Privacy–enhancing face biometrics: A comprehensive survey

B Meden, P Rot, P Terhörst, N Damer… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Biometric recognition technology has made significant advances over the last decade and is
now used across a number of services and applications. However, this widespread …

Comparing fingerprint-based biometrics authentication versus traditional authentication methods for e-payment

O Ogbanufe, DJ Kim - Decision Support Systems, 2018 - Elsevier
Biometrics authentication for electronic payment is generally viewed as a quicker,
convenient and a more secure means to identify and authenticate users for online payment …

[PDF][PDF] Technical issues and challenges of biometric applications as access control tools of information security

SMS Ahmad, BM Ali, WAW Adnan - International journal of innovative …, 2012 - ijicic.org
Recent advances in biometric technologies coupled with the increased threats in information
security has proliferated the applications of biometric systems to safeguard information and …

A two-factor protection scheme for MCC fingerprint templates

M Ferrara, D Maltoni, R Cappelli - … international conference of …, 2014 - ieeexplore.ieee.org
Minutia Cylinder-Code (MCC) is an effective representation for robust and fast fingerprint
matching. To avoid that MCC templates can disclose sensitive information about position …

Dynamic random projection for biometric template protection

B Yang, D Hartung, K Simoens… - 2010 Fourth IEEE …, 2010 - ieeexplore.ieee.org
Random projection provides a good diversification effect for biometric template protection
but is drawing increasing security concerns under the token-stolen (or public parameter) …

Ipas: Intelligent protection against silent output corruption in scientific applications

I Laguna, M Schulz, DF Richards, J Calhoun… - Proceedings of the 2016 …, 2016 - dl.acm.org
This paper presents IPAS, an instruction duplication technique that protects scientific
applications from silent data corruption (SDC) in their output. The motivation for IPAS is that …

Fingerprint shell: Secure representation of fingerprint template

C Moujahdi, G Bebis, S Ghouzali, M Rziza - Pattern Recognition Letters, 2014 - Elsevier
Fingerprint is a popular biometric modality which is used extensively in several applications
for person authentication, providing high uniqueness and acceptable performance. Most …

Robust technique for fingerprint template protection

SS Ali, II Ganapathi, S Prakash - IET Biometrics, 2018 - Wiley Online Library
Fingerprint authentication systems generally save data extracted from fingerprint as minutiae
template in the database. However, it is often found that databases can be attacked and …

Privacy-enhanced biometrics-secret binding scheme

B Yang, C Busch - US Patent 10,594,688, 2020 - Google Patents
Generating a distinguishing feature vector by means of a distinguishing feature extractor
module from a raw biomet ric feature of the individual, the distinguishing feature vector being …

A post-quantum fuzzy commitment scheme for biometric template protection: an experimental study

AA Al-Saggaf - IEEE Access, 2021 - ieeexplore.ieee.org
The proliferation and extensive acceptance of biometrics in many sectors is due to its merits
over traditional password-based authentication. Several biometric template protection …