A review on performance, security and various biometric template protection schemes for biometric authentication systems
Identifying a person based on their behavioral and biological qualities in an automated
manner is called biometrics. The authentication system substituting traditional password and …
manner is called biometrics. The authentication system substituting traditional password and …
The fall of one, the rise of many: a survey on multi-biometric fusion methods
LM Dinca, GP Hancke - IEEE Access, 2017 - ieeexplore.ieee.org
Increasing operational and security demands changed biometrics by shifting the focus from
single to multi-biometrics. Multi-biometrics are mandatory in the current context of large …
single to multi-biometrics. Multi-biometrics are mandatory in the current context of large …
Deep face fuzzy vault: Implementation and performance
C Rathgeb, J Merkle, J Scholz, B Tams… - Computers & …, 2022 - Elsevier
Biometric technologies, especially face recognition, have become an essential part of
identity management systems worldwide. In deployments of biometrics, secure storage of …
identity management systems worldwide. In deployments of biometrics, secure storage of …
A lightweight machine learning-based authentication framework for smart IoT devices
Abstract The Internet of Things (IoT) is the next generation plethora of interconnected
devices that includes sensors, actuators, etc. and that can provide personalized services …
devices that includes sensors, actuators, etc. and that can provide personalized services …
Robust biometric authentication system with a secure user template
Biometric feature based human authentication systems provide various advantages over the
classical authentication systems. Out of numerous biometric features in a human body, the …
classical authentication systems. Out of numerous biometric features in a human body, the …
A cryptanalysis of two cancelable biometric schemes based on index-of-max hashing
L Ghammam, K Karabina, P Lacharme… - IEEE Transactions …, 2020 - ieeexplore.ieee.org
Cancelable biometric schemes generate secure biometric templates by combining user
specific tokens and biometric data. The main objective is to create irreversible, unlinkable …
specific tokens and biometric data. The main objective is to create irreversible, unlinkable …
Privacy‐Preserving Biometric Authentication: Challenges and Directions
An emerging direction for authenticating people is the adoption of biometric authentication
systems. Biometric credentials are becoming increasingly popular as a means of …
systems. Biometric credentials are becoming increasingly popular as a means of …
Feature fusion methods for indexing and retrieval of biometric data: Application to face recognition with privacy protection
P Drozdowski, F Stockhardt, C Rathgeb… - IEEE …, 2021 - ieeexplore.ieee.org
Computationally efficient, accurate, and privacy-preserving data storage and retrieval are
among the key challenges faced by practical deployments of biometric identification systems …
among the key challenges faced by practical deployments of biometric identification systems …
Hybrid biometric template protection: Resolving the agony of choice between bloom filters and homomorphic encryption
Bloom filters (BFs) and homomorphic encryption (HE) are prominent techniques used to
design biometric template protection (BTP) schemes that aim to protect sensitive biometric …
design biometric template protection (BTP) schemes that aim to protect sensitive biometric …
Palmprint template protection scheme based on randomized cuckoo hashing and MinHash
To provide the necessary security and privacy privileges for registered users of biometric
systems, a novel template protection method for generating cancelable palmprint features …
systems, a novel template protection method for generating cancelable palmprint features …