A survey on biometric cryptosystems and cancelable biometrics

C Rathgeb, A Uhl - EURASIP journal on information security, 2011 - Springer
Form a privacy perspective most concerns against the common use of biometrics arise from
the storage and misuse of biometric data. Biometric cryptosystems and cancelable …

On application of bloom filters to iris biometrics

C Rathgeb, F Breitinger, C Busch, H Baier - IET Biometrics, 2014 - Wiley Online Library
In this study, the application of adaptive Bloom filters to binary iris biometric feature vectors,
that is, iris‐codes, is proposed. Bloom filters, which have been established as a powerful tool …

Managing and accessing data in the cloud: Privacy risks and approaches

SDC di Vimercati, S Foresti… - 2012 7th International …, 2012 - ieeexplore.ieee.org
Ensuring proper privacy and protection of the information stored, communicated, processed,
and disseminated in the cloud as well as of the users accessing such an information is one …

When a bloom filter is a doom filter: security assessment of a novel iris biometric template protection system

J Hermans, B Mennink… - … international conference of …, 2014 - ieeexplore.ieee.org
Biometric template protection systems are expected to meet two major security
requirements: irreversibility and unlinkability. We analyze the Bloom filter based iris …

[图书][B] Touchless palmprint recognition systems

A Genovese, V Piuri, F Scotti - 2014 - Springer
Biometric systems consist of devices, algorithms, and procedures used to recognize
individuals or classes of individuals based on their physical or behavioral characteristics …

EsPRESSo: efficient privacy-preserving evaluation of sample set similarity

C Blundo, E De Cristofaro, P Gasti - International Workshop on Data …, 2012 - Springer
In today's digital society, electronic information is increasingly shared among different
entities, and decisions are made based on common attributes. To address associated …

Espresso: efficient privacy-preserving evaluation of sample set similarity

C Blundo, E De Cristofaro… - Journal of Computer …, 2014 - content.iospress.com
Electronic information is increasingly often shared among entities without complete mutual
trust. To address related security and privacy issues, a few cryptographic techniques have …

Neural-based quality measurement of fingerprint images in contactless biometric systems

RD Labati, V Piuri, F Scotti - The 2010 international joint …, 2010 - ieeexplore.ieee.org
Traditional fingerprint biometric systems capture the user fingerprint images by a contact-
based sensor. Differently, contactless systems aim to capture the fingerprint images by an …

Towards better performance for protected iris biometric system with confidence matrix

TY Chai, BM Goi, WS Yap - Symmetry, 2021 - mdpi.com
Biometric template protection (BTP) schemes are implemented to increase public
confidence in biometric systems regarding data privacy and security in recent years. The …

Advanced design of automated border control gates: biometric system techniques and research trends

RD Labati, A Genovese, E Munoz… - 2015 IEEE …, 2015 - ieeexplore.ieee.org
Last few years have witnessed an ever-increasing demand of border crossing, whose
processing introduces the need to speed-up the clearance process at the Border Crossing …