A survey on biometric cryptosystems and their applications
S Sharma, A Saini, S Chaudhury - Computers & Security, 2023 - Elsevier
Biometric systems (BSs) have shown prominent results in providing secure authentication
protocols and a unique identification ecosystem for various applications. Over the years …
protocols and a unique identification ecosystem for various applications. Over the years …
Efficient implementation of optical scanning holography in cancelable biometrics
FE Abd El-Samie, RM Nassar, M Safan… - Applied Optics, 2021 - opg.optica.org
This paper presents a new trend in biometric security systems, which is cancelable multi-
biometrics. In general, traditional biometric systems depend on a single biometric for …
biometrics. In general, traditional biometric systems depend on a single biometric for …
[HTML][HTML] Machine vision gait-based biometric cryptosystem using a fuzzy commitment scheme
LA Elrefaei, AM Al-Mohammadi - Journal of King Saud University-Computer …, 2022 - Elsevier
In this paper, a fuzzy commitment scheme is applied with a machine vision gait-based
biometric system to enhance system security. The proposed biometric cryptosystem has two …
biometric system to enhance system security. The proposed biometric cryptosystem has two …
Efficient chaotic-Baker-map-based cancelable face recognition
Biometric recognition schemes are commonly utilized for security purposes. These schemes
face two major challenges: security challenge and reliance on a particular biometric for …
face two major challenges: security challenge and reliance on a particular biometric for …
[PDF][PDF] An Efficient GCD-Based Cancelable Biometric Algorithm for Single and Multiple Biometrics.
Cancelable biometrics are required in most remote access applications that need an
authentication stage such as the cloud and Internet of Things (IoT) networks. The objective …
authentication stage such as the cloud and Internet of Things (IoT) networks. The objective …
[HTML][HTML] Robust biometric identity authentication scheme using quantum voice encryption and quantum secure direct communications for cybersecurity
RI Abdelfatah - Journal of King Saud University-Computer and …, 2024 - Elsevier
A significant problem facing cybersecurity is that most client/server identity authentication
schemes depend on computational complexity which is recently challenged by the super …
schemes depend on computational complexity which is recently challenged by the super …
Efficient multimodal cancelable biometric system based on steganography and cryptography
GM Salama, S El-Gazar, RM Nassar… - Iran Journal of Computer …, 2023 - Springer
Due to the development of hacking programs, it has become easy to penetrate systems.
Hence, there is a need for strong security mechanisms. The use of traditional passwords has …
Hence, there is a need for strong security mechanisms. The use of traditional passwords has …
Efficient Implementation of Cancelable Optical Face Recognition Based on Elliptic Curve Encryption
Most modern authentication systems adopt human biometrics to avoid any shortcomings that
result from forgetting passwords and security codes utilized in traditional systems. To …
result from forgetting passwords and security codes utilized in traditional systems. To …
[PDF][PDF] COMPARISON OF FACIAL RECOGNITION AND FINGERPRINT CLASS ATTENDANCE ON PERFORMANCE METRIC IN DEPARTMENT OF COMPUTER …
B ABDULLAHI - njst.nubamdjournal.com.ng
Academic performance is highly affected by punctuality, as such, administrators of
institutions become worried about regularity of students' attendance. This made some …
institutions become worried about regularity of students' attendance. This made some …
[PDF][PDF] Computer and Information Sciences
LA Elrefaei, AM Al-Mohammadi - 2019 - researchgate.net
abstract In this paper, a fuzzy commitment scheme is applied with a machine vision gait-
based biometric system to enhance system security. The proposed biometric cryptosystem …
based biometric system to enhance system security. The proposed biometric cryptosystem …