Privacy-preserving palm print authentication using homomorphic encryption

JH Im, JC Choi, DH Nyang… - 2016 IEEE 14th Intl Conf on …, 2016 - ieeexplore.ieee.org
Biometric verification systems have security issues regarding the storage of biometric data in
that a user's biometric features cannot be changed into other ones even when a system is …

Adaptive fusion of biometric and biographic information for identity de-duplication

PS Sudhish, AK Jain, K Cao - Pattern Recognition Letters, 2016 - Elsevier
Use of biometrics for person identification has increased tremendously over the past
decade, eg, in large scale national identification programs, for law enforcement and border …

A constraint-based biometric scheme on ATM and swiping machine

S Singh, A Singh, R Kumar - 2016 international conference on …, 2016 - ieeexplore.ieee.org
In this modern scientific world, technologies are transforming rapidly but along with the ease
and comfort they also bring in a big concern for security. Taking into account the physical …

Method for using visible ocular vasculature for mobile biometrics

V Gottemukkula, S Saripalle, SP Tankasala… - IET …, 2016 - Wiley Online Library
Securing personal information on handheld devices, especially smartphones, has gained a
significant interest in recent years. Yet, most of the popular biometric modalities require …

A palmprint based recognition system for smartphone

K Tiwari, CJ Hwang, P Gupta - 2016 Future Technologies …, 2016 - ieeexplore.ieee.org
This paper proposes a palmprint based human identification system for smartphone. It
presents simple markers to the user for palmprint video acquisition and suggests a strategy …

3D ear identification using block-wise statistics-based features and LC-KSVD

L Zhang, L Li, H Li, M Yang - IEEE transactions on multimedia, 2016 - ieeexplore.ieee.org
Biometrics authentication has been corroborated to be an effective method for recognizing a
person's identity with high confidence. In this field, the use of three-dimensional (3D) ear …

Modeling multimodal biometric modalities for continuous user authentication

C Shen, H Zhang, Z Yang… - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
Continuous authentication offers the ability to continuously verify users' identity for accessing
to the protected resource. Although current explorations such as face and fingerprint …

Biometric identification system based on Principal Component Analysis

R Lionnie, M Alaydrus - 2016 12th International Conference on …, 2016 - ieeexplore.ieee.org
The pattern recognition system for biometric identification, which was presented in this
paper, used mathematical and statistical approaches such as Principal Component Analysis …

When biometrics meet iot: A survey

C Ren, Y Gong, F Hao, X Cai, Y Wu - Proceedings of the 6th International …, 2016 - Springer
The Internet of things, known as the third wave of the world's information industry, has been
widespread concerned in our society. Many countries regard IoT as a national strategic level …

Finger vein recognition based on stable and discriminative superpixels

L Zhou, G Yang, Y Yin, L Yang… - International Journal of …, 2016 - World Scientific
Finger vein pattern, as a promising hand-based biometric technology, has been well studied
in recent years. In this paper, a new superpixel-based finger vein recognition method is …