[PDF][PDF] Risk of masquerade arising from the storage of biometrics

CJ Hill - Bachelor of Science thesis, The Department of …, 2001 - Citeseer
Biometric authentication and identification systems are increasingly being used in place of
traditional security systems. The introduction of new technology brings new security …

A survey on biometric cryptosystems and cancelable biometrics

C Rathgeb, A Uhl - EURASIP journal on information security, 2011 - Springer
Form a privacy perspective most concerns against the common use of biometrics arise from
the storage and misuse of biometric data. Biometric cryptosystems and cancelable …

PassBio: Privacy-preserving user-centric biometric authentication

K Zhou, J Ren - IEEE Transactions on Information Forensics …, 2018 - ieeexplore.ieee.org
The proliferation of online biometric authentication has necessitated security requirements of
biometric templates. The existing secure biometric authentication schemes feature a server …

Robust biometric scheme against replay attacks using one-time biometric templates

T Gernot, C Rosenberger - Computers & Security, 2024 - Elsevier
User authentication is an important issue on the Internet and usually solved through static
and often unique passwords. Another method is to use biometrics, but biometric data are …

Security of biometric authentication systems

V Matyáš, Z Říha - 2010 International Conference on Computer …, 2010 - ieeexplore.ieee.org
This overview paper outlines our views of actual security of biometric authentication and
encryption systems. The attractiveness of some novel approaches like cryptographic key …

[图书][B] Biometric solutions: For authentication in an e-world

DD Zhang - 2012 - books.google.com
In today's complex, geographically mobile, electronically wired information society, the
problem of identifying a person continues to pose a great challenge. Since the conventional …

A multi-biometric verification system for the privacy protection of iris templates

S Cimato, M Gamassi, V Piuri, R Sassi… - Proceedings of the …, 2009 - Springer
Biometric systems have been recently developed and used for authentication or
identification in several scenarios, ranging from institutional purposes (border control) to …

Fundamental limits for privacy-preserving biometric identification systems that support authentication

T Ignatenko, FMJ Willems - IEEE Transactions on Information …, 2015 - ieeexplore.ieee.org
In this paper, we analyze two types of biometric identification systems with protected
templates that also support authentication. In the first system, two terminals observe …

Biometric systems: Privacy and secrecy aspects

T Ignatenko, FMJ Willems - IEEE Transactions on Information …, 2009 - ieeexplore.ieee.org
This paper addresses privacy leakage in biometric secrecy systems. Four settings are
investigated. The first one is the standard Ahlswede-Csiszar secret-generation setting in …

[PDF][PDF] Combining multiple biometrics to protect privacy

B Yanikoglu, A Kholmatov - Proc. ICPR-BCTP …, 2004 - wwwiti.cs.uni-magdeburg.de
As biometrics are gaining popularity, there is increased concern over the loss of privacy and
potential misuse of biometric data held in central repositories. The association of fingerprints …