Biometric Identification Systems: Feature Level Clustering of Large Biometric Data and DWT Based Hash Coded Bar Biometric System

VB Radhika - 2009 - ethesis.nitrkl.ac.in
Biometric authentication systems are fast replacing conventional identification schemes
such as passwords and PIN numbers. This paper introduces a novel matching scheme that …

Secure authentication in multimodal biometric systems using cryptographic hash functions

A Ashok, P Poornachandran, K Achuthan - Recent Trends in Computer …, 2012 - Springer
Abstract In this Information Age, security of personal data is one of the biggest issues faced
by most of the nations. Biometrics provides substantial help in guarding against attempts to …

Optics based biohashing using joint transform correlator

N Saini, A Sinha - Optics communications, 2010 - Elsevier
Most authentication process uses password and personal identification numbers (PIN) for
security purposes. In order to remove the problem of hacking or stealing of the password …

LBP-based biometric hashing scheme for human authentication

Z Bai, D Hatzinakos - … on Control Automation Robotics & Vision, 2010 - ieeexplore.ieee.org
Biometric hash finds extensive applications in multimedia security systems. Biometric
hashing schemes combine biometric features with random numbers for robust and secure …

An approach to matching fingerprints using cryptographic one-way hashes

Q Gao - International Journal of Biometrics, 2017 - inderscienceonline.com
Password-based systems authenticate users with cryptographic one-way hashes without
storing plaintext passwords. The method prevents a hacker from reversing the hashes and …

Development of a biometric authentication system based on HAAR transformation and score level fusion

BR Naidu, MSP Babu - 2016 7th IEEE International …, 2016 - ieeexplore.ieee.org
In traditional authentication system Password, Pin-number and Signature are used as
sources for identification. The latest technological advancements forced human beings …

Handwriting biometrics: Feature selection based improvements in authentication and hash generation accuracy

A Makrushin, T Scheidat, C Vielhauer - … , March 8-10, 2011. Proceedings 3, 2011 - Springer
Biometric cryptosystems extend the user authentication functionality of usual biometric
systems with the ability to generate robust stable values (also called biometric hashes) from …

Ear biometrics: A new approach

A Sana, P Gupta, R Purkait - Advances in pattern recognition, 2007 - World Scientific
The paper presents an efficient ear biometrics system for human recognition based on
discrete Haar wavelet transform. In the proposed approach the ear is detected from a raw …

A novel digital signature algorithm based on biometric hash

S Saxena, D Anand - International Journal of Computer …, 2017 - search.proquest.com
Digital Signature protects the documents integrity and binds the authenticity of the user who
have signed. Present Digital Signature algorithm confirms authenticity but it does not ensure …

Biometric hashing based on genetic selection and its application to on-line signatures

MR Freire, J Fierrez, J Galbally… - Advances in Biometrics …, 2007 - Springer
We present a general biometric hash generation scheme based on vector quantization of
multiple feature subsets selected with genetic optimization. The quantization of subsets …