Incorporating iris, fingerprint and face biometric for fraud prevention in e‐passports using fuzzy vault

K Bobkowska, K Nagaty, M Przyborski - IET Image Processing, 2019 - Wiley Online Library
A unified framework which provides a higher security level to e‐passports is proposed. This
framework integrates face, iris and fingerprint images. It involves three layers of security: the …

[图书][B] Encyclopedia of image processing

PA Laplante - 2018 - books.google.com
The Encyclopedia of Image Processing presents a vast collection of well-written articles
covering image processing fundamentals (eg color theory, fuzzy sets, cryptography) and …

[HTML][HTML] New chaff point based fuzzy vault for multimodal biometric cryptosystem using particle swarm optimization

G Amirthalingam, G Radhamani - … of King Saud University-Computer and …, 2016 - Elsevier
An effective fusion method for combining information from single modality system requires
Multimodal biometric crypto system. Fuzzy vault has been widely used for providing security …

[PDF][PDF] Polynomial based fuzzy vault technique for template security in fingerprint biometrics.

R Mehmood, A Selwal - Int. Arab J. Inf. Technol., 2020 - iajit.org
In recent years the security breaches and fraud transactions are increasing day by day. So
there is a necessity for highly secure authentication technologies. The security of an …

On Efficiency of Square-Boundaries Chaff Points Generation With Composite Representation in Fingerprint Fuzzy Vault

HN Dellys, L Sliman, BT Morris, K Benatchba - IEEE Access, 2024 - ieeexplore.ieee.org
Fingerprint-based biometric systems are widely used because of their advantages against
conventional authentication systems based on passwords and tokens. However, a major …

A novel location-based encryption model using fuzzy vault scheme

L You, Y Chen, B Yan, M Zhan - Soft Computing, 2018 - Springer
The secure storage of the sensitive data in mobile devices is an urgent issue. Most of the
existed encryption algorithms are location independent, which means the encrypted data …

Fuzzy vault schemes in multi-secret digital steganography

K Koptyra, MR Ogiela - 2015 10th International Conference on …, 2015 - ieeexplore.ieee.org
This paper presents a new idea of hiding many secrets using fuzzy vault schemes. In this
approach with each secret is linked corresponding key in the form of unordered set. The …

Fingerprint security for protecting EMV payment cards

H Vats, R Ruhl, S Aghili - 2015 10th International Conference …, 2015 - ieeexplore.ieee.org
EMV chip based payments cards have been used to combat fraudulent transactions such as
counterfeit, lost and stolen cards. Despite of improved security measures payment cards are …

State of the art in biometric key binding and key generation schemes

A Jegede, NI Udzir, A Abdullah, R Mahmod - 2017 - irepos.unijos.edu.ng
authentication system and legitimate users to numerous security and privacy challenges.
Biometric cryptosystems or template protection schemes are used to overcome the security …

Secure fingerprint fuzzy vault including novel chaff point generation method

N Singla, M Kaur, S Sofat - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
Biometrie based authentication system authenticates an individual on the basis of biometrie
template stored during enrolment. As the biometric features are immutable, therefore a …