[PDF][PDF] A simple review of biometric template protection schemes used in preventing adversary attacks on biometric fingerprint templates

J Mwema, M Kimwele, S Kimani - International Journal of …, 2015 - researchgate.net
In this paper, we base our research on biometric systems security. We begin by introducing
biometrics after which we will describe how a biometric system works before we later define …

Cancellable speech template via random binary orthogonal matrices projection hashing

KY Chee, Z Jin, D Cai, M Li, WS Yap, YL Lai, BM Goi - Pattern Recognition, 2018 - Elsevier
The increasing advancement of mobile technology explosively popularizes the mobile
devices (eg iPhone, iPad). A large number of mobile devices provide great convenience and …

SCAN-speech biometric template protection based on genus-2 hyper elliptic curve

N Sasikaladevi, K Geetha, A Revathi… - Multimedia Tools and …, 2019 - Springer
Rapid growth in the mobile technology manifolds the usage of mobile devices. It leads to the
development and popularity of mobile application in diversified domains like finance …

A steganography-based fingerprint authentication mechanism to counter fake physical biometrics and trojan horse attacks

KKH Karunathilake, ARM Shahan… - 2021 IEEE 12th …, 2021 - ieeexplore.ieee.org
In the modern world, unique biometrics of every individual play a vital role in authentication
processes. However, as convenient as it seems, biometrics come with their own set of …

A practical approach for secure biometric template storage for authentication

S Armoogum, AR Oozeer - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
Biometric is being increasingly used for authentication of user. During enrolment, an
enrolment biometric template is generated from the user's raw biometric data. This template …

A conceptual technique for deriving encryption keys from fingerprints to secure fingerprint templates in unimodal biometric systems

J Mwema, S Kimani, M Kimwele - 2017 - ir.jkuat.ac.ke
In this study, we reviewed biometric template protection schemes in subsisting literature and
established that there is no reliable, efficacious and foolproof technique that assures …

[PDF][PDF] Biometric Clocking System Infrastructure and Performance of Selected Tertiary Institutions in Kiambu County, Kenya

JW Muchiri, J Kyalo - 2022 - easpublisher.com
Kenya's higher education institutions are in charge of offering topnotch instruction in order to
realize Kenya's Vision 2030. The administration of Kenya's chosen public universities has …

[PDF][PDF] A Multi-Factor Biometric Model for Securing E-Banking System

MI Omogbhemhe, MI Bayo - International Journal of Computer …, 2017 - academia.edu
The e-banking systems in Nigeria is witnessing a large number of users, thereby
encouraging the cashless economy policy proposed by the Central Bank of Nigeria (CBN) …

[引用][C] Development of secured algorithm to enhance the privacy and security template of biometric technology

T Habibu - 2020 - NM-AIST

[引用][C] Year of Publication: 2015

MI Omogbhemhe, IBA Momodu, FI Sadiq - 2015