Multi-biometric template protection: an overview

F Bedad, R Adjoudj - Renewable Energy for Smart and Sustainable Cities …, 2019 - Springer
Today, biometrics is a research field in full expansion, several identification and verification
systems are now being developed, however their performance is inadequate to meet the …

Exploring students' experimentation strategies in engineering design using an educational CAD tool

YY Seah, AJ Magana - Journal of Science Education and Technology, 2019 - Springer
Experimentation is one of the important strategies used in engineering design to understand
the relationship between relevant variables so that they can be manipulated to generate …

Highly secure palmprint based biometric template using fuzzy vault

V Sujitha, D Chitra - Concurrency and Computation: Practice …, 2019 - Wiley Online Library
Biometric cryptosystem is an integrated system of cryptography with biometric features which
is considered to be a promising component of template security. This paper presents a novel …

An Improved Method for Generating Biometric-Cryptographic System from Face Feature

S Aanjanadevi, V Palanisamy… - 2019 3rd International …, 2019 - ieeexplore.ieee.org
One of the most difficult tasks in networking is to provide security to data during transmission,
the main issue using network is lack of security. Various techniques and methods had been …

An improved revocable fuzzy vault scheme for face recognition under unconstrained illumination conditions

C Ferhaoui Cherifi, M Deriche, KW Hidouci - Arabian Journal for Science …, 2019 - Springer
The paper presents an improved fuzzy vault approach for face recognition under
unconstrained environments. First, we parameterize the number of chaff points needed and …

[PDF][PDF] A Study on Combing EEG signals and Crytography for Bitcoin security

D Nguyen, T Dat, W Ma - Australian Journal of Intelligent …, 2019 - researchgate.net
In this paper, we propose two EEG-based systems including cryptographic key generation
and (true) random number generation to enhance Bitcoin security. The first system is based …

Biometric encryption

A Uhl, C Rathgeb - Encyclopedia of Cryptography, Security and Privacy, 2019 - Springer
Background The term “biometric encryption” has been coined by the key-binding techniques
Mytec1 (Soutar et al. 1996) and Mytec2 (Soutar et al. 1998a, b, 1999). Mytec2 is a fingerprint …

A Cryptographic Algorithm Using Location-Based Service and Biometrics

R Pal, O Bhartia, M Sen - … and Innovation: Proceedings of ICDMAI 2018 …, 2019 - Springer
Modern advancement of different technologies led to the increasing computational power of
each individual component of digital computers that threatens to crack many secure …

[PDF][PDF] A review on privacy preserving biometric authentication methods

C Paşaoğlu, KH Adje, O Demirtaş - Kişisel Verileri Koruma Dergisi, 2019 - dergipark.org.tr
Akıllı servislerin ve teknolojilerin katlanarak büyümesiyle birlikte, kimlik doğrulama önemli
bir sorun haline gelmiştir. Biyometrik kimlik doğrulama yöntemleri, klasik kimlik doğrulama …

[引用][C] Kişisel Verileri Koruma Dergisi

C PaĢaoğlu, KH Adje, O DemirtaĢ