Real-time medical systems based on human biometric steganography: A systematic review
In real-time medical systems, the role of biometric technology is significant in authentication
systems because it is used in verifying the identity of people through their biometric features …
systems because it is used in verifying the identity of people through their biometric features …
Biometric cryptosystems: a comprehensive survey
Biometric Cryptosystem (BCS) combines characteristics of both the fields: biometric and
cryptosystem, where biometric provides authentication and cryptosystem imparts security …
cryptosystem, where biometric provides authentication and cryptosystem imparts security …
Application of biometric system to enhance the security in virtual world
V Veeraiah, KR Kumar, PL Kumari… - 2022 2nd …, 2022 - ieeexplore.ieee.org
Virtual worlds was becoming increasingly popular in a variety of fields, including education,
business, space exploration, and video games. Establishing the security of virtual worlds …
business, space exploration, and video games. Establishing the security of virtual worlds …
Private key encryption and recovery in blockchain
The disruptive technology of blockchain can deliver secure solutions without the need for a
central authority. In blockchain protocols, assets that belong to a participant are controlled …
central authority. In blockchain protocols, assets that belong to a participant are controlled …
Performance analysis of a parameterized minutiae-based approach for securing fingerprint templates in biometric authentication systems
The fingerprint templates include almost the entire information about an individual's
fingerprints, and the user validation is totally determined by the fingerprint minutiae features …
fingerprints, and the user validation is totally determined by the fingerprint minutiae features …
A fingerprint based crypto-biometric system for secure communication
R Dwivedi, S Dey, MA Sharma, A Goel - Journal of Ambient Intelligence …, 2020 - Springer
To maintain secrecy of information during communication, cryptography is considered to be
an impressive solution and cryptographic keys play an important role to ensure the security …
an impressive solution and cryptographic keys play an important role to ensure the security …
Efficient private key generation from iris data for privacy and security applications
Private key generation based on biometric data is gaining popularity in several
cryptographic applications. Some key generation approaches using fingerprint and face …
cryptographic applications. Some key generation approaches using fingerprint and face …
Two-factor-based RSA key generation from fingerprint biometrics and password for secure communication
In an asymmetric-key cryptosystem, the secure storage of private keys is a challenging task.
This paper proposes a novel approach for generating the same public and private key pair …
This paper proposes a novel approach for generating the same public and private key pair …
Pressure-Insensitive Epidermal Thickness of Fingertip Skin for Optical Image Encryption
W Li, B Zhang, X Zhang, B Liu, H Li, S Wu, Z Li - Sensors, 2024 - mdpi.com
In this study, an internal fingerprint-guided epidermal thickness of fingertip skin is proposed
for optical image encryption based on optical coherence tomography (OCT) combined with …
for optical image encryption based on optical coherence tomography (OCT) combined with …
Retinal Biometric for Securing JPEG-Codec Hardware IP Core for CE Systems
R Chaurasia, A Sengupta - IEEE Transactions on Consumer …, 2023 - ieeexplore.ieee.org
Fake/pirated hardware intellectual property (IP) cores integrated in consumer electronics
systems can cause reliability hazards and jeopardize the safety of end consumer. Robust …
systems can cause reliability hazards and jeopardize the safety of end consumer. Robust …