[HTML][HTML] Biometric template attacks and recent protection mechanisms: A survey

SM Abdullahi, S Sun, B Wang, N Wei, H Wang - Information Fusion, 2024 - Elsevier
It is an undeniable fact that biometric recognition systems are susceptible to different
software-related or template attacks at different vulnerable points in the biometric …

AVET: A novel transform function to improve cancellable biometrics security

TM Dang, TD Nguyen, T Hoang, H Kim… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Similarity preserving is a key ingredient of cancellable biometric scheme design. The notion
ensures the accuracy performance of the biometric systems can be preserved after the …

Comprehensive Survey: Biometric User Authentication Application, Evaluation, and Discussion

R Alrawili, AAS AlQahtani, MK Khan - arXiv preprint arXiv:2311.13416, 2023 - arxiv.org
This paper conducts an extensive review of biometric user authentication literature,
addressing three primary research questions:(1) commonly used biometric traits and their …

A Comprehensive Review of Unimodal and Multimodal Fingerprint Biometric Authentication Systems: Fusion, Attacks, and Template Protection

U Sumalatha, KK Prakasha, S Prabhu… - IEEE Access, 2024 - ieeexplore.ieee.org
In the contemporary technological landscape, biometrics, encompassing the analysis of
biological data, have gained significance. Biometrics is a methodology that utilize unique …

Cancelable biometric schemes for Euclidean metric and Cosine metric

Y Jiang, P Shen, L Zeng, X Zhu, D Jiang, C Chen - Cybersecurity, 2023 - Springer
The handy biometric data is a double-edged sword, paving the way of the prosperity of
biometric authentication systems but bringing the personal privacy concern. To alleviate the …

Cross-database attack of different coding-based palmprint templates

Z Yang, L Leng, ABJ Teoh, B Zhang, Y Zhang - Knowledge-Based Systems, 2023 - Elsevier
A cross-database attack in biometric systems is a security attack where attackers attempt to
leverage a compromised target user's template in one database and infer their templates in …

Breaking free from entropy's shackles: cosine distance-sensitive error correction for reliable biometric cryptography

Y Lai, X Dong, Z Jin, M Tistarelli… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Biometric cryptosystems present a promising avenue for secure authentication; however, the
efficiency and security of such systems can be hindered by errors in biometric data. To …

Cancelable fingerprint template construction using vector permutation and shift-ordering

SM Abdullahi, K Lv, S Sun… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The need for cancelable biometric techniques has seen a progressive rise due to the rapid
deployment of biometric authentication systems. These techniques prevent compromising …

Research on ciphertext speech biohashing authentication based on chaotic system and improved public chain

Y Huang, B Wang, X Pu, Y Li, Q Zhang - The Journal of Supercomputing, 2024 - Springer
Existing biohashing authentication schemes usually store bioinformation in the cloud, whose
storage method can face the problems of bioinformation leakage and tampering, and single …

Verifiable speech retrieval algorithm based on KNN secure hashing

L An, Y Huang, Q Zhang - Multimedia Tools and Applications, 2023 - Springer
With the rapid development of mobile Internet, the dimension of speech data is too high and
the space is complex. The existing speech retrieval algorithms can not meet the efficient …