Review of key‐binding‐based biometric data protection schemes

D Sadhya, SK Singh, B Chakraborty - IET Biometrics, 2016 - Wiley Online Library
With the advent of modern technology, the use of biometric authentication systems has been
on the rise. The core of any biometric system consists of a database which contains the …

Preimage attack on biohashing

P Lacharme, E Cherrier… - … Conference on Security …, 2013 - ieeexplore.ieee.org
Biometric recognition is more and more employed in authentication and access control of
various applications. Biometric data are strongly linked with the user and do not allow …

Novel strong-PUF-based authentication protocols leveraging Shamir's secret sharing

S Chen, B Li, Z Chen, Y Zhang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Physical unclonable function (PUF) has emerged as an attractive hardware primitive for
lightweight authentication in the Internet of Things (IoT). However, strong-PUF-based …

Enhance fuzzy vault security using nonrandom chaff point generator

MT Nguyen, QH Truong, TK Dang - Information Processing Letters, 2016 - Elsevier
Toward the combination of cryptographic and biometric systems, by performing specific
binding technique on cryptographic key and biometric template, the fuzzy vault framework …

A PUF-Based Key Storage Scheme Using Fuzzy Vault

J Yang, S Chen, Y Cao - Sensors, 2023 - mdpi.com
Physical Unclonable Functions (PUFs) are considered attractive low-cost security anchors in
the key generation scheme. The helper data algorithm is usually used to transform the fuzzy …

[PDF][PDF] Fingerprint fuzzy vault: a review

R Hooda, S Gupta - International Journal, 2013 - researchgate.net
This paper is a brief review of fuzzy vault which is a biometric template security technique.
The advent of technology over the last decade has established biometric identification as an …

Securing fuzzy vault schemes through biometric hashing

C Örencik, TB Pedersen, E Savaş… - Turkish Journal of …, 2010 - journals.tubitak.gov.tr
The fuzzy vault scheme is a well-known technique to mitigate privacy, security, and usability
related problems in biometric identification applications. The basic idea is to hide biometric …

Secure key agreement using pure biometrics

D Akdoğan, DK Altop, A Levi - 2015 IEEE conference on …, 2015 - ieeexplore.ieee.org
In this paper, we propose a novel secure key agreement protocol that uses biometrics with
unordered set of features. Our protocol enables the user and the server to agree on a …

A dissection of fingerprint fuzzy vault schemes

V Krivokuća, W Abdulla, A Swain - … of the 27th Conference on Image and …, 2012 - dl.acm.org
The fuzzy vault construction is one of the most widely adopted approaches for the protection
of fingerprint data. The popularity of this scheme stems from its ability to deal with unordered …

[HTML][HTML] Mecanismos de Protección de la Privacidad de los ciudadanos aplicados a la Firma Manuscrita Biométrica

WP Hernández - 2021 - dialnet.unirioja.es
En las últimas décadas, las tecnologías biométricas han alcanzado un importante
protagonismo en el reconocimiento automático de individuos, impulsadas en parte por el …