A robust and singular point independent fingerprint shell

VS Baghel, A Ali, S Prakash - Applied Intelligence, 2023 - Springer
Authentication systems have evolved immensely ever since the use of biometrics in the field
of security has started. Nonetheless, extensive usage of biometric systems has also resulted …

An alignment-free non-invertible transformation-based method for generating the cancellable fingerprint template

D Agarwal, A Bansal - Pattern Analysis and Applications, 2022 - Springer
Since long time fingerprint has been the most compelling biometric due to its permanence,
universality, acceptability, and collectability. However, fingerprint recognition raises some …

Enhanced authentication system with robust features for the secure user template

SS Ali, II Ganapathi, T Alsarhan… - 2023 IEEE 12th …, 2023 - ieeexplore.ieee.org
Biometrics has evolved into a crucial instrument for a user's authentication in the modern
world. Biometrics is gaining prominence as a method of authentication and is a viable …

A cancelable biometric authentication scheme based on geometric transformation

VH Champaneria, SJ Patel, MA Zaveri - Multimedia Tools and …, 2024 - Springer
In digital identification technologies, fingerprint-based biometric systems are extensively
utilized for authentication. Fingerprint authentication systems usually store the original …

Generalized benford's law for fake fingerprint detection

G Satapathy, G Bhattacharya… - 2020 IEEE Applied …, 2020 - ieeexplore.ieee.org
Human fingerprints are considered to be the most extensively used modality in state-of-the-
art biometric based security systems. A newly developed potential threat occurs in the form …

Secure multimodal access with 2D and 3D ears

II Ganapathi, S Prakash, SS Ali - Machine Learning for Intelligent …, 2021 - Springer
This chapter introduces a multimodal technique that uses 2D and 3D ear images for secure
access. The technique uses 2D-modality to identify keypoints and 3D-modality to describe …

Robust perceptual fingerprint image hashing: a comparative study

W Birouk, A Lahoulou, A Melit… - International Journal of …, 2023 - inderscienceonline.com
This paper presents a robust perceptual hashing scheme for biometric template protection
where the input fingerprint image is mapped into a sequence of Boolean values. Our aim is …

基于比特串异或和置乱变换的指纹模板保护算法

党力, 张雪锋, 惠妍 - 自动化学报, 2020 - cqvip.com
针对现有指纹模板保护算法存在的准确性较低, 安全性能较差的问题, 提出一种基于比特串异或
和置乱变换的指纹模板保护算法. 该算法在已有二维映射算法的基础上, 对得到的比特串进行异 …

A cancellable and irrevocable approach for fingerprint template protection using optimal iterative solubility algorithm and secure point BASE

K Kanagalakshmi, JK Antony - … Engineering: Applications, Basis …, 2023 - World Scientific
Biometric authentication scheme is a robust, reliable, and convenient way for person
authentication with security. It is necessary to protect biometric information for maintaining …

Non-contact fingerprint template protection using dft combined random projection

BJ Zannou, T Djara, A Vianou - … Journal of Security and Privacy in …, 2022 - igi-global.com
In view of the different dangers to which users of contactless biometric systems are exposed,
we have developed a contactless secure revocable model based on random projection and …