Attacks and countermeasures on privacy-preserving biometric authentication schemes

Y Wu, J Weng, Z Wang, K Wei, J Wen… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Based on the Threshold Predicate Encryption (TPE), the biometric authentication scheme
PassBio aims to correctly authenticate genuine end-users without leaking their biometric …

[PDF][PDF] Secure biometric systems

U Uludag - 2006 - researchgate.net
Biometrics-based personal authentication systems that use physiological (eg, fingerprint,
face, iris) or behavioral (eg, speech, handwriting) traits are being increasingly utilized in …

Biometric system security

A Adler - Handbook of biometrics, 2008 - Springer
Security is “freedom from risk or danger”, while computer and data security is “the ability of a
system to protect information and system resources with respect to confidentiality and …

Biometric cryptosystems: issues and challenges

U Uludag, S Pankanti, S Prabhakar… - Proceedings of the …, 2004 - ieeexplore.ieee.org
In traditional cryptosystems, user authentication is based on possession of secret keys; the
method falls apart if the keys are not kept secret (ie, shared with non-legitimate users) …

Security issues in biometric authentication

Q Xiao - Proceedings from the Sixth Annual IEEE SMC …, 2005 - ieeexplore.ieee.org
User authentication is fundamental to the protection of information systems. It is the first and
most critical link in the security chain that restricts access to system and data resources to …

[PDF][PDF] A simple review of biometric template protection schemes used in preventing adversary attacks on biometric fingerprint templates

J Mwema, M Kimwele, S Kimani - International Journal of …, 2015 - researchgate.net
In this paper, we base our research on biometric systems security. We begin by introducing
biometrics after which we will describe how a biometric system works before we later define …

On the leakage of information in biometric authentication

E Pagnin, C Dimitrakakis, A Abidin… - … Conference on Cryptology …, 2014 - Springer
In biometric authentication protocols, a user is authenticated or granted access to a service if
her fresh biometric trait matches the reference biometric template stored on the service …

Protecting biometric templates with sketch: Theory and practice

Y Sutcu, Q Li, N Memon - IEEE Transactions on Information …, 2007 - ieeexplore.ieee.org
Secure storage of biometric templates has become an increasingly important issue in
biometric authentication systems. We study how secure sketch, a recently proposed error …

[HTML][HTML] Biometric template attacks and recent protection mechanisms: A survey

SM Abdullahi, S Sun, B Wang, N Wei, H Wang - Information Fusion, 2024 - Elsevier
It is an undeniable fact that biometric recognition systems are susceptible to different
software-related or template attacks at different vulnerable points in the biometric …

[HTML][HTML] A survey of biometrics security systems

C Le, R Jain - EEUU. Washington University in St …, 2009 - classes.engineering.wustl.edu
In today's society, advances in technology have made life easier by providing us with higher
levels of knowledge through the invention of different devices. However, each technological …