A study of users' acceptance and satisfaction of biometric systems
Biometric authentication methods are being increasingly used for many types of
applications. Since such methods necessitate humans to interact with a device, effective …
applications. Since such methods necessitate humans to interact with a device, effective …
Fingerprint combination for privacy protection
We propose here a novel system for protecting fingerprint privacy by combining two different
fingerprints into a new identity. In the enrollment, two fingerprints are captured from two …
fingerprints into a new identity. In the enrollment, two fingerprints are captured from two …
A bio-cryptographic system based on offline signature images
In bio-cryptography, biometric traits are replacing traditional passwords for secure exchange
of cryptographic keys. The Fuzzy Vault (FV) scheme has been successfully employed to …
of cryptographic keys. The Fuzzy Vault (FV) scheme has been successfully employed to …
Efficient wavelet‐based perceptual watermark masking for robust fingerprint image watermarking
K Zebbiche, F Khelifi - IET Image Processing, 2014 - Wiley Online Library
In this study, a robust wavelet‐based fingerprint image watermarking scheme using an
efficient just perceptual weighting (JPW) model has been proposed. The JPW model exploits …
efficient just perceptual weighting (JPW) model has been proposed. The JPW model exploits …
A criticism of the current security, privacy and accountability issues in electronic health records
A Omotosho, J Emuoyibofarhe - arXiv preprint arXiv:1501.07865, 2015 - arxiv.org
Cryptography has been widely accepted for security and partly for privacy control as
discovered from past works. However, many of these works did not provide a way to manage …
discovered from past works. However, many of these works did not provide a way to manage …
[图书][B] Enhancing information security and privacy by combining biometrics with cryptography
This book deals with" crypto-biometrics", a relatively new and multi-disciplinary area of
research (started in 1998). Combining biometrics and cryptography provides multiple …
research (started in 1998). Combining biometrics and cryptography provides multiple …
Hybrid multi-biometric template protection using watermarking
Biometric recognition has been proven to offer a reliable solution to authenticate the identity
of the legitimate user. Because of the inherent nature of biometrics, which involves the …
of the legitimate user. Because of the inherent nature of biometrics, which involves the …
Key binding biometrics‐based remote user authentication scheme using smart cards
AA Al‐Saggaf - IET Biometrics, 2018 - Wiley Online Library
Remote user authentication schemes using smart cards provide solutions for securing user
authentication. The schemes rely on passwords or biometric or both, which fall apart if the …
authentication. The schemes rely on passwords or biometric or both, which fall apart if the …
Influence of skin diseases on fingerprint quality and recognition
M Dolezel, M Drahansky, J Urbanek… - New trends and …, 2012 - books.google.com
Fingerprint recognition belongs to one of the most often used biometric technologies world‐-
wide. It is believed that fingerprints could be used for the recognition of a person in nearly …
wide. It is believed that fingerprints could be used for the recognition of a person in nearly …
Key based artificial fingerprint generation for privacy protection
With the widespread use of biometrics recognition systems, it is of paramount importance to
protect the privacy of biometrics. In this paper, we propose to protect the fingerprint privacy …
protect the privacy of biometrics. In this paper, we propose to protect the fingerprint privacy …