Biometric template protection: A systematic literature review of approaches and modalities

M Sandhya, MVNK Prasad - … and Privacy: Opportunities & Challenges in …, 2017 - Springer
With the emergence of biometric authentication systems, template protection for biometrics
captured attention in the recent years. The privacy concern arises due to storage and misuse …

Sequential keystroke behavioral biometrics for mobile user identification via multi-view deep learning

L Sun, Y Wang, B Cao, PS Yu, W Srisa-An… - Machine Learning and …, 2017 - Springer
With the rapid growth in smartphone usage, more organizations begin to focus on providing
better services for mobile users. User identification can help these organizations to identify …

Fuzzy commitment scheme for generation of cryptographic keys based on iris biometrics

S Adamovic, M Milosavljevic, M Veinovic… - IET …, 2017 - Wiley Online Library
This work presents a method based on information‐theoretic analysis of iris biometric that
aims to extract homogeneous regions of high entropy. Successful extraction of these regions …

Evaluation of user authentication methods in the gadget-free world

K Halunen, J Häikiö, V Vallivaara - Pervasive and Mobile Computing, 2017 - Elsevier
In an ideal gadget-free environment the user is interacting with the environment and the
services through only “natural” means. This imposes restrictions on many aspects of the …

On the study of EEG-based cryptographic key generation

D Nguyen, D Tran, D Sharma, W Ma - Procedia computer science, 2017 - Elsevier
Biometric-based cryptographic key generation is regarded as a data mining approach that
uses knowledge discovery techniques to extract biometric information to generate …

Privacy preserving transparent mobile authentication

J Hatin, E Cherrier, JJ Schwartzmann… - … Systems Security and …, 2017 - scitepress.org
Transparent authentication on mobile phones suffers from privacy issues especially when
biometric information is involved. In this paper, we propose a solution to address those two …

A review regarding the biometrics cryptography challenging design and strategies

M Soltane, L Messikh, A Zaoui - BRAIN. Broad Research in …, 2017 - lumenpublishing.com
As the information age matures, a biometric identification technology will be at the heart of
computer interaction with humans and the biosphere in which they reside. Hence, the …

Biometrics encryption based on palmprint and convolutional code

J Qiu, H Li, J Dong, G Feng - 2017 2nd International …, 2017 - ieeexplore.ieee.org
Based on palmprint and convolutional code, a biometrics encryption method is proposed.
Firstly, the period of randomly generated keys are extended. It is then encoded with our …

An approach to matching fingerprints using cryptographic one-way hashes

Q Gao - International Journal of Biometrics, 2017 - inderscienceonline.com
Password-based systems authenticate users with cryptographic one-way hashes without
storing plaintext passwords. The method prevents a hacker from reversing the hashes and …

Study of noise removal techniques for digital images

P Patel, B Jena, B Sahoo, P Patel… - … Methodologies, Tools, and …, 2017 - igi-global.com
Images very often get contaminated by different types of noise like impulse noise, Gaussian
noise, spackle noise etc. due to malfunctioning of camera sensors during acquisition or …