Cancellable biometrics and user-dependent multi-state discretization in BioHash

ABJ Teoh, WK Yip, KA Toh - Pattern Analysis and Applications, 2010 - Springer
Although the use of biometrics for security access is convenient and easy to be
implemented, it also introduced privacy and other security concerns when the original …

On security of multi-factor biometric authentication

H Al-Assam, H Sellahewa… - … Conference for Internet …, 2010 - ieeexplore.ieee.org
This paper focuses on security and accuracy of multi-factor biometric authentication
schemes that are based on applying User-Based Transformations (UBTs) on biometric …

LocBiometrics: Mobile phone based multifactor biometric authentication with time and location assurance

I Lami, T Kuseler, H Al-Assam, SA Jassim - 2010 - bear.buckingham.ac.uk
The continuing growth of Smartphones and Superphones has significantly increased
mCommerce. The security of personal information on the phone and lack of the face-to-face …

Multi-Factor Biometrics for Authentication: A false sense of security

H Al-Assam, H Sellahewa, S Jassim - … of the 12th ACM Workshop on …, 2010 - dl.acm.org
Multi-factor biometric authentications have been proposed recently to strengthen security
and/or privacy of biometric systems in addition to enhancing authentication accuracy. An …

Optics based biohashing using joint transform correlator

N Saini, A Sinha - Optics communications, 2010 - Elsevier
Most authentication process uses password and personal identification numbers (PIN) for
security purposes. In order to remove the problem of hacking or stealing of the password …

[图书][B] Changeable and privacy preserving face recognition

Y Wang - 2010 - Citeseer
Traditional methods of identity recognition are based on the knowledge of a password or a
PIN, or possession factors such as tokens and ID cards. Such strategies usually afford low …

Recent developments on applying biometrics in cryptography

Q Gao - Journal of Applied Security Research, 2010 - Taylor & Francis
Biometrics is an identification technology widely used in physical access control and
forensics. Cryptography is the science for information security. People generally agreed that …

A SCANNER BASED PALMPRINT VERIFICATION SYSTEM FOR CIVIL APPLICATION

H Zhang, D Hu - International Journal of Information Acquisition, 2010 - World Scientific
The concept of capturing a palmprint using a scanner is not new, but the current palmprint
capture devices based on a scanner have the limitations of low speed and large weight. A …