Biometrics-based personal authentication systems that use physiological (eg, fingerprint, face, iris) or behavioral (eg, speech, handwriting) traits are being increasingly utilized in …
Security is “freedom from risk or danger”, while computer and data security is “the ability of a system to protect information and system resources with respect to confidentiality and …
In traditional cryptosystems, user authentication is based on possession of secret keys; the method falls apart if the keys are not kept secret (ie, shared with non-legitimate users) …
Q Xiao - Proceedings from the Sixth Annual IEEE SMC …, 2005 - ieeexplore.ieee.org
User authentication is fundamental to the protection of information systems. It is the first and most critical link in the security chain that restricts access to system and data resources to …
In this paper, we base our research on biometric systems security. We begin by introducing biometrics after which we will describe how a biometric system works before we later define …
In biometric authentication protocols, a user is authenticated or granted access to a service if her fresh biometric trait matches the reference biometric template stored on the service …
Y Sutcu, Q Li, N Memon - IEEE Transactions on Information …, 2007 - ieeexplore.ieee.org
Secure storage of biometric templates has become an increasingly important issue in biometric authentication systems. We study how secure sketch, a recently proposed error …
SM Abdullahi, S Sun, B Wang, N Wei, H Wang - Information Fusion, 2024 - Elsevier
It is an undeniable fact that biometric recognition systems are susceptible to different software-related or template attacks at different vulnerable points in the biometric …
C Le, R Jain - EEUU. Washington University in St …, 2009 - classes.engineering.wustl.edu
In today's society, advances in technology have made life easier by providing us with higher levels of knowledge through the invention of different devices. However, each technological …