Secure user identification for consumer electronics devices

H Lee, SH Lee, T Kim, H Bahn - IEEE transactions on …, 2008 - ieeexplore.ieee.org
With the evolution of consumer electronics technologies, personal information in consumer
devices is becoming increasingly valuable. To protect private information from misuses due …

User identification based on finger-vein patterns for consumer electronics devices

D Wang, J Li, G Memik - IEEE Transactions on Consumer …, 2010 - ieeexplore.ieee.org
With the development of consumer electronics technologies, many more powerful consumer
devices such as cell phone, PDA and laptop have brought consumers an unprecedented …

Securing biometric user template using modified minutiae attributes

SS Ali, II Ganapathi, S Prakash, P Consul… - Pattern Recognition …, 2020 - Elsevier
The minutiae points information of a fingerprint is generally saved directly in the database as
a template for the user. It has been deduced through numerous research works that the …

[HTML][HTML] Optimized authentication system with high security and privacy

U Sharma, P Tomar, SS Ali, N Saxena, RS Bhadoria - Electronics, 2021 - mdpi.com
Authentication and privacy play an important role in the present electronic world. Biometrics
and especially fingerprint-based authentication are extremely useful for unlocking doors …

Construction of a secure two-factor user authentication system using fingerprint information and password

W Go, K Lee, J Kwak - Journal of Intelligent Manufacturing, 2014 - Springer
User authentication is highly necessary technology in a variety of services. Many
researchers have proposed a two-factor authentication scheme using certificate and OTP …

Fingerprint verification system involving smart card

Y Gil, D Moon, S Pan, Y Chung - … Seoul, Korea, November 28–29, 2002 …, 2003 - Springer
The fingerprint has been used as biometrics for user identification and authentication
because of its characteristics like uniqueness in that no two fingerprints pair from different …

Fingerprint-based identity authentication and digital media protection in network environment

J Tian, L Li, X Yang - Journal of Computer Science and Technology, 2006 - Springer
Current information security techniques based on cryptography are facing a challenge of
lacking the exact connection between cryptographic key and legitimate users. Biometrics …

A two-stage feature transformation-based fingerprint authentication system for privacy protection in IoT

A Bedari, S Wang, J Yang - IEEE Transactions on Industrial …, 2021 - ieeexplore.ieee.org
The significant and rapid development of the Internet of Things (IoT) in recent years has
greatly benefited people's lives. However, there are serious security and privacy concerns …

A secured mobile phone based on embedded fingerprint recognition systems

X Chen, J Tian, Q Su, X Yang, FY Wang - … , ISI 2005, Atlanta, GA, USA, May …, 2005 - Springer
This paper presents a prototype design and implementation of secured mobile phones
based on embedded fingerprint recognition systems. One is a front-end fingerprint capture …

Robust user authentication model for securing electronic healthcare system using fingerprint biometrics

S Jahan, M Chowdhury, R Islam - International Journal of …, 2019 - Taylor & Francis
The emergence of electronic health or eHealth has revolutionized the healthcare industry to
offer better healthcare services at a low and affordable cost. However, it still suffers from …