Fingerprint images encryption via multi-scroll chaotic attractors

F Han, J Hu, X Yu, Y Wang - Applied mathematics and computation, 2007 - Elsevier
This paper proposes a chaotic fingerprint images encryption approach. An image of a
fingerprint is encrypted via a two-dimensional (2D) chaotic sequence obtained from multi …

Biometrics for electronic health records

AE Flores Zuniga, KT Win, W Susilo - Journal of medical systems, 2010 - Springer
Securing electronic health records, in scenarios in which the provision of care services is
share among multiple actors, could become a complex and costly activity. Correct …

Overview of ICmetrics Technology–Security Infrastructure for Autonomous and Intelligent Healthcare System

Y Kovalchuk, K McDonald-Maier… - International Journal of …, 2011 - repository.essex.ac.uk
Recent developments in bio-, nano-, and digital technology have changed the way modern
healthcare systems operate. The provision of healthcare servicing remotely and exploitation …

Evaluating biometric encryption key generation using handwritten signatures

S Hoque, M Fairhurst, G Howells - 2008 Bio-inspired, Learning …, 2008 - ieeexplore.ieee.org
In traditional cryptosystems, user authentication is based on the possession of secret
keys/tokens. Such keys can be forgotten, lost, stolen, or may be illegally shared, but an …

[PDF][PDF] Anonymous biometric access control

S Ye, Y Luo, J Zhao, SCS Cheung - EURASIP Journal on Information …, 2009 - Springer
Access control systems using the latest biometric technologies can offer a higher level of
security than conventional password-based systems. Their widespread deployments …

Anonymous biometric access control based on homomorphic encryption

Y Luo, SC Sen-ching, S Ye - 2009 IEEE International …, 2009 - ieeexplore.ieee.org
In this paper, we consider the problem of incorporating privacy protection in a biometric
access control system. An anonymous biometric access control (ABAC) system is proposed …

High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia

Z Wu, B Liang, L You, Z Jian, J Li - Soft Computing, 2016 - Springer
Biometric identification has caused a multitude of problems in the networking environment,
such as the storage of user's biometric template and the leakage of user's privacy, therefore …

[PDF][PDF] An effective hybrid encryption model using biometric key for ensuring data security.

S Arumugam - Int. Arab J. Inf. Technol., 2023 - iajit.org
Cybersecurity becomes a key concern in many applications as cybercrimes exploit system
weaknesses. Cryptography helps protect sensitive data in everyday transactions and …

Biometric hashing based on genetic selection and its application to on-line signatures

MR Freire, J Fierrez, J Galbally… - Advances in Biometrics …, 2007 - Springer
We present a general biometric hash generation scheme based on vector quantization of
multiple feature subsets selected with genetic optimization. The quantization of subsets …

[PDF][PDF] A method to improve the security level of ATM banking systems using AES algorithm

N Selvaraju, G Sekar - International Journal of Computer Applications, 2010 - Citeseer
ABSTRACT An embedded Crypto-Biometric authentication scheme for ATM banking
systems is proposed in our paper. In this scheme, cryptography and biometric techniques …