On biometrics‐based authentication and identification from a privacy‐protection perspective: Deriving privacy‐enhancing requirements

V Zorkadis, P Donos - Information Management & Computer Security, 2004 - emerald.com
Biometric techniques, such as fingerprint verification, iris or face recognition, retina analysis
and hand‐written signature verification, are increasingly becoming basic elements of …

Biometrics-based authentication: A new approach

Y Sui, X Zou, EY Du - 2011 Proceedings of 20th International …, 2011 - ieeexplore.ieee.org
Authentication is a fundamental issue to any trust-oriented computing system and also a
critical part in many security protocols. Performing authentication is notoriously difficult …

Novel approach for multimodal feature fusion to generate cancelable biometric

K Gupta, GS Walia, K Sharma - The Visual Computer, 2021 - Springer
Biometric systems provide various benefits over traditional pin-based authentication
systems. However, the issue of data privacy and theft is of great concern. To resolve these …

Biometric template transformation: a security analysis

A Nagar, K Nandakumar… - Media Forensics and …, 2010 - spiedigitallibrary.org
One of the critical steps in designing a secure biometric system is protecting the templates of
the users that are stored either in a central database or on smart cards. If a biometric …

Random slope method for generation of cancelable biometric features

H Kaur, P Khanna - Pattern Recognition Letters, 2019 - Elsevier
Cancelable biometric templates are transformed versions of original biometric templates
used for authentication purposes. The transformation functions should fulfill the important …

[PDF][PDF] Secure biometric authentication system architecture using error correcting codes and distributed cryptography

E Maiorana, C Ercole - … of Gruppo nazionale Telecomunicazioni e Teoria …, 2007 - Citeseer
The most emerging technology for people identification and authentication is biometrics. In
contrast with traditional recognition approaches, biometric authentication relies on who a …

Biometric template protection using cancelable biometrics and visual cryptography techniques

H Kaur, P Khanna - Multimedia Tools and Applications, 2016 - Springer
Wide spread use of biometric based authentication implies the need to secure biometric
reference data. Various template protection schemes have been introduced to prevent …

[PDF][PDF] Combining multiple biometrics to protect privacy

B Yanikoglu, A Kholmatov - Proc. ICPR-BCTP …, 2004 - wwwiti.cs.uni-magdeburg.de
As biometrics are gaining popularity, there is increased concern over the loss of privacy and
potential misuse of biometric data held in central repositories. The association of fingerprints …

Design and analysis of a highly user-friendly, secure, privacy-preserving, and revocable authentication method

Y Sui, X Zou, EY Du, F Li - IEEE Transactions on Computers, 2013 - ieeexplore.ieee.org
A large portion of system breaches are caused by authentication failure, either during the
login process or in the post-authentication session; these failures are themselves related to …

[PDF][PDF] Cancellable Multi-Biometric Template Generation Based on Arnold Cat Map and Aliasing.

AM Ayoup, AAM Khalaf, W El-Shafai… - … , Materials & Continua, 2022 - academia.edu
The cancellable biometric transformations are designed to be computationally difficult to
obtain the original biometric data. This paper presents a cancellable multi-biometric …