Privacy–enhancing face biometrics: A comprehensive survey
Biometric recognition technology has made significant advances over the last decade and is
now used across a number of services and applications. However, this widespread …
now used across a number of services and applications. However, this widespread …
Comparing fingerprint-based biometrics authentication versus traditional authentication methods for e-payment
O Ogbanufe, DJ Kim - Decision Support Systems, 2018 - Elsevier
Biometrics authentication for electronic payment is generally viewed as a quicker,
convenient and a more secure means to identify and authenticate users for online payment …
convenient and a more secure means to identify and authenticate users for online payment …
[PDF][PDF] Technical issues and challenges of biometric applications as access control tools of information security
Recent advances in biometric technologies coupled with the increased threats in information
security has proliferated the applications of biometric systems to safeguard information and …
security has proliferated the applications of biometric systems to safeguard information and …
A two-factor protection scheme for MCC fingerprint templates
Minutia Cylinder-Code (MCC) is an effective representation for robust and fast fingerprint
matching. To avoid that MCC templates can disclose sensitive information about position …
matching. To avoid that MCC templates can disclose sensitive information about position …
Dynamic random projection for biometric template protection
Random projection provides a good diversification effect for biometric template protection
but is drawing increasing security concerns under the token-stolen (or public parameter) …
but is drawing increasing security concerns under the token-stolen (or public parameter) …
Ipas: Intelligent protection against silent output corruption in scientific applications
This paper presents IPAS, an instruction duplication technique that protects scientific
applications from silent data corruption (SDC) in their output. The motivation for IPAS is that …
applications from silent data corruption (SDC) in their output. The motivation for IPAS is that …
Fingerprint shell: Secure representation of fingerprint template
Fingerprint is a popular biometric modality which is used extensively in several applications
for person authentication, providing high uniqueness and acceptable performance. Most …
for person authentication, providing high uniqueness and acceptable performance. Most …
Robust technique for fingerprint template protection
Fingerprint authentication systems generally save data extracted from fingerprint as minutiae
template in the database. However, it is often found that databases can be attacked and …
template in the database. However, it is often found that databases can be attacked and …
Privacy-enhanced biometrics-secret binding scheme
Generating a distinguishing feature vector by means of a distinguishing feature extractor
module from a raw biomet ric feature of the individual, the distinguishing feature vector being …
module from a raw biomet ric feature of the individual, the distinguishing feature vector being …
A post-quantum fuzzy commitment scheme for biometric template protection: an experimental study
AA Al-Saggaf - IEEE Access, 2021 - ieeexplore.ieee.org
The proliferation and extensive acceptance of biometrics in many sectors is due to its merits
over traditional password-based authentication. Several biometric template protection …
over traditional password-based authentication. Several biometric template protection …