A Singh, YN Singh, P Kumar - … of the 12th International Conference on Soft …, 2021 - Springer
Use of biometrics in digital society has raised the questions of biometric template protection and secure authentication. The biometric template protection mechanisms known so far …
Authentication systems that employ biometrics are commonplace, as they offer a convenient means of authenticating an individual's identity. However, these systems give rise to …
G Zhao, Q Jiang, D Wang, X Ma… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The increasing use of multi-biometric authentication has raised concerns about the security of biometric templates. Many template protection methods based on convolutional neural …
G Mai, MH Lim, PC Yuen - 2015 IEEE 7th International …, 2015 - ieeexplore.ieee.org
Biometric cryptosystem has been proven to be one of the promising approaches for template protection. Since most methods in this approach require binary input, to extend it for multiple …
In this paper, we propose a secure multibiometric system that uses deep neural networks and error-correction coding. We present a feature-level fusion framework to generate a …
A Singh, R Srivastva, YN Singh - International Journal of …, 2021 - researchgate.net
The security of biometric systems, especially protecting the templates stored in the gallery database, is a primary concern for researchers. This paper presents a novel framework …
E Hamouda, O Ouda, X Yuan, T Hamza - Arabian Journal for Science and …, 2016 - Springer
Biometric systems are being increasingly deployed in various applications such as smartphones, passports and visa control, health cards, and crime investigation applications …
JR Pinto, MV Correia… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Biometric systems store sensitive personal data that need to be highly protected. However, state-of-the-art template protection schemes generally consist of separate processes …
Cyberattacks against individuals and organizations are increasing at alarming rates all over the world. Traditional password, pin, smart id, and tokens based systems are insufficient to …