A study of users' acceptance and satisfaction of biometric systems

M El-Abed, R Giot, B Hemery… - 44th Annual 2010 IEEE …, 2010 - ieeexplore.ieee.org
Biometric authentication methods are being increasingly used for many types of
applications. Since such methods necessitate humans to interact with a device, effective …

Fingerprint combination for privacy protection

S Li, AC Kot - IEEE transactions on information forensics and …, 2012 - ieeexplore.ieee.org
We propose here a novel system for protecting fingerprint privacy by combining two different
fingerprints into a new identity. In the enrollment, two fingerprints are captured from two …

A bio-cryptographic system based on offline signature images

GS Eskander, R Sabourin, E Granger - Information sciences, 2014 - Elsevier
In bio-cryptography, biometric traits are replacing traditional passwords for secure exchange
of cryptographic keys. The Fuzzy Vault (FV) scheme has been successfully employed to …

Efficient wavelet‐based perceptual watermark masking for robust fingerprint image watermarking

K Zebbiche, F Khelifi - IET Image Processing, 2014 - Wiley Online Library
In this study, a robust wavelet‐based fingerprint image watermarking scheme using an
efficient just perceptual weighting (JPW) model has been proposed. The JPW model exploits …

A criticism of the current security, privacy and accountability issues in electronic health records

A Omotosho, J Emuoyibofarhe - arXiv preprint arXiv:1501.07865, 2015 - arxiv.org
Cryptography has been widely accepted for security and partly for privacy control as
discovered from past works. However, many of these works did not provide a way to manage …

[图书][B] Enhancing information security and privacy by combining biometrics with cryptography

S Kanade, D Petrovska-Delacrétaz, B Dorizzi - 2012 - books.google.com
This book deals with" crypto-biometrics", a relatively new and multi-disciplinary area of
research (started in 1998). Combining biometrics and cryptography provides multiple …

Hybrid multi-biometric template protection using watermarking

O Nafea, S Ghouzali, W Abdul, EH Qazi - The Computer Journal, 2016 - academic.oup.com
Biometric recognition has been proven to offer a reliable solution to authenticate the identity
of the legitimate user. Because of the inherent nature of biometrics, which involves the …

Key binding biometrics‐based remote user authentication scheme using smart cards

AA Al‐Saggaf - IET Biometrics, 2018 - Wiley Online Library
Remote user authentication schemes using smart cards provide solutions for securing user
authentication. The schemes rely on passwords or biometric or both, which fall apart if the …

Influence of skin diseases on fingerprint quality and recognition

M Dolezel, M Drahansky, J Urbanek… - New trends and …, 2012 - books.google.com
Fingerprint recognition belongs to one of the most often used biometric technologies world‐-
wide. It is believed that fingerprints could be used for the recognition of a person in nearly …

Key based artificial fingerprint generation for privacy protection

S Li, X Zhang, Z Qian, G Feng… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
With the widespread use of biometrics recognition systems, it is of paramount importance to
protect the privacy of biometrics. In this paper, we propose to protect the fingerprint privacy …