[PDF][PDF] Multi-biometric approaches to face and fingerprint biometrics

DC Shubhangi, M Bali - International Journal of Engineering …, 2012 - academia.edu
Biometrics based personal identification techniques that use physiological or behavioral
characteristics are becoming increasingly popular compared to traditional token-based or …

[PDF][PDF] The Authentication Dilemma.

A Wiercioch, S Teufel, B Teufel - J. Commun., 2018 - jocm.us
The design of user authentication has a significant impact on IT security or cybersecurity in
general. Studies show that users put more weight on faster and more convenient access to …

Privacy-preserving model for biometric-based authentication and Key Derivation Function

O Italis, S Pierre, A Quintero - Journal of Information Security and …, 2023 - Elsevier
Bio-cryptosystems often save the biometric template for authentication and generally employ
randomly generated keys to encrypt and sign data. This method raises privacy protection …

Best practices for privacy and data protection for the processing of biometric data

E Kindt - Security and privacy in biometrics, 2013 - Springer
Self-regulatory initiatives by data controllers can contribute to a better enforcement of data
protection rules. This is especially important for the use of biometric data in identity …

Biometric authentication—security and usability

V Matyáš, Z Říha - … Communications and Multimedia Security: IFIP TC6 …, 2002 - Springer
We would like to outline our opinions about the usability of biometric authentication systems.
We outline the position of biometrics in the current field of computer security in the first …

Privacy and biometrics for smart healthcare systems: attacks, and techniques

A Wells, AB Usman - Information Security Journal: A Global …, 2024 - Taylor & Francis
Biometric technology has various applications in smart healthcare systems, including patient
authentication, health monitoring, telemedicine, clinical decision support, and personalized …

Secure biometrics: Concepts, authentication architectures, and challenges

S Rane, Y Wang, SC Draper… - IEEE Signal Processing …, 2013 - ieeexplore.ieee.org
Biometrics are an important and widely used class of methods for identity verification and
access control. Biometrics are attractive because they are inherent properties of an …

Biometric layering with fingerprints: template security and privacy through multi-biometric template fusion

M Yildiz, B Yanikoğlu, A Kholmatov… - The Computer …, 2017 - academic.oup.com
As biometric applications are gaining popularity, there is increased concern over the loss of
privacy and potential misuse of biometric data held in central repositories. We present a …

Bio-cryptography

K Xi, J Hu - Handbook of Information and Communication Security, 2010 - Springer
Cryptography is the backbone upon which modern security has been established. For
authentication, conventional cryptography depends on either secret knowledge such as …

Biophasor: Token supplemented cancellable biometrics

ABJ Teoh, DCL Ngo - 2006 9th international conference on …, 2006 - ieeexplore.ieee.org
Biometrics characteristics are immutable, resulting in permanent biometrics compromise. To
address this problem, we prescribe a generic cancellable biometrics formulation-BioPhasor …