A Sarkar, BK Singh - Multimedia Tools and Applications, 2020 - Springer
Identifying a person based on their behavioral and biological qualities in an automated manner is called biometrics. The authentication system substituting traditional password and …
SAR Shah, B Issac - Future Generation Computer Systems, 2018 - Elsevier
This study investigates the performance of two open source intrusion detection systems (IDSs) namely Snort and Suricata for accurately detecting the malicious traffic on computer …
Manisha, N Kumar - Artificial Intelligence Review, 2020 - Springer
Biometric recognition is a challenging research field but suffers from privacy and security concerns. To address this concern, Cancelable Biometrics is suggested in literature in which …
M Sandhya, MVNK Prasad - … and Privacy: Opportunities & Challenges in …, 2017 - Springer
With the emergence of biometric authentication systems, template protection for biometrics captured attention in the recent years. The privacy concern arises due to storage and misuse …
B Choudhury, P Then, B Issac, V Raman… - International Journal of …, 2018 - World Scientific
Now-a-days, biometric systems have replaced the password or token based authentication system in many fields to improve the security level. However, biometric system is also …
Cancelable biometric schemes have been widely studied to protect templates in biometric authentication over networks. These schemes transform biometric features and perform …
This chapter covers the online signature-based biometric recognition system, which includes fingerprint scanning, facial geometry, footprint scanning, retina and iris patterns, DNA, and …
S Chauhan, A Sharma - International Journal of Information Technology, 2022 - Springer
To ensure privacy and secrecy of biometric data, template protection schemes are widely used. Template protection schemes ensure renewability, irreversibility, and unlinkability …
R Asthana, GS Walia, A Gupta - Applied Intelligence, 2021 - Springer
In recent times, biometric based authentication systems have seen a tremendous growth in various applications. However, if databases in multiple applications are created using the …