[PDF][PDF] Physiological biometric authentication systems, advantages, disadvantages and future development: A review

IM Alsaadi - International Journal of Scientific & Technology …, 2015 - researchgate.net
With the fast increasing of the electronic crimes and their related issues, deploying a reliable
user authentication system became a significant task for both of access control and securing …

Biometric template protection: Bridging the performance gap between theory and practice

K Nandakumar, AK Jain - IEEE Signal Processing Magazine, 2015 - ieeexplore.ieee.org
Biometric recognition is an integral component of modern identity management and access
control systems. Due to the strong and permanent link between individuals and their …

[图书][B] Handbook of fingerprint recognition

D Maltoni, D Maio, AK Jain, S Prabhakar - 2009 - Springer
Biometric recognition, or simply biometrics, refers to the use of distinctive anatomical and/or
behavioral characteristics or identifiers (eg, fingerprints, face, iris, voice, and hand geometry) …

Security and privacy in biometrics: towards a holistic approach

P Campisi - Security and privacy in biometrics, 2013 - Springer
Security and privacy in biometric systems have been traditionally seen as two requirements
hindering each other. Only in the recent past researchers have started investigating it as a …

Deep learning in the field of biometric template protection: An overview

C Rathgeb, J Kolberg, A Uhl, C Busch - arXiv preprint arXiv:2303.02715, 2023 - arxiv.org
Today, deep learning represents the most popular and successful form of machine learning.
Deep learning has revolutionised the field of pattern recognition, including biometric …

Deep face fuzzy vault: Implementation and performance

C Rathgeb, J Merkle, J Scholz, B Tams… - Computers & …, 2022 - Elsevier
Biometric technologies, especially face recognition, have become an essential part of
identity management systems worldwide. In deployments of biometrics, secure storage of …

Protection of privacy in biometric data

I Natgunanathan, A Mehmood, Y Xiang… - IEEE …, 2016 - ieeexplore.ieee.org
Biometrics is commonly used in many automated verification systems offering several
advantages over traditional verification methods. Since biometric features are associated …

Secure biometrics: Concepts, authentication architectures, and challenges

S Rane, Y Wang, SC Draper… - IEEE Signal Processing …, 2013 - ieeexplore.ieee.org
Biometrics are an important and widely used class of methods for identity verification and
access control. Biometrics are attractive because they are inherent properties of an …

Efficient fuzzy extraction of PUF-induced secrets: Theory and applications

J Delvaux, D Gu, I Verbauwhede, M Hiller… - … Hardware and Embedded …, 2016 - Springer
The device-unique response of a physically unclonable function (PUF) can serve as the root
of trust in an embedded cryptographic system. Fuzzy extractors transform this noisy non …

[PDF][PDF] Security analysis of PUF-based key generation and entity authentication

J Delvaux - Ph. D. dissertation, 2017 - core.ac.uk
No two physical objects are exactly the same, even when manufactured with a nominally
identical process. For example, two sheets of paper that are indistinguishable with the naked …