A survey on biometric cryptosystems and cancelable biometrics
C Rathgeb, A Uhl - EURASIP journal on information security, 2011 - Springer
Form a privacy perspective most concerns against the common use of biometrics arise from
the storage and misuse of biometric data. Biometric cryptosystems and cancelable …
the storage and misuse of biometric data. Biometric cryptosystems and cancelable …
Multi-biometric template protection: issues and challenges
The term biometrics refers to “automated recognition of individuals based on their behavioral
and biological characteristics”(ISO/IEC JTC1 SC37). Several physiological (static) as well as …
and biological characteristics”(ISO/IEC JTC1 SC37). Several physiological (static) as well as …
Reversing the irreversible: A survey on inverse biometrics
M Gomez-Barrero, J Galbally - Computers & Security, 2020 - Elsevier
With the widespread use of biometric recognition, several issues related to the privacy and
security provided by this technology have been recently raised and analysed. As a result …
security provided by this technology have been recently raised and analysed. As a result …
Privacy and biometrics for smart healthcare systems: attacks, and techniques
A Wells, AB Usman - Information Security Journal: A Global …, 2024 - Taylor & Francis
Biometric technology has various applications in smart healthcare systems, including patient
authentication, health monitoring, telemedicine, clinical decision support, and personalized …
authentication, health monitoring, telemedicine, clinical decision support, and personalized …
[图书][B] Iris biometrics: from segmentation to template security
C Rathgeb, A Uhl, P Wild - 2012 - books.google.com
Iris Biometrics: From Segmentation to Template Security provides critical analysis,
challenges and solutions on recent iris biometric research topics, including image …
challenges and solutions on recent iris biometric research topics, including image …
Security considerations in minutiae-based fuzzy vaults
B Tams, P Mihăilescu, A Munk - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
The fuzzy vault scheme is a cryptographic primitive that can be used to protect human
fingerprint templates where stored. Analyses for most implementations account for brute …
fingerprint templates where stored. Analyses for most implementations account for brute …
A novel fingerprint biometric cryptosystem based on convolutional neural networks
Modern access controls employ biometrics as a means of authentication to a great extent.
For example, biometrics is used as an authentication mechanism implemented on …
For example, biometrics is used as an authentication mechanism implemented on …
Context-based biometric key generation for iris
C Rathgeb, A Uhl - IET computer vision, 2011 - IET
In this study, a generic treatment of how to generate biometric keys from binary biometric
templates is presented. A context-based analysis of iris biometric feature vectors based on …
templates is presented. A context-based analysis of iris biometric feature vectors based on …
Biometric cryptosystem based on discretized fingerprint texture descriptors
Y Imamverdiyev, ABJ Teoh, J Kim - Expert Systems with Applications, 2013 - Elsevier
This paper focuses on a biometric cryptosystem implementation and evaluation based on a
number of fingerprint texture descriptors. The texture descriptors, namely, the Gabor filter …
number of fingerprint texture descriptors. The texture descriptors, namely, the Gabor filter …
Statistical attack against iris-biometric fuzzy commitment schemes
C Rathgeb, A Uhl - CVPR 2011 WORKSHOPS, 2011 - ieeexplore.ieee.org
The fuzzy commitment scheme has been leveraged as a means of biometric template
protection. Binary templates are replaced by helper data which assist the retrieval of …
protection. Binary templates are replaced by helper data which assist the retrieval of …