An analysis of biometric based security systems

SI Manzoor, A Selwal - 2018 fifth international conference on …, 2018 - ieeexplore.ieee.org
Human recognition using their biological, behavioral, physiological, and chemical traits is a
contemporary as well as a secured approach. A series of biometric-based systems have …

Security enhanced multi-factor biometric authentication scheme using bio-hash function

Y Choi, Y Lee, J Moon, D Won - PloS one, 2017 - journals.plos.org
With the rapid development of personal information and wireless communication
technology, user authentication schemes have been crucial to ensure that wireless …

A biometric-based authentication and anonymity scheme for digital rights management system

CC Lee, CT Li, ZW Chen, YM Lai - Information Technology and Control, 2018 - itc.ktu.lt
Due to the rapid development of computer technologies, many traditional contents have
been digitized, adding to the immensity of digital contents. Through the Internet, various …

UAP: A unified authentication platform for IoT environment

F Hendaoui, H Eltaief, H Youssef - Computer Networks, 2021 - Elsevier
Abstract The Internet of Things (IoT) is a network that encompasses every physical object
being connected to the Internet. The IoT objects face several issues and challenges due to …

An improved E-DRM scheme for mobile environments

CC Lee, CT Li, ZW Chen, YM Lai, JC Shieh - Journal of information security …, 2018 - Elsevier
With the rapid development of information science and network technology, Internet has
become an important platform for the dissemination of digital content, which can be easily …

A hybrid approach for biometric template security

KKA Ghany, HA Hefny, AE Hassanien… - 2012 IEEE/ACM …, 2012 - ieeexplore.ieee.org
Privacy and Security has become an increasingly serious ýproblem for any biometric
systems. Template protection, ýwhich mainly prevents from data loss and hacking the stored …

A novel authentication scheme for anonymity and digital rights management based on elliptic curve cryptography

CC Lee, CT Li, ZW Chen, SD Chen… - International Journal of …, 2019 - inderscienceonline.com
As the internet makes data transmission easy and fast, digital contents of all kinds can be
spread all over the world at a shocking speed. Along with such amazing swiftness and …

Biometrics template security on cloud computing

HM Sabri, KKA Ghany, HA Hefny… - … on advances in …, 2014 - ieeexplore.ieee.org
Cloud computing is the concept of using maximum remote services through a network using
various minimum resources, it provides these resources to users via internet. There are …

A hybrid biometric approach embedding DNA data in fingerprint images

KKA Ghany, G Hassan, AE Hassanien… - … , Electronics & Vision …, 2014 - ieeexplore.ieee.org
In this paper, we present a robust image watermarking approach to hide DNA sequence
data into fingerprint templates for copyright protection based on the discrete wavelet …

Kekre's transform for protecting fingerprint template

KKA Ghany, HA Hefny, AE Hassanien… - … Conference on Hybrid …, 2013 - ieeexplore.ieee.org
In this paper, Kekre's transform is proposed for protecting fingerprint template and a
symmetric bio-hash function is used to improve the protection of the fingerprint biometric …