Secure and efficient protocols for iris and fingerprint identification
Recent advances in biometric recognition and the increasing use of biometric data prompt
significant privacy challenges associated with the possible misuse, loss, or theft of biometric …
significant privacy challenges associated with the possible misuse, loss, or theft of biometric …
A review of privacy-preserving biometric identification and authentication protocols
L Zeng, P Shen, X Zhu, X Tian, C Chen - Computers & Security, 2025 - Elsevier
Biometrics now play a crucial role in user identification and authentication. However, storing
biometric features in plaintext and conducting authentication without protection pose a risk of …
biometric features in plaintext and conducting authentication without protection pose a risk of …
A framework for analyzing template security and privacy in biometric authentication systems
In this correspondence, we analyze the vulnerabilities of biometric authentication protocols
with respect to user and data privacy. The goal of an adversary in such context is not to …
with respect to user and data privacy. The goal of an adversary in such context is not to …
Secure outsourced biometric authentication with performance evaluation on smartphones
We design privacy-preserving protocols for scaled Manhattan and scaled Euclidean
verifiers, secure against malicious clients and honest-but-curious server. We then augment …
verifiers, secure against malicious clients and honest-but-curious server. We then augment …
On the leakage of information in biometric authentication
In biometric authentication protocols, a user is authenticated or granted access to a service if
her fresh biometric trait matches the reference biometric template stored on the service …
her fresh biometric trait matches the reference biometric template stored on the service …
A new cryptographic primitive for noise tolerant template security
K Karabina, O Canpolat - Pattern Recognition Letters, 2016 - Elsevier
We introduce a new cryptographic primitive for noise tolerant template security. Our primitive
consists of two algorithms. The first algorithm extracts a noise tolerant and secure template …
consists of two algorithms. The first algorithm extracts a noise tolerant and secure template …
A lightweight privacy-aware continuous authentication protocol-paca
As many vulnerabilities of one-time authentication systems have already been uncovered,
there is a growing need and trend to adopt continuous authentication systems. Biometrics …
there is a growing need and trend to adopt continuous authentication systems. Biometrics …
Security aspects of privacy-preserving biometric authentication based on ideal lattices and ring-lwe
In this paper, we study the security of two recently proposed privacy-preserving biometric
authentication protocols that employ packed somewhat homomorphic encryption schemes …
authentication protocols that employ packed somewhat homomorphic encryption schemes …
Privacy-preserving similarity evaluation and application to remote biometrics authentication
In this paper, a new method for secure remote biometric authentication preventing the
vulnerability of compromised biometrics is presented. The idea is based on a public-key …
vulnerability of compromised biometrics is presented. The idea is based on a public-key …
Emerging cryptographic challenges in image and video processing
In an increasing number of image and video processing problems, cryptographic techniques
are used to enforce content access control, identity verification and authentication, and …
are used to enforce content access control, identity verification and authentication, and …