A survey on biometric cryptosystems and their applications

S Sharma, A Saini, S Chaudhury - Computers & Security, 2023 - Elsevier
Biometric systems (BSs) have shown prominent results in providing secure authentication
protocols and a unique identification ecosystem for various applications. Over the years …

Multibiometric fusion strategy and its applications: A review

SKS Modak, VK Jha - Information Fusion, 2019 - Elsevier
The unimodal biometric based system faced several inherent problems like lack of
uniqueness, intra-class variation, non-universality, noisy data (presence of dirt on the …

[HTML][HTML] Biometric template attacks and recent protection mechanisms: A survey

SM Abdullahi, S Sun, B Wang, N Wei, H Wang - Information Fusion, 2024 - Elsevier
It is an undeniable fact that biometric recognition systems are susceptible to different
software-related or template attacks at different vulnerable points in the biometric …

Alignment-robust cancelable biometric scheme for iris verification

MJ Lee, Z Jin, SN Liang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In this paper, we propose a histogram of oriented gradient inspired cancelable biometrics–
Random Augmented Histogram of Gradients (HoG) for iris template protection. The …

A critical survey of the security and privacy aspects of the Aadhaar framework

D Sadhya, T Sahu - Computers & Security, 2024 - Elsevier
Aadhaar is an identification document issued by the Unique Identification Authority of India
(UIDAI) to the residents of India. It contains a 12-digit unique identification number (known …

[HTML][HTML] Machine vision gait-based biometric cryptosystem using a fuzzy commitment scheme

LA Elrefaei, AM Al-Mohammadi - Journal of King Saud University-Computer …, 2022 - Elsevier
In this paper, a fuzzy commitment scheme is applied with a machine vision gait-based
biometric system to enhance system security. The proposed biometric cryptosystem has two …

A novel biometric crypto system based on cryptographic key binding with user biometrics

R Asthana, GS Walia, A Gupta - Multimedia Systems, 2021 - Springer
Cryptography plays a significant role in ensuring data security and confidentiality. The
security provided by a crypto system mainly depends on the secrecy of the cryptographic …

One touch multi-banking transaction ATM system using biometric and GSM authentication

A Taralekar, G Chouhan, R Tangade… - … Conference on Big …, 2017 - ieeexplore.ieee.org
Every individuals has multiple bank accounts in different banks, people's need to carry
multiple ATM cards for transaction, there may be different PINs for every account. In …

Cancelable biometrics vault: A secure key-binding biometric cryptosystem based on chaffing and winnowing

O Ouda, K Nandakumar, A Ross - 2020 25th International …, 2021 - ieeexplore.ieee.org
Existing key-binding biometric cryptosystems, such as the Fuzzy Vault Scheme (FVS) and
Fuzzy Commitment Scheme (FCS), employ Error Correcting Codes (ECC) to handle intra …

Key binding biometrics‐based remote user authentication scheme using smart cards

AA Al‐Saggaf - IET Biometrics, 2018 - Wiley Online Library
Remote user authentication schemes using smart cards provide solutions for securing user
authentication. The schemes rely on passwords or biometric or both, which fall apart if the …