A survey on biometric cryptosystems and cancelable biometrics

C Rathgeb, A Uhl - EURASIP journal on information security, 2011 - Springer
Form a privacy perspective most concerns against the common use of biometrics arise from
the storage and misuse of biometric data. Biometric cryptosystems and cancelable …

Multi-biometric template protection: issues and challenges

C Rathgeb, C Busch - New trends and developments in …, 2012 - books.google.com
The term biometrics refers to “automated recognition of individuals based on their behavioral
and biological characteristics”(ISO/IEC JTC1 SC37). Several physiological (static) as well as …

Reversing the irreversible: A survey on inverse biometrics

M Gomez-Barrero, J Galbally - Computers & Security, 2020 - Elsevier
With the widespread use of biometric recognition, several issues related to the privacy and
security provided by this technology have been recently raised and analysed. As a result …

Privacy and biometrics for smart healthcare systems: attacks, and techniques

A Wells, AB Usman - Information Security Journal: A Global …, 2024 - Taylor & Francis
Biometric technology has various applications in smart healthcare systems, including patient
authentication, health monitoring, telemedicine, clinical decision support, and personalized …

[图书][B] Iris biometrics: from segmentation to template security

C Rathgeb, A Uhl, P Wild - 2012 - books.google.com
Iris Biometrics: From Segmentation to Template Security provides critical analysis,
challenges and solutions on recent iris biometric research topics, including image …

Security considerations in minutiae-based fuzzy vaults

B Tams, P Mihăilescu, A Munk - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
The fuzzy vault scheme is a cryptographic primitive that can be used to protect human
fingerprint templates where stored. Analyses for most implementations account for brute …

A novel fingerprint biometric cryptosystem based on convolutional neural networks

S Barzut, M Milosavljević, S Adamović, M Saračević… - Mathematics, 2021 - mdpi.com
Modern access controls employ biometrics as a means of authentication to a great extent.
For example, biometrics is used as an authentication mechanism implemented on …

Context-based biometric key generation for iris

C Rathgeb, A Uhl - IET computer vision, 2011 - IET
In this study, a generic treatment of how to generate biometric keys from binary biometric
templates is presented. A context-based analysis of iris biometric feature vectors based on …

Biometric cryptosystem based on discretized fingerprint texture descriptors

Y Imamverdiyev, ABJ Teoh, J Kim - Expert Systems with Applications, 2013 - Elsevier
This paper focuses on a biometric cryptosystem implementation and evaluation based on a
number of fingerprint texture descriptors. The texture descriptors, namely, the Gabor filter …

Statistical attack against iris-biometric fuzzy commitment schemes

C Rathgeb, A Uhl - CVPR 2011 WORKSHOPS, 2011 - ieeexplore.ieee.org
The fuzzy commitment scheme has been leveraged as a means of biometric template
protection. Binary templates are replaced by helper data which assist the retrieval of …