A secure biometric authentication scheme based on robust hashing

Y Sutcu, HT Sencar, N Memon - Proceedings of the 7th Workshop on …, 2005 - dl.acm.org
In this paper, we propose a secure biometric based authentication scheme which
fundamentally relies on the use of a robust hash function. The robust hash function is a one …

[PDF][PDF] An Analysis on Invertibility of Cancelable Biometrics based on BioHashing.

KH Cheung, AWK Kong, J You, D Zhang - CISST, 2005 - Citeseer
One of the aims of cancelable biometrics is to protect privacy. In order to protect privacy,
cancelable biometrics are preferably to be non-invertible such that no information can be …

An analysis on accuracy of cancelable biometrics based on biohashing

KH Cheung, A Kong, D Zhang, M Kamel, JT You… - … Conference, KES 2005 …, 2005 - Springer
Cancelable biometrics has been proposed for canceling and re-issuing biometric templates
and for protecting privacy in biometrics systems. Recently, new cancelable biometric …

Multihashing, human authentication featuring biometrics data and tokenized random number: A case study FVC2004

D Maio, L Nanni - Neurocomputing, 2005 - Elsevier
Given the recent explosion of interest in human authentication, verification based on
tokenized pseudo-random numbers and the user-specific biometric feature has received …

Revealing the secret of facehashing

KH Cheung, A Kong, D Zhang, M Kamel… - Advances in Biometrics …, 2005 - Springer
Biometric authentication has attracted substantial attention over the past few years. It has
been reported recently that a new technique called FaceHashing, which is proposed for …

[PDF][PDF] An Analysis of BioHashing and Its Variants

M Kamel, J You - Citeseer
As a result of the growing demand for accurate and reliable personal authentication,
biometric recognition, a substitute for or complement to existing authentication technologies …