Biometric cryptosystems: a comprehensive survey

P Kaur, N Kumar, M Singh - Multimedia Tools and Applications, 2023 - Springer
Biometric Cryptosystem (BCS) combines characteristics of both the fields: biometric and
cryptosystem, where biometric provides authentication and cryptosystem imparts security …

[PDF][PDF] Working with cryptographic key information

NM Mukhammadovich, AR Djuraevich - International Journal of …, 2023 - academia.edu
Cryptographic protection of information (CPI) is an effective way and a key component of the
entire spectrum of issues of information security in information systems (IS) and information …

Fingerprint bio‐key generation based on a deep neural network

Z Wu, Z Lv, J Kang, W Ding… - International Journal of …, 2022 - Wiley Online Library
With the increasing use of biometric identity authentication, biological key generation
technology is receiving much attention. A high‐strength key that is easy to store and manage …

A novel blockchain's private key generation mechanism based on facial biometrics and physical unclonable function

Y Wang, B Li, Y Zhang, J Wu, G Liu, Y Li… - Journal of Information …, 2023 - Elsevier
Blockchain technology is widely used in the field of digital currency because of its non-
tamperability, traceability, and decentralization. Blockchain's private key is usually used to …

PalmSecMatch: A data-centric template protection method for palmprint recognition

C Liu, H Shao, D Zhong - Displays, 2024 - Elsevier
While existing palmprint recognition researches aim to improve accuracy in various
situations, they often overlook the security implications. This paper delves into template …

[HTML][HTML] Symmetric Keys for Lightweight Encryption Algorithms Using a Pre–Trained VGG16 Model

AT Khudhair, AT Maolood, EK Gbashi - Telecom, 2024 - mdpi.com
The main challenge within lightweight cryptographic symmetric key systems is striking a
delicate balance between security and efficiency. Consequently, the key issue revolves …

Using Crossover Area of the Retinal Eye to Generate a Secret Key Based on Deep Learning-YOLO-v5 Object Detection Algorithm.

ZS Dhahir, IA Alshabeeb… - … Journal of Safety & …, 2024 - search.ebscohost.com
Traditional security keys based on passwords are vulnerable to attacks. Recent
developments in biometric security systems offer a solution. This study presents a novel …

Enhancing Ad Hoc Network Security using Palm Vein Biometric Features

A Mohamed, A Salama, A Ismail - Engineering, Technology & Applied …, 2025 - etasr.com
This study proposes an innovative approach to securing ad hoc networks through palm vein
biometric authentication, addressing critical security vulnerabilities in decentralized wireless …

Literature Survey: Biometric Cryptosystems Based on Fingerprint Processing Techniques

MI Hashem, K Alibraheemi - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
A significant portion of today access controls rely on biometrics for authentication.
Biometrics, for instance, is utilized on commonplace devices like cellphones and computers …

[HTML][HTML] 一种基于人脸的生物密钥派生方案

易钢, 岳笑含 - Artificial Intelligence and Robotics Research, 2024 - hanspub.org
本文提出了一种基于人脸的生物密钥派生方案. 该方案利用人脸特征作为生物识别的基础,
通过采集, 分析和提取人脸图像中的特征信息, 并将其转化为数字化的生物密钥. 在派生过程中 …