Cancellable fuzzy vault with periodic transformation for biometric template protection

TK Dang, QC Truong, TTB Le, H Truong - IET Biometrics, 2016 - Wiley Online Library
Nowadays, biometrics‐based authentication is playing a potential approach for many
modern applications such as banking, homeland security etc. However, the end‐users may …

Security of biometric authentication systems

V Matyáš, Z Říha - 2010 International Conference on Computer …, 2010 - ieeexplore.ieee.org
This overview paper outlines our views of actual security of biometric authentication and
encryption systems. The attractiveness of some novel approaches like cryptographic key …

Privacy protection in high security biometrics applications

NK Ratha - International Conference on Ethics and Policy of …, 2010 - Springer
While biometrics is useful for secure and accurate identification of a person, it also has
serious privacy implications in handling large databases of biometrics. Standard encryption …

Fingerprint template protection using compact minutiae patterns

V Krivokuca - 2015 - researchspace.auckland.ac.nz
Due to their superior reliability in user authentication compared to traditional security tokens,
biometrics are at the forefront of identity management systems. Despite their potential …

Protecting biometric features by periodic function-based transformation and fuzzy vault

TTB Le, TK Dang, QC Truong, TAT Nguyen - Transactions on Large-Scale …, 2014 - Springer
Biometrics-based authentication is playing an attractive and potential approach nowadays.
However, the end-users do not feel comfortable to use it once the performance and security …

Protecting biometrics using fuzzy extractor and non-invertible transformation methods in kerberos authentication protocol

TAT Nguyen, TK Dang - Transactions on Large-Scale Data-and …, 2017 - Springer
Kerberos is a distributed authentication protocol which guarantees the mutual authentication
between client and server over an insecure network. After the identification, all the …

[图书][B] Investigation of Multimodal Template-Free Biometric Techniques and Associated Exception Handling

SR Aldosary - 2015 - search.proquest.com
The Biometric systems are commonly used as a fundamental tool by both government and
private sector organizations to allow restricted access to sensitive areas, to identify the …

Dynamic Publishers, Inc., USA Security of Biometric Authentication Systems

V Matyáš, Z Říha - … Journal of Computer Information Systems and …, 2011 - cspub-ijcisim.org
This paper outlines our views of actual security of biometric authentication and encryption
systems. The attractiveness of some novel approaches like cryptographic key generation …