[HTML][HTML] A survey on biometric cryptosystems and cancelable biometrics

C Rathgeb, A Uhl - EURASIP journal on information security, 2011 - Springer
Form a privacy perspective most concerns against the common use of biometrics arise from
the storage and misuse of biometric data. Biometric cryptosystems and cancelable …

Biometric cryptosystems: a comprehensive survey

P Kaur, N Kumar, M Singh - Multimedia Tools and Applications, 2023 - Springer
Biometric Cryptosystem (BCS) combines characteristics of both the fields: biometric and
cryptosystem, where biometric provides authentication and cryptosystem imparts security …

[图书][B] Introduction to biometrics

A Jain, R Bolle, S Pankanti - 1996 - Springer
Biometrics deals with identification of individuals based on their biological or behavioral
characteristics. Biometrics has lately been receiving attention in popular media, it is widely …

Biometric template security: Challenges and solutions

AK Jain, A Ross, U Uludag - 2005 13th European signal …, 2005 - ieeexplore.ieee.org
A biometric system is vulnerable to a variety of attacks aimed at undermining the integrity of
the authentication process. These attacks are intended to either circumvent the security …

Biometrics: Trust, but verify

AK Jain, D Deb, JJ Engelsma - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Over the past two decades, biometric recognition has exploded into a plethora of different
applications around the globe. This proliferation can be attributed to the high levels of …

Learning a fixed-length fingerprint representation

JJ Engelsma, K Cao, AK Jain - IEEE transactions on pattern …, 2019 - ieeexplore.ieee.org
We present DeepPrint, a deep network, which learns to extract fixed-length fingerprint
representations of only 200 bytes. DeepPrint incorporates fingerprint domain knowledge …

Secure face matching using fully homomorphic encryption

VN Boddeti - 2018 IEEE 9th international conference on …, 2018 - ieeexplore.ieee.org
Face recognition technology has demonstrated tremendous progress over the past few
years, primarily due to advances in representation learning. As we witness the widespread …

Privacy preserving image-based localization

P Speciale, JL Schonberger, SB Kang… - Proceedings of the …, 2019 - openaccess.thecvf.com
Image-based localization is a core component of many augmented/mixed reality (AR/MR)
and autonomous robotic systems. Current localization systems rely on the persistent storage …

Hybrid biometric template protection: Resolving the agony of choice between bloom filters and homomorphic encryption

A Bassit, F Hahn, R Veldhuis, A Peter - IET biometrics, 2022 - Wiley Online Library
Bloom filters (BFs) and homomorphic encryption (HE) are prominent techniques used to
design biometric template protection (BTP) schemes that aim to protect sensitive biometric …

Privacy-preserving iris authentication using fully homomorphic encryption

MK Morampudi, MVNK Prasad, USN Raju - Multimedia Tools and …, 2020 - Springer
Rapid advancement in technology has led to the use of biometric authentication in every
field. In particular, from the past few years, iris recognition systems has gained …