A survey on biometric cryptosystems and cancelable biometrics

C Rathgeb, A Uhl - EURASIP journal on information security, 2011 - Springer
Form a privacy perspective most concerns against the common use of biometrics arise from
the storage and misuse of biometric data. Biometric cryptosystems and cancelable …

[图书][B] Iris biometrics: from segmentation to template security

C Rathgeb, A Uhl, P Wild - 2012 - books.google.com
Iris Biometrics: From Segmentation to Template Security provides critical analysis,
challenges and solutions on recent iris biometric research topics, including image …

Secured cryptographic key generation from multimodal biometrics: feature level fusion of fingerprint and iris

A Jagadeesan, K Duraiswamy - arXiv preprint arXiv:1003.1458, 2010 - arxiv.org
Human users have a tough time remembering long cryptographic keys. Hence, researchers,
for so long, have been examining ways to utilize biometric features of the user instead of a …

[PDF][PDF] Cryptographic key generation from multiple biometric modalities: Fusing minutiae with iris feature

A Jagadeesan, T Thillaikkarasi… - International Journal of …, 2010 - Citeseer
Human users find difficult to remember long cryptographic keys. Therefore, researchers, for
a long time period, have been investigating ways to use biometric features of the user rather …

[PDF][PDF] Exploring Human Biometrics: A Focus on Security Concerns and Deep Neural Networks

WH Abdulla, F Marattukalam… - APSIPA Transactions on …, 2023 - nowpublishers.com
Biometric technology is rapidly growing due to the urgent need to secure people's
properties, from goods to information, in the overwhelming digital technology proliferation in …

Secure and lightweight remote patient authentication scheme with biometric inputs for mobile healthcare environments

M Mohammedi, M Omar, A Bouabdallah - Journal of Ambient Intelligence …, 2018 - Springer
Biometrics is an emerging technology for patient authentication due to its advantages over
the other methods, as passwords and smart cards. However, in mobile environments, it …

Towards generating irrevocable key for cryptography from cancelable fingerprints

N Lalithamani, KP Soman - 2009 2nd IEEE International …, 2009 - ieeexplore.ieee.org
The increasing immensity of identity theft in our society has resulted in the prioritization of
dependable information security mechanisms. Despite the fact that it is possible to bring …

An efficient approach for non-invertible cryptographic key generation from cancelable fingerprint biometrics

N Lalithamani, KP Soman - 2009 International Conference on …, 2009 - ieeexplore.ieee.org
The principal drawback of the existing cryptographic algorithms is the maintenance of their
key's secrecy. Added with, human users have a difficult time remembering strong but lengthy …

Approach to cryptographic key generation from fingerprint biometrics

S Barman, D Samanta… - International Journal of …, 2015 - inderscienceonline.com
In crypto-biometric system (CBS), biometric is combined with cryptography. In CBS, either
accessing a cryptographic key is controlled with biometric or the key is generated from …

An innovative scheme for effectual fingerprint data compression using bezier curve representations

V Perumal, J Ramaswamy - arXiv preprint arXiv:0911.0499, 2009 - arxiv.org
Naturally, with the mounting application of biometric systems, there arises a difficulty in
storing and handling those acquired biometric data. Fingerprint recognition has been …