ATB Jin, J Kim - 2007 Frontiers in the Convergence of …, 2007 - ieeexplore.ieee.org
Biometrics is likely to provide a new level of security to applications since application users will need to prove their identity when attempting access. Yet if the stored biometric template …
With the usage of biometrics becoming commonly used in a variety of applications, keeping those biometrics private and secure is an important issue. Indeed, the convenience of using …
S Arora, MPS Bhatia - Recent Advances in Computer Science …, 2021 - ingentaconnect.com
Introduction: Cloud computing involves the use of maximum remote services through a network using minimum resources via internet. There are various issues associated with …
K Srinivas, V Janaki, V Shankar… - Advanced Informatics for …, 2021 - Springer
Cryptography is a mechanism used for protection of valuable information from unacceptable users in the networking world. It'sa challenging task to protect such assets from illegal users …
A Singh, G Jaswal, A Nigam - AI and Deep Learning in Biometric …, 2021 - taylorfrancis.com
In the 21st century, deployment of large biometric systems worldwide like Aadhaar (India), eKTP (Indonesia), and MyKad (Malaysia) surges the immediate need to secure biometric …
The achievement of perfect security is out of the question. Even if we are not yet aware of them, every security aimed technology has weaknesses which attackers can exploit in order …
J Peng, B Yang - 2017 IEEE 41st annual computer software …, 2017 - ieeexplore.ieee.org
Biometric binarization is the feature-type transformation that converts a specific feature representation into a binary representation. It is a fundamental issue to transform the real …