A perspective analysis of handwritten signature technology
Handwritten signatures are biometric traits at the center of debate in the scientific
community. Over the last 40 years, the interest in signature studies has grown steadily …
community. Over the last 40 years, the interest in signature studies has grown steadily …
Review of key‐binding‐based biometric data protection schemes
With the advent of modern technology, the use of biometric authentication systems has been
on the rise. The core of any biometric system consists of a database which contains the …
on the rise. The core of any biometric system consists of a database which contains the …
Handwritten signature verification: New advancements and open issues
D Impedovo, G Pirlo… - … Conference on Frontiers in …, 2012 - ieeexplore.ieee.org
Recently, research in handwritten signature verification has been considered with renewed
interest. In fact, in the age of e-society, handwritten signature still represents an …
interest. In fact, in the age of e-society, handwritten signature still represents an …
A bio-cryptographic system based on offline signature images
In bio-cryptography, biometric traits are replacing traditional passwords for secure exchange
of cryptographic keys. The Fuzzy Vault (FV) scheme has been successfully employed to …
of cryptographic keys. The Fuzzy Vault (FV) scheme has been successfully employed to …
Fuzzy feature selection with key-based cryptographic transformations
M Nkongolo - arXiv preprint arXiv:2306.09583, 2023 - arxiv.org
In the field of cryptography, the selection of relevant features plays a crucial role in
enhancing the security and efficiency of cryptographic algorithms. This paper presents a …
enhancing the security and efficiency of cryptographic algorithms. This paper presents a …
On the dissimilarity representation and prototype selection for signature-based bio-cryptographic systems
Robust bio-cryptographic schemes employ encoding methods where a short message is
extracted from biometric samples to encode cryptographic keys. This approach implies …
extracted from biometric samples to encode cryptographic keys. This approach implies …
User verification using safe handwritten passwords on smartphones
T Kutzner, F Ye, I Bönninger, C Travieso… - 2015 Eighth …, 2015 - ieeexplore.ieee.org
This article focuses on the writer verification using safe handwritten passwords on
smartphones. We extract and select 25 static and dynamic biometric features from a …
smartphones. We extract and select 25 static and dynamic biometric features from a …
Temporal phase congruency
PJ Myerscough, MS Nixon - 6th IEEE Southwest Symposium …, 2004 - ieeexplore.ieee.org
We describe a robust moving feature detector that extracts feature points and feature
velocities from a sequence of images. We develop a new approach based on phase …
velocities from a sequence of images. We develop a new approach based on phase …
Gradient-based facial encoding for key generation to encrypt and decrypt multimedia data
AK Patel, D Paul, S Chaudhary, S Giri - arXiv preprint arXiv:2412.06927, 2024 - arxiv.org
Password-based security is prone to forgetting, guessing, and hacking. Similarly, standalone
biometric-based security is susceptible to template spoofing and replay attacks. This paper …
biometric-based security is susceptible to template spoofing and replay attacks. This paper …
A Dissimilarity-Based Approach for Biometric Fuzzy Vaults–Application to Handwritten Signature Images
Bio-Cryptographic systems enforce authenticity of cryptogra-phic applications like data
encryption and digital signatures. Instead of simple user passwords, biometrics, such as …
encryption and digital signatures. Instead of simple user passwords, biometrics, such as …