Cancelable biometrics: A review
Recent years have seen an exponential growth in the use of various biometric technologies
for trusted automatic recognition of humans. With the rapid adaptation of biometric systems …
for trusted automatic recognition of humans. With the rapid adaptation of biometric systems …
Preserving privacy in speaker and speech characterisation
Speech recordings are a rich source of personal, sensitive data that can be used to support
a plethora of diverse applications, from health profiling to biometric recognition. It is therefore …
a plethora of diverse applications, from health profiling to biometric recognition. It is therefore …
Performance comparison of intrusion detection systems and application of machine learning to Snort system
SAR Shah, B Issac - Future Generation Computer Systems, 2018 - Elsevier
This study investigates the performance of two open source intrusion detection systems
(IDSs) namely Snort and Suricata for accurately detecting the malicious traffic on computer …
(IDSs) namely Snort and Suricata for accurately detecting the malicious traffic on computer …
Self-sovereign identity in a globalized world: Credentials-based identity systems as a driver for economic inclusion
F Wang, P De Filippi - Frontiers in Blockchain, 2020 - frontiersin.org
After introducing key concepts and definitions in the field of digital identity, this paper will
investigate the benefits and drawbacks of existing identity systems on the road toward …
investigate the benefits and drawbacks of existing identity systems on the road toward …
[책][B] Handbook of fingerprint recognition
Biometric recognition, or simply biometrics, refers to the use of distinctive anatomical and/or
behavioral characteristics or identifiers (eg, fingerprints, face, iris, voice, and hand geometry) …
behavioral characteristics or identifiers (eg, fingerprints, face, iris, voice, and hand geometry) …
Biometric template protection: Bridging the performance gap between theory and practice
K Nandakumar, AK Jain - IEEE Signal Processing Magazine, 2015 - ieeexplore.ieee.org
Biometric recognition is an integral component of modern identity management and access
control systems. Due to the strong and permanent link between individuals and their …
control systems. Due to the strong and permanent link between individuals and their …
General framework to evaluate unlinkability in biometric template protection systems
M Gomez-Barrero, J Galbally… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The wide deployment of biometric recognition systems in the last two decades has raised
privacy concerns regarding the storage and use of biometric data. As a consequence, the …
privacy concerns regarding the storage and use of biometric data. As a consequence, the …
An overview of privacy-enhancing technologies in biometric recognition
Privacy-enhancing technologies are technologies that implement fundamental data
protection principles. With respect to biometric recognition, different types of privacy …
protection principles. With respect to biometric recognition, different types of privacy …
A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care
Connected health care has several applications including telecare medicine information
system, personally controlled health records system, and patient monitoring. In such …
system, personally controlled health records system, and patient monitoring. In such …
Deep face fuzzy vault: Implementation and performance
C Rathgeb, J Merkle, J Scholz, B Tams… - Computers & …, 2022 - Elsevier
Biometric technologies, especially face recognition, have become an essential part of
identity management systems worldwide. In deployments of biometrics, secure storage of …
identity management systems worldwide. In deployments of biometrics, secure storage of …