent years. The privacy concern arises due to storage and misuse …
Privacy protection for e-health systems by means of dynamic authentication and three-factor key agreement
L Zhang, Y Zhang, S Tang, H Luo - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
During the past decade, the electronic healthcare (e-health) system has been evolved into a
more patient-oriented service with smaller and smarter wireless devices. However, these …
more patient-oriented service with smaller and smarter wireless devices. However, these …
Biometric cryptosystems: a new biometric key binding and its implementation for fingerprint minutiae-based representation
Despite fuzzy commitment (FC) is a theoretically sound biometric-key binding scheme, it
relies on error correction code (ECC) completely to mitigate biometric intra-user variations …
relies on error correction code (ECC) completely to mitigate biometric intra-user variations …
Entropy measurement for biometric verification systems
Biometric verification systems are designed to accept multiple similar biometric
measurements per user due to inherent intrauser variations in the biometric data. This is …
measurements per user due to inherent intrauser variations in the biometric data. This is …
Cancelable multibiometrics template security using deep binarization and secure hashing
Template security and privacy is of utmost significance while designing a biometric system.
Several biometric template protection systems have been presented in the past, but none of …
Several biometric template protection systems have been presented in the past, but none of …
Computational fuzzy extractor from LWE
Y Zhou, S Liu, N Cui - Theoretical Computer Science, 2023 - Elsevier
Fuzzy extractors are able to derive uniform and stable strings from noisy sources. Traditional
fuzzy extractors are defined as information-theoretical primitive. Unfortunately, the …
fuzzy extractors are defined as information-theoretical primitive. Unfortunately, the …
Privacy-preserving and efficient truly three-factor authentication scheme for telecare medical information systems
Significant development of information technologies has made Telecare Medical Information
Systems (TMISs) increasingly popular. In a TMIS, patients upload their medical data through …
Systems (TMISs) increasingly popular. In a TMIS, patients upload their medical data through …
A review on different biometric template protection methods
Biometrics is a universally used automatic identification of persons, depending on their
behavioral and biological quality. Biometric authentication represents a significant role in the …
behavioral and biological quality. Biometric authentication represents a significant role in the …
A new design for alignment-free chaffed cancelable iris key binding scheme
Iris has been found to be unique and consistent over time despite its random nature.
Unprotected biometric (iris) template raises concerns in security and privacy, as numerous …
Unprotected biometric (iris) template raises concerns in security and privacy, as numerous …