Biometric cryptosystems: a comprehensive survey

P Kaur, N Kumar, M Singh - Multimedia Tools and Applications, 2023 - Springer
Biometric Cryptosystem (BCS) combines characteristics of both the fields: biometric and
cryptosystem, where biometric provides authentication and cryptosystem imparts security …

Smartphone based visible iris recognition using deep sparse filtering

KB Raja, R Raghavendra, VK Vemuri… - Pattern Recognition Letters, 2015 - Elsevier
Good biometric performance of iris recognition motivates it to be used for many large scale
security and access control applications. Recent works have identified visible spectrum iris …

Person identification using fusion of iris and periocular deep features

S Umer, A Sardar, BC Dhara, RK Rout, HM Pandey - Neural Networks, 2020 - Elsevier
A novel method for person identification based on the fusion of iris and periocular biometrics
has been proposed in this paper. The challenges for image acquisition for Near-Infrared or …

[หนังสือ][B] Iris biometrics: from segmentation to template security

C Rathgeb, A Uhl, P Wild - 2012 - books.google.com
Iris Biometrics: From Segmentation to Template Security provides critical analysis,
challenges and solutions on recent iris biometric research topics, including image …

Design decisions for an iris recognition sdk

C Rathgeb, A Uhl, P Wild, H Hofbauer - Handbook of iris recognition, 2016 - Springer
Open-source software development kits are vital to (iris) biometric research in order to
achieve comparability and reproducibility of research results. In addition, for further …

Biometrics and privacy-preservation: How do they evolve?

QN Tran, BP Turnbull, J Hu - IEEE Open Journal of the …, 2021 - ieeexplore.ieee.org
The emerging field of privacy-preserving biometrics is attracting significant attention, as a
paradigm that can address several of the key concerns in cryptographic authentication …

Private key encryption and recovery in blockchain

M Aydar, SC Cetin, S Ayvaz, B Aygun - arxiv preprint arxiv:1907.04156, 2019 - arxiv.org
The disruptive technology of blockchain can deliver secure solutions without the need for a
central authority. In blockchain protocols, assets that belong to a participant are controlled …

Generation of cancelable iris templates via randomized bit sampling

D Sadhya, B Raman - IEEE Transactions on Information …, 2019 - ieeexplore.ieee.org
Iris-based biometric models are widely recognized to be one of the most accurate forms for
authenticating individual identities. Features extracted from the captured iris images (known …

A fingerprint based crypto-biometric system for secure communication

R Dwivedi, S Dey, MA Sharma, A Goel - Journal of Ambient Intelligence …, 2020 - Springer
To maintain secrecy of information during communication, cryptography is considered to be
an impressive solution and cryptographic keys play an important role to ensure the security …

Fingerprint-based crypto-biometric system for network security

S Barman, D Samanta, S Chattopadhyay - EURASIP Journal on …, 2015 - Springer
To ensure the secure transmission of data, cryptography is treated as the most effective
solution. Cryptographic key is an important entity in this process. In general, randomly …