A survey on biometric cryptosystems and their applications
S Sharma, A Saini, S Chaudhury - Computers & Security, 2023 - Elsevier
Biometric systems (BSs) have shown prominent results in providing secure authentication
protocols and a unique identification ecosystem for various applications. Over the years …
protocols and a unique identification ecosystem for various applications. Over the years …
Multibiometric fusion strategy and its applications: A review
The unimodal biometric based system faced several inherent problems like lack of
uniqueness, intra-class variation, non-universality, noisy data (presence of dirt on the …
uniqueness, intra-class variation, non-universality, noisy data (presence of dirt on the …
[HTML][HTML] Biometric template attacks and recent protection mechanisms: A survey
SM Abdullahi, S Sun, B Wang, N Wei, H Wang - Information Fusion, 2024 - Elsevier
It is an undeniable fact that biometric recognition systems are susceptible to different
software-related or template attacks at different vulnerable points in the biometric …
software-related or template attacks at different vulnerable points in the biometric …
Alignment-robust cancelable biometric scheme for iris verification
In this paper, we propose a histogram of oriented gradient inspired cancelable biometrics–
Random Augmented Histogram of Gradients (HoG) for iris template protection. The …
Random Augmented Histogram of Gradients (HoG) for iris template protection. The …
A critical survey of the security and privacy aspects of the Aadhaar framework
D Sadhya, T Sahu - Computers & Security, 2024 - Elsevier
Aadhaar is an identification document issued by the Unique Identification Authority of India
(UIDAI) to the residents of India. It contains a 12-digit unique identification number (known …
(UIDAI) to the residents of India. It contains a 12-digit unique identification number (known …
[HTML][HTML] Machine vision gait-based biometric cryptosystem using a fuzzy commitment scheme
LA Elrefaei, AM Al-Mohammadi - Journal of King Saud University-Computer …, 2022 - Elsevier
In this paper, a fuzzy commitment scheme is applied with a machine vision gait-based
biometric system to enhance system security. The proposed biometric cryptosystem has two …
biometric system to enhance system security. The proposed biometric cryptosystem has two …
A novel biometric crypto system based on cryptographic key binding with user biometrics
R Asthana, GS Walia, A Gupta - Multimedia Systems, 2021 - Springer
Cryptography plays a significant role in ensuring data security and confidentiality. The
security provided by a crypto system mainly depends on the secrecy of the cryptographic …
security provided by a crypto system mainly depends on the secrecy of the cryptographic …
One touch multi-banking transaction ATM system using biometric and GSM authentication
A Taralekar, G Chouhan, R Tangade… - … Conference on Big …, 2017 - ieeexplore.ieee.org
Every individuals has multiple bank accounts in different banks, people's need to carry
multiple ATM cards for transaction, there may be different PINs for every account. In …
multiple ATM cards for transaction, there may be different PINs for every account. In …
Cancelable biometrics vault: A secure key-binding biometric cryptosystem based on chaffing and winnowing
Existing key-binding biometric cryptosystems, such as the Fuzzy Vault Scheme (FVS) and
Fuzzy Commitment Scheme (FCS), employ Error Correcting Codes (ECC) to handle intra …
Fuzzy Commitment Scheme (FCS), employ Error Correcting Codes (ECC) to handle intra …
Key binding biometrics‐based remote user authentication scheme using smart cards
AA Al‐Saggaf - IET Biometrics, 2018 - Wiley Online Library
Remote user authentication schemes using smart cards provide solutions for securing user
authentication. The schemes rely on passwords or biometric or both, which fall apart if the …
authentication. The schemes rely on passwords or biometric or both, which fall apart if the …