Real-time medical systems based on human biometric steganography: A systematic review

AH Mohsin, AA Zaidan, BB Zaidan, SA Ariffin… - Journal of medical …, 2018 - Springer
In real-time medical systems, the role of biometric technology is significant in authentication
systems because it is used in verifying the identity of people through their biometric features …

Biometric cryptosystems: a comprehensive survey

P Kaur, N Kumar, M Singh - Multimedia Tools and Applications, 2023 - Springer
Biometric Cryptosystem (BCS) combines characteristics of both the fields: biometric and
cryptosystem, where biometric provides authentication and cryptosystem imparts security …

Application of biometric system to enhance the security in virtual world

V Veeraiah, KR Kumar, PL Kumari… - 2022 2nd …, 2022 - ieeexplore.ieee.org
Virtual worlds was becoming increasingly popular in a variety of fields, including education,
business, space exploration, and video games. Establishing the security of virtual worlds …

Private key encryption and recovery in blockchain

M Aydar, SC Cetin, S Ayvaz, B Aygun - arxiv preprint arxiv:1907.04156, 2019 - arxiv.org
The disruptive technology of blockchain can deliver secure solutions without the need for a
central authority. In blockchain protocols, assets that belong to a participant are controlled …

Performance analysis of a parameterized minutiae-based approach for securing fingerprint templates in biometric authentication systems

MM Rahman, TI Mishu, MAA Bhuiyan - Journal of Information Security and …, 2022 - Elsevier
The fingerprint templates include almost the entire information about an individual's
fingerprints, and the user validation is totally determined by the fingerprint minutiae features …

A fingerprint based crypto-biometric system for secure communication

R Dwivedi, S Dey, MA Sharma, A Goel - Journal of Ambient Intelligence …, 2020 - Springer
To maintain secrecy of information during communication, cryptography is considered to be
an impressive solution and cryptographic keys play an important role to ensure the security …

Efficient private key generation from iris data for privacy and security applications

P Dash, F Pandey, M Sarma, D Samanta - Journal of Information Security …, 2023 - Elsevier
Private key generation based on biometric data is gaining popularity in several
cryptographic applications. Some key generation approaches using fingerprint and face …

Two-factor-based RSA key generation from fingerprint biometrics and password for secure communication

K Suresh, R Pal, SR Balasundaram - Complex & Intelligent Systems, 2022 - Springer
In an asymmetric-key cryptosystem, the secure storage of private keys is a challenging task.
This paper proposes a novel approach for generating the same public and private key pair …

Pressure-Insensitive Epidermal Thickness of Fingertip Skin for Optical Image Encryption

W Li, B Zhang, X Zhang, B Liu, H Li, S Wu, Z Li - Sensors, 2024 - mdpi.com
In this study, an internal fingerprint-guided epidermal thickness of fingertip skin is proposed
for optical image encryption based on optical coherence tomography (OCT) combined with …

Retinal Biometric for Securing JPEG-Codec Hardware IP Core for CE Systems

R Chaurasia, A Sengupta - IEEE Transactions on Consumer …, 2023 - ieeexplore.ieee.org
Fake/pirated hardware intellectual property (IP) cores integrated in consumer electronics
systems can cause reliability hazards and jeopardize the safety of end consumer. Robust …