A survey on methods and challenges in EEG based authentication

AJ Bidgoly, HJ Bidgoly, Z Arezoumand - Computers & Security, 2020 - Elsevier
EEG is the recording of electrical activities of the brain, usually along the scalp surface,
which are the results of synaptic activations of the brain's neurons. In recent years, it has …

A review on performance, security and various biometric template protection schemes for biometric authentication systems

A Sarkar, BK Singh - Multimedia Tools and Applications, 2020 - Springer
Identifying a person based on their behavioral and biological qualities in an automated
manner is called biometrics. The authentication system substituting traditional password and …

Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography

C Li, D Lin, J Lü, F Hao - IEEE multimedia, 2018 - ieeexplore.ieee.org
This paper performs a thorough security analysis of a chaotic image encryption algorithm
based on autoblocking and electrocardiography from the view point of modern cryptography …

A survey on biometric cryptosystems and cancelable biometrics

C Rathgeb, A Uhl - EURASIP journal on information security, 2011 - Springer
Form a privacy perspective most concerns against the common use of biometrics arise from
the storage and misuse of biometric data. Biometric cryptosystems and cancelable …

Biometric template protection: Bridging the performance gap between theory and practice

K Nandakumar, AK Jain - IEEE Signal Processing Magazine, 2015 - ieeexplore.ieee.org
Biometric recognition is an integral component of modern identity management and access
control systems. Due to the strong and permanent link between individuals and their …

[图书][B] Introduction to biometrics

A Jain, R Bolle, S Pankanti - 1996 - Springer
Biometrics deals with identification of individuals based on their biological or behavioral
characteristics. Biometrics has lately been receiving attention in popular media, it is widely …

Biometric template security: Challenges and solutions

AK Jain, A Ross, U Uludag - 2005 13th European signal …, 2005 - ieeexplore.ieee.org
A biometric system is vulnerable to a variety of attacks aimed at undermining the integrity of
the authentication process. These attacks are intended to either circumvent the security …

Image understanding for iris biometrics: A survey

KW Bowyer, K Hollingsworth, PJ Flynn - Computer vision and image …, 2008 - Elsevier
This survey covers the historical development and current state of the art in image
understanding for iris biometrics. Most research publications can be categorized as making …

De-identification for privacy protection in multimedia content: A survey

S Ribaric, A Ariyaeeinia, N Pavesic - Signal Processing: Image …, 2016 - Elsevier
Privacy is one of the most important social and political issues in our information society,
characterized by a growing range of enabling and supporting technologies and services …

Fingerprint-based fuzzy vault: Implementation and performance

K Nandakumar, AK Jain… - IEEE transactions on …, 2007 - ieeexplore.ieee.org
Reliable information security mechanisms are required to combat the rising magnitude of
identity theft in our society. While cryptography is a powerful tool to achieve information …