A survey of palmprint recognition

A Kong, D Zhang, M Kamel - pattern recognition, 2009 - Elsevier
Palmprint recognition has been investigated over 10 years. During this period, many
different problems related to palmprint recognition have been addressed. This paper …

[PDF][PDF] Development of a new cryptographic construct using palmprint-based fuzzy vault

A Kumar, A Kumar - EURASIP Journal on Advances in Signal Processing, 2009 - Springer
The combination of cryptology and biometrics has emerged as promising component of
information security. Despite the current popularity of palmprint biometric, there has not been …

[PDF][PDF] Biometric encryption: The new breed of untraceable biometrics

A Cavoukian, A Stoianov - Biometrics: fundamentals, theory, and …, 2009 - academia.edu
Biometric technologies promise many benefits, including stronger user authentication,
greater user convenience, improved security, and operational efficiencies. These …

Cancelable biometrics with perfect secrecy for correlation-based matching

S Hirata, K Takahashi - … in Biometrics: Third International Conference, ICB …, 2009 - Springer
In this paper, we propose a novel method of Cancelable Biometrics for correlation-based
matching. The biometric image is transformed by Number Theoretic Transform (Fourier-like …

Digital identity protection-concepts and issues

E Bertino, F Paci, N Shang - 4th International Conference on …, 2009 - ieeexplore.ieee.org
Tools and techniques for digital identity management represent an important technology for
enabling transactions and interactions across the Internet. Because identity information is …

Inverse operation and preimage attack on biohashing

Y Lee, Y Chung, K Moon - 2009 IEEE workshop on …, 2009 - ieeexplore.ieee.org
BioHashing generates a BioCode from a user's biometric features by projecting them onto
user-specific random vectors and then discritizes the projection coefficients into zero or one …

[PDF][PDF] An effective scheme for generating irrevocable cryptographic key from cancelable fingerprint templates

N Lalithamani, K Soman - International Journal of Computer Science and …, 2009 - Citeseer
Unswerving information security mechanisms are the need of the hour for fighting the
escalating enormity of identity theft in our society. Besides cryptography being a dominant …

[PDF][PDF] Privacy in biometrics

S Cimato, M Gamassi, V Piuri, R Sassi… - … : theory, methods, and …, 2009 - academia.edu
Biometric features are increasingly used for authentication and identification purposes in a
broad variety of institutional and commercial systems. The large diffusion of e-government, e …

Simple and secured access to networked home appliances via internet using SSL, BioHashing and single Authentication Server

A Mondal - 2009 - spectrum.library.concordia.ca
This thesis describes a web-based application that will enable users to access their
networked home appliances over the Internet in an easy, secured, accessible and cost …

Watermarking for palmprint image protection

M Laadjel, K Zebbiche, F Kurugullu… - … Machine Vision and …, 2009 - ieeexplore.ieee.org
Intense work has been reported in the last decade for person's recognition using palmprint
biometric patterns. However, there has been a little interest in the security of palmprint …