Unleashing the power of disruptive and emerging technologies amid COVID-19: A detailed review

S Agarwal, NS Punn, SK Sonbhadra, M Tanveer… - arXiv preprint arXiv …, 2020 - arxiv.org
The unprecedented outbreak of the novel coronavirus (COVID-19), during early December
2019 in Wuhan, China, has quickly evolved into a global pandemic, became a matter of …

An overview of privacy-enhancing technologies in biometric recognition

P Melzi, C Rathgeb, R Tolosana, R Vera… - ACM Computing …, 2022 - dl.acm.org
Privacy-enhancing technologies are technologies that implement fundamental data
protection principles. With respect to biometric recognition, different types of privacy …

Design choices for central bank digital currency: Policy and technical considerations

S Allen, S Čapkun, I Eyal, G Fanti, BA Ford… - 2020 - nber.org
Central banks around the world are exploring and in some cases even piloting Central Bank
Digital Currencies (CBDCs). CBDCs promise to realize a broad range of new capabilities …

Optical PTFT asymmetric cryptosystem-based secure and efficient cancelable biometric recognition system

A Alarifi, M Amoon, MH Aly, W El-Shafai - IEEE Access, 2020 - ieeexplore.ieee.org
Recently, biometric systems are extensively and commonly utilized for authentication and
verification applications. The security issue and the dependence on a specific biometric for …

Reconstruct face from features based on genetic algorithm using GAN generator as a distribution constraint

X Dong, Z Miao, L Ma, J Shen, Z Jin, Z Guo… - Computers & …, 2023 - Elsevier
Face recognition based on deep convolutional neural networks (CNN) shows superior
accuracy performance attributed to the high discriminative features extracted. Yet, the …

Deep face fuzzy vault: Implementation and performance

C Rathgeb, J Merkle, J Scholz, B Tams… - Computers & …, 2022 - Elsevier
Biometric technologies, especially face recognition, have become an essential part of
identity management systems worldwide. In deployments of biometrics, secure storage of …

A survey on biometric cryptosystems and their applications

S Sharma, A Saini, S Chaudhury - Computers & Security, 2023 - Elsevier
Biometric systems (BSs) have shown prominent results in providing secure authentication
protocols and a unique identification ecosystem for various applications. Over the years …

[HTML][HTML] Discrete transforms and matrix rotation based cancelable face and fingerprint recognition for biometric security applications

AD Algarni, G El Banby, S Ismail, W El-Shafai… - Entropy, 2020 - mdpi.com
The security of information is necessary for the success of any system. So, there is a need to
have a robust mechanism to ensure the verification of any person before allowing him to …

[HTML][HTML] Biometric template attacks and recent protection mechanisms: A survey

SM Abdullahi, S Sun, B Wang, N Wei, H Wang - Information Fusion, 2024 - Elsevier
It is an undeniable fact that biometric recognition systems are susceptible to different
software-related or template attacks at different vulnerable points in the biometric …

A review on protection and cancelable techniques in biometric systems

JC Bernal-Romero, JM Ramirez-Cortes… - Ieee …, 2023 - ieeexplore.ieee.org
An essential part of cloud computing, IoT, and in general the broad field of digital systems, is
constituted by the mechanisms which provide access to a number of services or …