[PDF][PDF] Cryptographic key generation from multiple biometric modalities: Fusing minutiae with iris feature

A Jagadeesan, T Thillaikkarasi… - International Journal of …, 2010 - Citeseer
Human users find difficult to remember long cryptographic keys. Therefore, researchers, for
a long time period, have been investigating ways to use biometric features of the user rather …

Secured cryptographic key generation from multimodal biometrics: feature level fusion of fingerprint and iris

A Jagadeesan, K Duraiswamy - arXiv preprint arXiv:1003.1458, 2010 - arxiv.org
Human users have a tough time remembering long cryptographic keys. Hence, researchers,
for so long, have been examining ways to utilize biometric features of the user instead of a …

Robust biometric authentication system with a secure user template

SS Ali, VS Baghel, II Ganapathi, S Prakash - Image and Vision Computing, 2020 - Elsevier
Biometric feature based human authentication systems provide various advantages over the
classical authentication systems. Out of numerous biometric features in a human body, the …

A crypto-biometric scheme based on iris-templates with fuzzy extractors

RÁ Mariño, FH Álvarez, LH Encinas - Information Sciences, 2012 - Elsevier
One of the most important uses of Biometrics is the identification and authentication of
individuals using one or several of their physiognomical or behavioral features. Moreover …

Comparable features and same cryptography key generation using biometric fingerprint image

G Panchal, D Samanta - 2016 2nd International Conference on …, 2016 - ieeexplore.ieee.org
To enforce the privacy of data, it is important that attacker should not get an access of the
resources. Several mechanisms have been reported to ensure this. All these mechanisms …

Fingerprint shell construction with prominent minutiae points

SS Ali, S Prakash - Proceedings of the 10th annual acm india compute …, 2017 - dl.acm.org
Fingerprint based authentication is one of the most extensively used authentication
technique. Biometric systems relying on fingerprint usually directly uses minutiae points …

[PDF][PDF] An effective scheme for generating irrevocable cryptographic key from cancelable fingerprint templates

N Lalithamani, K Soman - International Journal of Computer Science and …, 2009 - Citeseer
Unswerving information security mechanisms are the need of the hour for fighting the
escalating enormity of identity theft in our society. Besides cryptography being a dominant …

Biometric key generation based on generated intervals and two-layer error correcting technique

P Wang, L You, G Hu, L Hu, Z Jian, C Xing - Pattern Recognition, 2021 - Elsevier
As for a biometric key, key management and biometric data security are both important.
Existing bio-key generation methods are usually based on the biometric templates or …

[PDF][PDF] A survey on biometrics based cryptographic key generation schemes

P Balakumar, R Venkatesan - International Journal of Computer …, 2012 - researchgate.net
Need for information security and privacy is increasing in recent times. Since several
valuable data and files are stored in an organization server system and moreover personal …

Non-invertible cancellable fingerprint template for fingerprint biometric

AK Trivedi, DM Thounaojam, S Pal - Computers & Security, 2020 - Elsevier
Fingerprint biometric has emerged as a highly successful biometric recognition system and
find its application in the diverse domain. The fingerprint template database needs to be …