Biohashing: two factor authentication featuring fingerprint data and tokenised random number

ATB Jin, DNC Ling, A Goh - Pattern recognition, 2004 - Elsevier
Human authentication is the security task whose job is to limit access to physical locations or
computer network only to those with authorisation. This is done by equipped authorised …

Cancellable biometrics and annotations on biohash

ABJ Teoh, YW Kuan, S Lee - Pattern recognition, 2008 - Elsevier
Lately, the once powerful one-factor authentication which is based solely on either
password, token or biometric approach, appears to be insufficient in addressing the …

An analysis of biohashing and its variants

A Kong, KH Cheung, D Zhang, M Kamel, J You - Pattern recognition, 2006 - Elsevier
As a result of the growing demand for accurate and reliable personal authentication,
biometric recognition, a substitute for or complement to existing authentication technologies …

Cancellable biometerics featuring with tokenised random number

ABJ Teoh, DCL Ngo - Pattern recognition letters, 2005 - Elsevier
In this paper we introduce a novel cancellable biometric realisation approach based on the
iterated inner products between the tokenised pseudo-random number and the face feature …

An improved biohashing for human authentication

A Lumini, L Nanni - Pattern recognition, 2007 - Elsevier
Given the recent explosion of interest in human authentication, verification based on
tokenized pseudo-random numbers and the user specific biometric feature (BioHashing) …

Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs

ABJ Teoh, A Goh, DCL Ngo - IEEE transactions on pattern …, 2006 - ieeexplore.ieee.org
Biometric analysis for identity verification is becoming a widespread reality. Such
implementations necessitate large-scale capture and storage of biometric data, which raises …

Biometric hash based on statistical features of online signatures

C Vielhauer, R Steinmetz… - … Conference on Pattern …, 2002 - ieeexplore.ieee.org
Presents an approach to generating biometric hash values based on statistical features in
online signature signals. Whilst the output of typical online signature verification systems are …

Biometric template transformation: a security analysis

A Nagar, K Nandakumar… - Media Forensics and …, 2010 - spiedigitallibrary.org
One of the critical steps in designing a secure biometric system is protecting the templates of
the users that are stored either in a central database or on smart cards. If a biometric …

Symmetric hash functions for secure fingerprint biometric systems

S Tulyakov, F Farooq, P Mansukhani… - Pattern Recognition …, 2007 - Elsevier
Securing biometrics databases from being compromised is an important research challenge
that must be overcome in order to support widespread use of biometrics based …

Palmhashing: a novel approach for cancelable biometrics

T Connie, A Teoh, M Goh, D Ngo - Information processing letters, 2005 - Elsevier
We propose a novel cancelable biometric approach, known as PalmHashing, to solve the
non-revocable biometric issue. The proposed method hashes palmprint templates with a set …