50 years of biometric research: Accomplishments, challenges, and opportunities

AK Jain, K Nandakumar, A Ross - Pattern recognition letters, 2016 - Elsevier
Biometric recognition refers to the automated recognition of individuals based on their
biological and behavioral characteristics such as fingerprint, face, iris, and voice. The first …

Finger vein template protection based on alignment-robust feature description and index-of-maximum hashing

S Kirchgasser, C Kauba, YL Lai… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Privacy preserving storage and secure processing of biometric data is a key issue that has to
be addressed in finger vein recognition systems as well. Various template protection …

A framework for multimodal biometric authentication systems with template protection

ZH Goh, Y Wang, L Leng, SN Liang, Z Jin, YL Lai… - IEEE …, 2022 - ieeexplore.ieee.org
A multimodal biometric authentication framework based on Index-of-Max (IoM) hashing,
Alignment-Free Hashing (AFH), and feature-level fusion is proposed in this paper. This …

[引用][C] Biometric encryption chapter from the encyclopedia of biometrics

A Cavoukian, A Stoianov - 2009 - Information and Privacy …

A survey of automated biometric authentication techniques

AN Kataria, DM Adhyaru, AK Sharma… - 2013 Nirma university …, 2013 - ieeexplore.ieee.org
Biometric authentication refers to the automatic identification of a person by analyzing their
physiological and/or behavioral characteristics or traits. Since many physiological and …

[引用][C] Biometrics-risks and controls

CK Dimitriadis, D Polemi - Information …, 2004 - INFORMATION SYSTEMS AUDIT …

Biometrics: Identifying law & policy concerns

JD Woodward - Biometrics: personal identification in networked society, 1996 - Springer
Today's “new technological realities” force us to examine, from the law and policy
perspectives, what is required to safeguard the public interest and to ensure optimal results …

Biometric recognition: an overview

AK Jain, A Kumar - Second generation biometrics: The ethical, legal and …, 2012 - Springer
Prevailing methods of human identification based on credentials (identification documents
and PIN) are not able to meet the growing demands for stringent security in applications …

Multi-biometric identification with cascading database filtering

P Drozdowski, C Rathgeb, BA Mokroß… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The growing scale and number of biometric deployments around the world necessitates
research into technologies which facilitate fast identification queries and high discriminative …

Security enhancement of biometrics, cryptography and data hiding by their combinations

J Dong, T Tan - 2008 - IET
The security of multimedia information in general and the security of visual information in
particular have increasingly become an issue of great concern in our networked society …