A review on protection and cancelable techniques in biometric systems

JC Bernal-Romero, JM Ramirez-Cortes… - IEEE …, 2023 - ieeexplore.ieee.org
An essential part of cloud computing, IoT, and in general the broad field of digital systems, is
constituted by the mechanisms which provide access to a number of services or …

Efficient private key generation from iris data for privacy and security applications

P Dash, F Pandey, M Sarma, D Samanta - Journal of Information Security …, 2023 - Elsevier
Private key generation based on biometric data is gaining popularity in several
cryptographic applications. Some key generation approaches using fingerprint and face …

Fingerprint bio‐key generation based on a deep neural network

Z Wu, Z Lv, J Kang, W Ding… - International Journal of …, 2022 - Wiley Online Library
With the increasing use of biometric identity authentication, biological key generation
technology is receiving much attention. A high‐strength key that is easy to store and manage …

[HTML][HTML] Two-factor-based RSA key generation from fingerprint biometrics and password for secure communication

K Suresh, R Pal, SR Balasundaram - Complex & Intelligent Systems, 2022 - Springer
In an asymmetric-key cryptosystem, the secure storage of private keys is a challenging task.
This paper proposes a novel approach for generating the same public and private key pair …

[HTML][HTML] Acceleration of inner-pairing product operation for secure biometric verification

SY Jeon, MK Lee - Sensors, 2021 - mdpi.com
With the recent advances in mobile technologies, biometric verification is being adopted in
many smart devices as a means for authenticating their owners. As biometric data leakage …

[HTML][HTML] Biometric template attacks and recent protection mechanisms: A survey

SM Abdullahi, S Sun, B Wang, N Wei, H Wang - Information Fusion, 2024 - Elsevier
It is an undeniable fact that biometric recognition systems are susceptible to different
software-related or template attacks at different vulnerable points in the biometric …

PalmSecMatch: A data-centric template protection method for palmprint recognition

C Liu, H Shao, D Zhong - Displays, 2024 - Elsevier
While existing palmprint recognition researches aim to improve accuracy in various
situations, they often overlook the security implications. This paper delves into template …

Privacy preserving unique identity generation from multimodal biometric data for privacy and security applications

P Dash, M Sarma, D Samanta - Security and Privacy, 2024 - Wiley Online Library
This study presents a novel approach for generating unique identities from multi‐modal
biometric data using ensemble feature descriptors extracted from the consistent regions of …

[HTML][HTML] Dynamic Signature Verification Technique for the Online and Offline Representation of Electronic Signatures in Biometric Systems

J Huang, Y Xue, L Liu - Processes, 2023 - mdpi.com
Biometric systems input physical or personal human characteristics for identification,
authentication, and security purposes. With the advancement in communication and …

A stable cryptographic key generation from fingerprint biometrics using Gray code for secure data storage

K Suresh, R Pal… - International Journal of …, 2023 - inderscienceonline.com
Cryptographic techniques play a major role in digital information security. In cryptography,
securing/storing the cryptographic key is an arduous task. The proposed stable …