Biometric template security: Challenges and solutions

AK Jain, A Ross, U Uludag - 2005 13th European signal …, 2005 - ieeexplore.ieee.org
A biometric system is vulnerable to a variety of attacks aimed at undermining the integrity of
the authentication process. These attacks are intended to either circumvent the security …

Privacy-preserving face recognition using random frequency components

Y Mi, Y Huang, J Ji, M Zhao, J Wu… - Proceedings of the …, 2023 - openaccess.thecvf.com
The ubiquitous use of face recognition has sparked increasing privacy concerns, as
unauthorized access to sensitive face images could compromise the information of …

Multibiometric cryptosystems based on feature-level fusion

A Nagar, K Nandakumar, AK Jain - IEEE transactions on …, 2011 - ieeexplore.ieee.org
Multibiometric systems are being increasingly de-ployed in many large-scale biometric
applications (eg, FBI-IAFIS, UIDAI system in India) because they have several advantages …

Biometric security from an information-theoretical perspective

T Ignatenko, FMJ Willems - Foundations and Trends® in …, 2012 - nowpublishers.com
In this review, biometric systems are studied from an information theoretical point of view. In
the first part biometric authentication systems are studied. The objective of these systems is …

Protecting biometric templates with sketch: Theory and practice

Y Sutcu, Q Li, N Memon - IEEE Transactions on Information …, 2007 - ieeexplore.ieee.org
Secure storage of biometric templates has become an increasingly important issue in
biometric authentication systems. We study how secure sketch, a recently proposed error …

A hybrid approach for generating secure and discriminating face template

YC Feng, PC Yuen, AK Jain - IEEE transactions on information …, 2009 - ieeexplore.ieee.org
Biometric template protection is one of the most important issues in deploying a practical
biometric system. To tackle this problem, many algorithms, that do not store the template in …

Duetface: Collaborative privacy-preserving face recognition via channel splitting in the frequency domain

Y Mi, Y Huang, J Ji, H Liu, X Xu, S Ding… - Proceedings of the 30th …, 2022 - dl.acm.org
With the wide application of face recognition systems, there is rising concern that original
face images could be exposed to malicious intents and consequently cause personal …

No soldiers left behind: an IoT-based low-power military mobile health system design

JJ Kang, W Yang, G Dermody, M Ghasemian… - IEEE …, 2020 - ieeexplore.ieee.org
There has been an increasing prevalence of ad-hoc networks for various purposes and
applications. These include Low Power Wide Area Networks (LPWAN) and Wireless Body …

Multibiometric secure system based on deep learning

V Talreja, MC Valenti… - 2017 IEEE Global …, 2017 - ieeexplore.ieee.org
In this paper, we propose a secure multibiometric system that uses deep neural networks
and error-correction coding. We present a feature-level fusion framework to generate a …

Information leakage in fuzzy commitment schemes

T Ignatenko, FMJ Willems - IEEE Transactions on Information …, 2010 - ieeexplore.ieee.org
In 1999, Juels and Wattenberg introduced the fuzzy commitment scheme. This scheme is a
particular realization of a binary biometric secrecy system with chosen secret keys. It …