Cancelable biometrics: A review

VM Patel, NK Ratha… - IEEE signal processing …, 2015 - ieeexplore.ieee.org
Recent years have seen an exponential growth in the use of various biometric technologies
for trusted automatic recognition of humans. With the rapid adaptation of biometric systems …

Preserving privacy in speaker and speech characterisation

A Nautsch, A Jiménez, A Treiber, J Kolberg… - Computer Speech & …, 2019 - Elsevier
Speech recordings are a rich source of personal, sensitive data that can be used to support
a plethora of diverse applications, from health profiling to biometric recognition. It is therefore …

Performance comparison of intrusion detection systems and application of machine learning to Snort system

SAR Shah, B Issac - Future Generation Computer Systems, 2018 - Elsevier
This study investigates the performance of two open source intrusion detection systems
(IDSs) namely Snort and Suricata for accurately detecting the malicious traffic on computer …

Self-sovereign identity in a globalized world: Credentials-based identity systems as a driver for economic inclusion

F Wang, P De Filippi - Frontiers in Blockchain, 2020 - frontiersin.org
After introducing key concepts and definitions in the field of digital identity, this paper will
investigate the benefits and drawbacks of existing identity systems on the road toward …

[책][B] Handbook of fingerprint recognition

D Maltoni, D Maio, AK Jain, S Prabhakar - 2009 - Springer
Biometric recognition, or simply biometrics, refers to the use of distinctive anatomical and/or
behavioral characteristics or identifiers (eg, fingerprints, face, iris, voice, and hand geometry) …

Biometric template protection: Bridging the performance gap between theory and practice

K Nandakumar, AK Jain - IEEE Signal Processing Magazine, 2015 - ieeexplore.ieee.org
Biometric recognition is an integral component of modern identity management and access
control systems. Due to the strong and permanent link between individuals and their …

General framework to evaluate unlinkability in biometric template protection systems

M Gomez-Barrero, J Galbally… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The wide deployment of biometric recognition systems in the last two decades has raised
privacy concerns regarding the storage and use of biometric data. As a consequence, the …

An overview of privacy-enhancing technologies in biometric recognition

P Melzi, C Rathgeb, R Tolosana… - ACM Computing …, 2024 - dl.acm.org
Privacy-enhancing technologies are technologies that implement fundamental data
protection principles. With respect to biometric recognition, different types of privacy …

A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care

AK Das, A Goswami - Journal of medical systems, 2013 - Springer
Connected health care has several applications including telecare medicine information
system, personally controlled health records system, and patient monitoring. In such …

Deep face fuzzy vault: Implementation and performance

C Rathgeb, J Merkle, J Scholz, B Tams… - Computers & …, 2022 - Elsevier
Biometric technologies, especially face recognition, have become an essential part of
identity management systems worldwide. In deployments of biometrics, secure storage of …