Cancelable biometrics: A review
Recent years have seen an exponential growth in the use of various biometric technologies
for trusted automatic recognition of humans. With the rapid adaptation of biometric systems …
for trusted automatic recognition of humans. With the rapid adaptation of biometric systems …
A review on performance, security and various biometric template protection schemes for biometric authentication systems
Identifying a person based on their behavioral and biological qualities in an automated
manner is called biometrics. The authentication system substituting traditional password and …
manner is called biometrics. The authentication system substituting traditional password and …
Performance comparison of intrusion detection systems and application of machine learning to Snort system
SAR Shah, B Issac - Future Generation Computer Systems, 2018 - Elsevier
This study investigates the performance of two open source intrusion detection systems
(IDSs) namely Snort and Suricata for accurately detecting the malicious traffic on computer …
(IDSs) namely Snort and Suricata for accurately detecting the malicious traffic on computer …
Graph matching and learning in pattern recognition in the last 10 years
In this paper, we examine the main advances registered in the last ten years in Pattern
Recognition methodologies based on graph matching and related techniques, analyzing …
Recognition methodologies based on graph matching and related techniques, analyzing …
A cancelable biometric authentication system based on feature-adaptive random projection
Biometric template data protection is critical in preventing user privacy and identity from
leakage. Random projection based cancelable biometrics is an efficient and effective …
leakage. Random projection based cancelable biometrics is an efficient and effective …
A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations
As an important biometric template protection technique, cancelable biometrics provides
enhanced security for biometric-based authentication. Representing biometric information in …
enhanced security for biometric-based authentication. Representing biometric information in …
Robust discrete code modeling for supervised hashing
Recent years have witnessed the promising efficacy and efficiency of hashing (also known
as binary code learning) for retrieving nearest neighbor in large-scale data collections …
as binary code learning) for retrieving nearest neighbor in large-scale data collections …
Design of alignment-free cancelable fingerprint templates via curtailed circular convolution
S Wang, J Hu - Pattern Recognition, 2014 - Elsevier
Fraudulent use of stolen fingerprint data and privacy invasion by tracking individuals
unlawfully with shared or stolen fingerprint data justify the significance of fingerprint template …
unlawfully with shared or stolen fingerprint data justify the significance of fingerprint template …
Cancelable fingerprint template design with randomized non-negative least squares
Although biometrics is considered more competent than password-based or token-based
approach in identity management, biometric templates are vulnerable to adversary attacks …
approach in identity management, biometric templates are vulnerable to adversary attacks …
Alignment-free row-co-occurrence cancelable palmprint fuzzy vault
Texture coding approach of palmprint biometric enjoys several merits; however, palmprint
texture code suffers from alignment problem during matching, which hinders it from being …
texture code suffers from alignment problem during matching, which hinders it from being …