Cancelable biometrics: A review

VM Patel, NK Ratha… - IEEE signal processing …, 2015 - ieeexplore.ieee.org
Recent years have seen an exponential growth in the use of various biometric technologies
for trusted automatic recognition of humans. With the rapid adaptation of biometric systems …

Preserving privacy in speaker and speech characterisation

A Nautsch, A Jiménez, A Treiber, J Kolberg… - Computer Speech & …, 2019 - Elsevier
Speech recordings are a rich source of personal, sensitive data that can be used to support
a plethora of diverse applications, from health profiling to biometric recognition. It is therefore …

Performance comparison of intrusion detection systems and application of machine learning to Snort system

SAR Shah, B Issac - Future Generation Computer Systems, 2018 - Elsevier
This study investigates the performance of two open source intrusion detection systems
(IDSs) namely Snort and Suricata for accurately detecting the malicious traffic on computer …

Biometric template protection: Bridging the performance gap between theory and practice

K Nandakumar, AK Jain - IEEE Signal Processing Magazine, 2015 - ieeexplore.ieee.org
Biometric recognition is an integral component of modern identity management and access
control systems. Due to the strong and permanent link between individuals and their …

[HTML][HTML] Self-sovereign identity in a globalized world: Credentials-based identity systems as a driver for economic inclusion

F Wang, P De Filippi - Frontiers in Blockchain, 2020 - frontiersin.org
After introducing key concepts and definitions in the field of digital identity, this paper will
investigate the benefits and drawbacks of existing identity systems on the road toward …

[图书][B] Handbook of fingerprint recognition

D Maltoni, D Maio, AK Jain, S Prabhakar - 2009 - Springer
Biometric recognition, or simply biometrics, refers to the use of distinctive anatomical and/or
behavioral characteristics or identifiers (eg, fingerprints, face, iris, voice, and hand geometry) …

General framework to evaluate unlinkability in biometric template protection systems

M Gomez-Barrero, J Galbally… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The wide deployment of biometric recognition systems in the last two decades has raised
privacy concerns regarding the storage and use of biometric data. As a consequence, the …

A secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care

AK Das, A Goswami - Journal of medical systems, 2013 - Springer
Connected health care has several applications including telecare medicine information
system, personally controlled health records system, and patient monitoring. In such …

Cancellable iris template generation based on indexing-first-one hashing

YL Lai, Z Jin, ABJ Teoh, BM Goi, WS Yap, TY Chai… - Pattern Recognition, 2017 - Elsevier
Eye iris has been widely recognized as one of the strongest biometrics attributed to its high
accuracy performance. However, templates in conventional iris recognition systems are …

A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations

S Wang, G Deng, J Hu - Pattern Recognition, 2017 - Elsevier
As an important biometric template protection technique, cancelable biometrics provides
enhanced security for biometric-based authentication. Representing biometric information in …