Writer-independent online signature verification based on 2D representation of time series data using triplet supervised network

L Xie, Z Wu, X Zhang, Y Li, X Wang - Measurement, 2022 - Elsevier
Online signature verification (OSV) as a critical link of the paperless office still has
tremendous challenges. In this paper, we propose a novel Writer-Independent (WI) OSV …

Multi-instance cancelable iris authentication system using triplet loss for deep learning models

M Sandhya, MK Morampudi, I Pruthweraaj… - The Visual …, 2023 - Springer
Many government and commercial organizations are using biometric authentication systems
instead of a password or token-based authentication systems. They are computationally …

Second-order convolutional networks for iris recognition

L Jia, X Shi, Q Sun, X Tang, P Li - Applied Intelligence, 2022 - Springer
Iris recognition in less constrained environments is challenging as the images taken therein
contain severe noisy factors. How to represent iris texture for accurate and robust …

A comparative assessment of homomorphic encryption algorithms applied to biometric information

G Crihan, M Crăciun, L Dumitriu - Inventions, 2023 - mdpi.com
This paper provides preliminary research regarding the implementation and evaluation of a
hybrid mechanism of authentication based on fingerprint recognition interconnected with …

Ciphertext face recognition system based on secure inner product protocol

X Li, Z Chen, J Gao - Journal of Information Security and Applications, 2024 - Elsevier
User privacy data leakage is a major weakness of current plaintext face recognition systems.
This article combines Pallier homomorphic encryption algorithm with inner product protocol …

Research on ciphertext speech biohashing authentication based on chaotic system and improved public chain

Y Huang, B Wang, X Pu, Y Li, Q Zhang - The Journal of Supercomputing, 2024 - Springer
Existing biohashing authentication schemes usually store bioinformation in the cloud, whose
storage method can face the problems of bioinformation leakage and tampering, and single …

A general framework for secure biometric hashing against reconstruction attacks

L Yu, Y Wo - Applied Intelligence, 2023 - Springer
Binary representation is a popular privacy-preserving biometric recognition approach.
However, it is vulnerable to similarity-based reconstruction attacks (ie, similarity attacks) due …

Privacy-preserving bimodal authentication system using Fan-Vercauteren scheme

MK Morampudi, M Sandhya, M Dileep - Optik, 2023 - Elsevier
The requirement of a person to be available during the authentication made the biometric
authentication to be used in abundant applications over password or token-based …

An efficient secure cryptosystem using improved identity based encryption with multimodal biometric authentication and authorization in cloud environments

RM Jasmine, J Jasper, MR Geetha - Wireless Networks, 2024 - Springer
Today, cloud computing has received greater attention for storing and processing huge
amounts of data over the internet. Security concerns are one of the most challenging issues …

Reliable and privacy-preserving multi-instance iris verification using Paillier homomorphic encryption and one-digit checksum

MK Morampudi, N Gonthina, S Bojjagani… - Signal, Image and Video …, 2024 - Springer
The utilization of a biometric authentication system (BAS) for reliable automatic human
recognition has increased exponentially in recent years over traditional authentication …