P Lacharme, E Cherrier… - … Conference on Security …, 2013 - ieeexplore.ieee.org
Biometric recognition is more and more employed in authentication and access control of various applications. Biometric data are strongly linked with the user and do not allow …
AK Jindal, I Shaik, V Vasudha… - 2020 IEEE 19th …, 2020 - ieeexplore.ieee.org
The rapid proliferation of biometrics has led to growing concerns about the security and privacy of the biometric data (template). A biometric uniquely identifies an individual and …
Systems for secured image processing, image recognition, biometric recognition, and face recognition in untrusted envi ronments. The disclosure includes a system for secure image …
This paper proposes a novel method to perform privacy-preserving face identification based on the notion of group testing, and applies it to a solution using the Cheon-Kim-Kim-Song …
This paper proposes a non-interactive end-to-end solution for secure fusion and matching of biometric templates using fully homomorphic encryption (FHE). Given a pair of encrypted …
X Yin, S Wang, M Shahzad, J Hu - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Identity authentication has become an essential component for access control in the Internet of Things (IoT) environment. To overcome the inherent weakness of password-based …
X Yin, S Wang, Y Zhu, J Hu - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Fingerprint authentication techniques have been employed in various Internet of Things (IoT) applications for access control to protect private data, but raw fingerprint template …
Bloom filters (BFs) and homomorphic encryption (HE) are prominent techniques used to design biometric template protection (BTP) schemes that aim to protect sensitive biometric …
Biometric systems consist of devices, algorithms, and procedures used to recognize individuals or classes of individuals based on their physical or behavioral characteristics …