Secured cryptographic key generation from multimodal biometrics: feature level fusion of fingerprint and iris

A Jagadeesan, K Duraiswamy - arXiv preprint arXiv:1003.1458, 2010 - arxiv.org
Human users have a tough time remembering long cryptographic keys. Hence, researchers,
for so long, have been examining ways to utilize biometric features of the user instead of a …

Biometric cryptosystems: a comprehensive survey

P Kaur, N Kumar, M Singh - Multimedia Tools and Applications, 2023 - Springer
Biometric Cryptosystem (BCS) combines characteristics of both the fields: biometric and
cryptosystem, where biometric provides authentication and cryptosystem imparts security …

Biometrics, is it a viable proposition for identity authentication and access control?

HJ Kim - Computers & Security, 1995 - Elsevier
In modern society, where a welfare recipient signs up for benefits under six identities, a child
is released to a stranger from a day care centre, a hacker accesses sensitive databases, and …

Review paper on introduction of various biometric areas

SD Deshpande - Advances in Computational Research, 2015 - search.proquest.com
Biometrics is a growing technology, which has been widely used in forensics, secured
access and prison security. A biometric system is fundamentally a pattern recognition system …

[PDF][PDF] Human recognition methods based on biometric technologies

A Sharma, P Chaturvedi, S Arya - International Journal of Computer …, 2015 - Citeseer
Biometric has revolutionized the Human Recognition Technology. The base and reach of
human recognition system has been expanded by the innovative uses of Biometric devices …

Biometric authentication

JL Lin, HL Hsu, TL Jong, WH Hsu - Pattern recognition, machine …, 2011 - Springer
This chapter will introduce several biometric recognition technologies, for example,
fingerprint, person's face, eye pupil, sound, etc., and, in the meantime, also will introduce the …

Multibiometric systems: Overview, case studies, and open issues

A Ross, N Poh - Handbook of Remote Biometrics: for Surveillance and …, 2009 - Springer
Abstract Information fusion refers to the reconciliation of evidence presented by multiple
sources of information in order to generate a decision. In the context of biometrics, evidence …

[PDF][PDF] A survey on multimodal biometric

S Kalra, A Lamba - International journal of computer science and …, 2014 - academia.edu
Multibiometric systems are being increasingly deployed in many large scale biometric
applications because they have several advantages such as lower error rates and larger …

Security and privacy in biometrics: towards a holistic approach

P Campisi - Security and privacy in biometrics, 2013 - Springer
Security and privacy in biometric systems have been traditionally seen as two requirements
hindering each other. Only in the recent past researchers have started investigating it as a …

[PDF][PDF] A biometric security model for mobile applications

S Soviany, S Puscoci, V Sandulescu… - International Journal of …, 2018 - academia.edu
A biometric security model for mobile applications is defined. It is a low-complexity design
with a security architecture including 2 biometric traits (fingerprint and iris). The fingerprint …