Biometric template protection: A systematic literature review of approaches and modalities

M Sandhya, MVNK Prasad - … and Privacy: Opportunities & Challenges in …, 2017 - Springer
With the emergence of biometric authentication systems, template protection for biometrics
captured attention in the recent years. The privacy concern arises due to storage and misuse …

Cancelable features using log-Gabor filters for biometric authentication

H Kaur, P Khanna - Multimedia Tools and Applications, 2017 - Springer
Wide spread use of biometric based authentication requires security of biometric data
against identity thefts. Cancelable biometrics is a recent approach to address the concerns …

Encryption by Heart (EbH)—Using ECG for time-invariant symmetric key generation

L González-Manzano, JM de Fuentes… - Future Generation …, 2017 - Elsevier
Wearable devices are a part of Internet-of-Things (IoT) that may offer valuable data of their
porting user. This paper explores the use of ElectroCardioGram (ECG) records to encrypt …

Simplified 2DPalmHash code for secure palmprint verification

L Leng, ABJ Teoh, M Li - Multimedia Tools and Applications, 2017 - Springer
Abstract 2DPalmHash Code (2DPHC) was proposed as a cancelable code for secure
palmprint verification. In order to relieve the vertical and horizontal dislocation problems …

A survey on biometrie template protection using cancelable biometric scheme

DR Rachapalli, HK Kalluri - 2017 Second International …, 2017 - ieeexplore.ieee.org
Biometric template protection techniques like biometric cryptosystems and cancelable
biometrics are most widely used in many large-scale biometric systems. Though generic …

A Study on Fingerprint Hash Code Generation Using Euclidean Distance for Identifying a User

PS Aithal - 2017 - papers.ssrn.com
Biometrics innovation has ended up being a precise and proficient response to the security
issue. Biometrics is a developing field of research as of late and has been dedicated to the …

基于连接认证的低功耗蓝牙泛洪攻击防御方案.

王启林, 李小鹏, 郁滨, 黄一才 - Application Research of …, 2017 - search.ebscohost.com
针对低功耗蓝牙易受泛洪攻击的问题, 提出了一种连接认证模型, 基于该模型设计了低功耗蓝牙
泛洪攻击防御方案. 方案结合HMAC (hash basedmessageauthenticationcode) …

基于LGBP 与Bloom 滤波器的可撤销掌纹模板生成方法.

王玮婧, 张雪锋 - Application Research of Computers …, 2017 - search.ebscohost.com
针对提高掌纹身份认证系统的安全性, 实现对用户生物特征信息的有效保护,
提出一种掌纹可撤销模板生成方法. 首先通过Gabor 滤波器获得掌纹数据不同方向 …

Extending disposable feature templates for mitigating replay attacks

J Shelton, J Jenkins, K Roy - International Journal of …, 2017 - inderscienceonline.com
Replay attacks on biometric based access control systems are dangerous if counter-
measures are not instilled to mitigate these attacks. An attacker can capture packets along …

Finger vein pattern learning models and techniques—A study

G Sujani, GMS Reddy - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
In today's world of ultra-security era finger vein pattern (FVP) learning plays an important
role for authentication and validation. In this paper, a structural and linear approach is …