Ensemble recognition model with optimal training for multimodal biometric authentication

KP Kumar, PK Prasad, Y Suresh, MR Babu… - Multimedia Tools and …, 2024 - Springer
Biometric security methods deploy any type of biometric recognition for safety purposes.
Different from unimodal biometric system that uses single trait for security, the multimodal …

A novel chaotic image encryption with FSV based global bit-level chaotic permutation

Y ** via non-invertible transformation
EU Sehar, A Selwal, D Sharma - Multimedia Tools and Applications, 2023 - Springer
The employment of various technologies for secured human authentication in the recent
years has led to rapid expansion of biometric-based recognition. Among all biometrics, the …

A stable cryptographic key generation from fingerprint biometrics using Gray code for secure data storage

K Suresh, R Pal… - International Journal of …, 2023 - inderscienceonline.com
Cryptographic techniques play a major role in digital information security. In cryptography,
securing/storing the cryptographic key is an arduous task. The proposed stable …

A note on``a multi-instance cancelable fingerprint biometric based secure session key agreement protocol employing elliptic curve cryptography and a double hash …

Z Cao, L Liu - Cryptology ePrint Archive, 2023 - eprint.iacr.org
We show that the key agreement scheme [Multim. Tools Appl. 80: 799-829, 2021] is
flawed.(1) The scheme is a hybrid which piles up various tools such as public key …

Securing Biometric Data with Optimized Share Creation and Visual Cryptography Technique

L Shammi, CE Shyni, KU Nisa, RK Bora… - 2022 6th …, 2022 - ieeexplore.ieee.org
Biometric security is the fastest growing area that receives considerable attention over the
past few years. Digital hiding and encryption technologies provide an effective solution to …