Using genetic algorithms to improve matching performance of changeable biometrics from combining PCA and ICA methods

MY Jeong, JY Choi, J Kim - 2007 IEEE Conference on …, 2007 - ieeexplore.ieee.org
Biometrics is personal authentication which uses an individual's information. In terms of user
authentication, biometric systems have many advantages. However, despite its advantages …

FuzzyHash: A secure biometric template protection technique

ATB Jin, J Kim - 2007 Frontiers in the Convergence of …, 2007 - ieeexplore.ieee.org
Biometrics is likely to provide a new level of security to applications since application users
will need to prove their identity when attempting access. Yet if the stored biometric template …

模糊逻辑在人脸特征保护算法中的应用

周玲丽, 赖剑煌, 吴娴 - 计算机科学, 2011 - cqvip.com
随着人脸识别在门禁, 视频监控等公共安全领域中的应用日益广泛, 人脸特征数据的安全性和
隐私性问题成为备受关注的焦点. 近年来出现了许多关于生物特征及人脸特征的安全保护算法 …

Security, privacy and performance improvements for fuzzy extractors

R Brien - 2020 - ruor.uottawa.ca
With the usage of biometrics becoming commonly used in a variety of applications, keeping
those biometrics private and secure is an important issue. Indeed, the convenience of using …

A Secure Framework to Preserve Privacy of Biometric Templates on Cloud Using Deep Learning

S Arora, MPS Bhatia - Recent Advances in Computer Science …, 2021 - ingentaconnect.com
Introduction: Cloud computing involves the use of maximum remote services through a
network using minimum resources via internet. There are various issues associated with …

Crypto key protection generated from images and chaotic logistic maps

K Srinivas, V Janaki, V Shankar… - Advanced Informatics for …, 2021 - Springer
Cryptography is a mechanism used for protection of valuable information from unacceptable
users in the networking world. It'sa challenging task to protect such assets from illegal users …

Cancelable biometrics for template protection: future directives with deep learning

A Singh, G Jaswal, A Nigam - AI and Deep Learning in Biometric …, 2021 - taylorfrancis.com
In the 21st century, deployment of large biometric systems worldwide like Aadhaar (India),
eKTP (Indonesia), and MyKad (Malaysia) surges the immediate need to secure biometric …

[HTML][HTML] Improving security and privacy in biometric systems

MG Barrero - 2016 - dialnet.unirioja.es
The achievement of perfect security is out of the question. Even if we are not yet aware of
them, every security aimed technology has weaknesses which attackers can exploit in order …

A novel binarization scheme for real-valued biometric feature

J Peng, B Yang - 2017 IEEE 41st annual computer software …, 2017 - ieeexplore.ieee.org
Biometric binarization is the feature-type transformation that converts a specific feature
representation into a binary representation. It is a fundamental issue to transform the real …

基于神经网络和人脸特征的密钥管理方法

张祥德, 唐青松, 陆小军, 朱和贵 - 东北大学学报(自然科学版), 2009 - xuebao.neu.edu.cn
利用神经网络的联想和记忆功能, 将密钥嵌入用户的人脸特征中, 给出了一种方便,
安全的密钥管理方案. 存贮密钥时, 提取用户的人脸特征, 将其离散化为二进制人脸特征序列 …