Secure and efficient protocols for iris and fingerprint identification

M Blanton, P Gasti - Computer Security–ESORICS 2011: 16th European …, 2011 - Springer
Recent advances in biometric recognition and the increasing use of biometric data prompt
significant privacy challenges associated with the possible misuse, loss, or theft of biometric …

A review of privacy-preserving biometric identification and authentication protocols

L Zeng, P Shen, X Zhu, X Tian, C Chen - Computers & Security, 2025 - Elsevier
Biometrics now play a crucial role in user identification and authentication. However, storing
biometric features in plaintext and conducting authentication without protection pose a risk of …

A framework for analyzing template security and privacy in biometric authentication systems

K Simoens, J Bringer, H Chabanne… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
In this correspondence, we analyze the vulnerabilities of biometric authentication protocols
with respect to user and data privacy. The goal of an adversary in such context is not to …

Secure outsourced biometric authentication with performance evaluation on smartphones

J Šeděnka, S Govindarajan, P Gasti… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
We design privacy-preserving protocols for scaled Manhattan and scaled Euclidean
verifiers, secure against malicious clients and honest-but-curious server. We then augment …

On the leakage of information in biometric authentication

E Pagnin, C Dimitrakakis, A Abidin… - … Conference on Cryptology …, 2014 - Springer
In biometric authentication protocols, a user is authenticated or granted access to a service if
her fresh biometric trait matches the reference biometric template stored on the service …

A new cryptographic primitive for noise tolerant template security

K Karabina, O Canpolat - Pattern Recognition Letters, 2016 - Elsevier
We introduce a new cryptographic primitive for noise tolerant template security. Our primitive
consists of two algorithms. The first algorithm extracts a noise tolerant and secure template …

A lightweight privacy-aware continuous authentication protocol-paca

A Acar, S Ali, K Karabina, C Kaygusuz, H Aksu… - ACM Transactions on …, 2021 - dl.acm.org
As many vulnerabilities of one-time authentication systems have already been uncovered,
there is a growing need and trend to adopt continuous authentication systems. Biometrics …

Security aspects of privacy-preserving biometric authentication based on ideal lattices and ring-lwe

A Abidin, A Mitrokotsa - 2014 IEEE International Workshop on …, 2014 - ieeexplore.ieee.org
In this paper, we study the security of two recently proposed privacy-preserving biometric
authentication protocols that employ packed somewhat homomorphic encryption schemes …

Privacy-preserving similarity evaluation and application to remote biometrics authentication

H Kikuchi, K Nagai, W Ogata, M Nishigaki - Modeling Decisions for …, 2008 - Springer
In this paper, a new method for secure remote biometric authentication preventing the
vulnerability of compromised biometrics is presented. The idea is based on a public-key …

Emerging cryptographic challenges in image and video processing

W Puech, Z Erkin, M Barni, S Rane… - 2012 19th IEEE …, 2012 - ieeexplore.ieee.org
In an increasing number of image and video processing problems, cryptographic techniques
are used to enforce content access control, identity verification and authentication, and …