Blind authentication: a secure crypto-biometric verification protocol

M Upmanyu, AM Namboodiri… - IEEE transactions on …, 2010 - ieeexplore.ieee.org
Concerns on widespread use of biometric authentication systems are primarily centered
around template security, revocability, and privacy. The use of cryptographic primitives to …

Assessment of geometric features for individual identification and verification in biometric hand systems

RM Luque-Baena, D Elizondo, E López-Rubio… - Expert systems with …, 2013 - Elsevier
This paper studies the reliability of geometric features for the identification of users based on
hand biometrics. Our methodology is based on genetic algorithms and mutual information …

Biometric recognition through 3D ultrasound hand geometry

A Iula - Ultrasonics, 2021 - Elsevier
Biometric recognition systems based on ultrasonic images have several advantages over
other technologies, including the capability of capturing 3D images and detecting liveness …

Biometric privacy through hand geometry-a survey

K Přihodová, M Hub - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
Reliable authentication is a key factor in ensuring data security. Information systems
requiring a high level of data security do not use passwords that are considered to be too …

Writer identification approach by holistic graphometric features using off-line handwritten words

JL Vasquez, AG Ravelo-Garcia, JB Alonso… - Neural Computing and …, 2020 - Springer
The biometric identification is an important topic with applications in different fields. Among
the different modalities, based-handwriting biometric is a very useful and extended modality …

The application of hierarchical clustering algorithms for recognition using biometrics of the hand

L Sousa, J Gama - 2014 - repositorio.ipv.pt
In data analysis, the hierarchical clustering algorithms are powerful tools allowing to identify
natural clusters, often without any priori information of the data structure, and are quite often …

Biometric dispersion matcher

J Fabregas, M Faundez-Zanuy - Pattern Recognition, 2008 - Elsevier
In this paper we propose a new classifier called a dispersion matcher. Our proposal is
especially well adapted to those scenarios where a large number of classes and a small …

Personal authentication using hand geometry

B Aghili, H Sadjedi - 2009 International Conference on …, 2009 - ieeexplore.ieee.org
This paper presents an approach to personal verification and identification using hand
geometry. Having extracted, fifteen features of users' right hand, Fingers' width, Area and …

Discriminative training of spiking neural networks organised in columns for stream‐based biometric authentication

E Argones Rúa, T Van Hamme, D Preuveneers… - IET …, 2022 - Wiley Online Library
Stream‐based biometric authentication using a novel approach based on spiking neural
networks (SNNs) is addressed. SNNs have proven advantages regarding energy …

[PDF][PDF] Efficient Privacy Preserving Protocols for Visual Computation

M Upmanyu - 2010 - cdn.iiit.ac.in
The rapid expansion of the Internet is receiving a great deal of attention world-wide. The
technological developments and the increase in online communications have played a vital …