A novel cancelable facehashing technique based on non-invertible transformation with encryption and decryption template

A Sardar, S Umer, C Pero, M Nappi - IEEE Access, 2020 - ieeexplore.ieee.org
… [38] proposed a two-stage cryptographic key generation method based on FaceHashing
is discretized to generate FaceHash while in the second stage, FaceHash is reduced to a …

FEHash: Full entropy hash for face template protection

TM Dang, L Tran, TD Nguyen… - Proceedings of the IEEE …, 2020 - openaccess.thecvf.com
… Nowadays, the robustness of most security systems rely on the strength of cryptographic key
(… Authentication based on a concept of ”who we are” is much more convenient than ”what we …

[PDF][PDF] ExpressionHash: Securing Telecare Medical Information Systems Using BioHashing.

A Riaz, N Riaz, A Mahmood, SA Khan… - … , Materials & Continua, 2021 - academia.edu
… [21] proposed the face hashing scheme and they have argued that using unique tokenized
… Goh, “Personalised cryptographic key generation based on FaceHashing,” Computers & …

[HTML][HTML] Face recognition system with hybrid template protection scheme for Cyber–Physical-Social Services

A Sardar, S Umer, RK Rout, C Pero - Pattern Recognition Letters, 2023 - Elsevier
… [19] proposed a CPSS for personalized human activity recognition based on 2-dimensional …
feature f F , we employed the FaceHashing technique, which generates the feature vector x F …

A Secure Framework to Preserve Privacy of Biometric Templates on Cloud Using Deep Learning

S Arora, MPS Bhatia - Recent Advances in Computer Science …, 2021 - ingentaconnect.com
… of a block cipher along with a strong cryptographic hashing … Base Algorithm (AMBA) [6]
was used to generate secret key … further encrypted using Advanced Encryption Standard (AES) …

Privacy-preserving Multi-biometric Indexing based on Frequent Binary Patterns

D Osorio-Roig, LJ González-Soler… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
… The latter has motivated the scientific literature to investigate new customised procedures …
lable FaceHashing technique based on non-invertible transformation with encryption and …

A novel transformation based security scheme for multi-instance fingerprint biometric system

D Sharma, A Selwal - International Conference on Information …, 2020 - Springer
… creating a secure cryptographic key which is based on MBS (… template generation and
Cryptographic key generation. At first… In the last, a secure cryptographic key with a size 256-bit was …

Crypto key protection generated from images and chaotic logistic maps

K Srinivas, V Janaki, V Shankar… - Advanced Informatics for …, 2021 - Springer
… Therefore, both the algorithm technique and key generation methodology are equally …
that includes crypto key generation and crypto key protection where the protected key and its …

[PDF][PDF] A Biometric Key Generation Method Based on Semi supervised Data Clustering

S SAMAL, SS BEHERA - journal-dogorangsang.in
… Eventually, every individual binary string is concatenated to form the encryption key for …
and discriminative keys. In this paper, we propose a novel method to generate encryption keys

Promoting Active Learning and Protecting Student Privacy for Smart Education

H Geddam - 2023 - search.proquest.com
… As the e-learning environment is directed toward improving student personalized learning, …
encryption methods are far better than the classical and traditional face hashing algorithms. …