Biometric cryptosystems: issues and challenges

U Uludag, S Pankanti, S Prabhakar… - Proceedings of the …, 2004 - ieeexplore.ieee.org
In traditional cryptosystems, user authentication is based on possession of secret keys; the
method falls apart if the keys are not kept secret (ie, shared with non-legitimate users) …

A review on protection and cancelable techniques in biometric systems

JC Bernal-Romero, JM Ramirez-Cortes… - Ieee …, 2023 - ieeexplore.ieee.org
An essential part of cloud computing, IoT, and in general the broad field of digital systems, is
constituted by the mechanisms which provide access to a number of services or …

A survey on biometric cryptosystems and cancelable biometrics

C Rathgeb, A Uhl - EURASIP journal on information security, 2011 - Springer
Form a privacy perspective most concerns against the common use of biometrics arise from
the storage and misuse of biometric data. Biometric cryptosystems and cancelable …

Fuzzy identity-based encryption

A Sahai, B Waters - Advances in Cryptology–EUROCRYPT 2005: 24th …, 2005 - Springer
We introduce a new type of Identity-Based Encryption (IBE) scheme that we call Fuzzy
Identity-Based Encryption. In Fuzzy IBE we view an identity as set of descriptive attributes. A …

[BOG][B] Handbook of fingerprint recognition

D Maltoni, D Maio, AK Jain, S Prabhakar - 2009 - Springer
Biometric recognition, or simply biometrics, refers to the use of distinctive anatomical and/or
behavioral characteristics or identifiers (eg, fingerprints, face, iris, voice, and hand geometry) …

Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

Y Dodis, L Reyzin, A Smith - … 2004: International Conference on the Theory …, 2004 - Springer
We provide formal definitions and efficient secure techniques for turning biometric
information into keys usable for any cryptographic application, and reliably and securely …

Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

Y Dodis, R Ostrovsky, L Reyzin, A Smith - SIAM journal on computing, 2008 - SIAM
We provide formal definitions and efficient secure techniques for turning noisy information
into keys usable for any cryptographic application, and, in particular, reliably and securely …

Biometric template security: Challenges and solutions

AK Jain, A Ross, U Uludag - 2005 13th European signal …, 2005 - ieeexplore.ieee.org
A biometric system is vulnerable to a variety of attacks aimed at undermining the integrity of
the authentication process. These attacks are intended to either circumvent the security …

[BOG][B] Handbook of pattern recognition and computer vision

CH Chen - 2015 - books.google.com
Pattern recognition, image processing and computer vision are closely linked areas which
have seen enormous progress in the last fifty years. Their applications in our daily life …

Generating cancelable fingerprint templates

NK Ratha, S Chikkerur, JH Connell… - IEEE Transactions on …, 2007 - ieeexplore.ieee.org
Biometrics-based authentication systems offer obvious usability advantages over traditional
password and token-based authentication schemes. However, biometrics raises several …