Biometric cryptosystems: a comprehensive survey

P Kaur, N Kumar, M Singh - Multimedia Tools and Applications, 2023 - Springer
Biometric Cryptosystem (BCS) combines characteristics of both the fields: biometric and
cryptosystem, where biometric provides authentication and cryptosystem imparts security …

Cryptographie key generation from PUF data using efficient fuzzy extractors

H Kang, Y Hori, T Katashita… - 16th International …, 2014 - ieeexplore.ieee.org
Physical unclonable functions (PUFs) and biometrics are inherently noisy. When used in
practice as cryptographic key generators, they need to be combined with an extraction …

Purely electrical controllable spin–orbit torque‐based reconfigurable physically unclonable functions

X Zhao, X Wang, Y Dong, W Wang, L Bai… - Advanced Electronic …, 2023 - Wiley Online Library
In the field of information hardware security, random variations obtained during device
manufacturing process play a key role in generating unique and unclonable security keys …

Performance analysis for puf data using fuzzy extractor

H Kang, Y Hori, T Katashita, M Hagiwara… - … and Applications: CUTE …, 2014 - Springer
The extraction of a stable signal from noisy data is very useful in applications that aim to
combine it with a cryptographic key. An approach based on an error correcting code was …

[PDF][PDF] The implementation of fuzzy extractor is not hard to do: An approach using puf data

H Kang, Y Hori, T Katashita, M Hagiwara - Proceedings of the 30th …, 2013 - jst.go.jp
The extraction of a stable signal from noisy data is very useful in applications that aim to
combine it with a cryptographic key. An approach based on an error correcting code was …

[HTML][HTML] SoC Virtual Platform with Secure Key Generation Module for Embedded Secure Devices

SH Lim, HJ Lim, SC Park - Journal of Information Processing Systems, 2024 - jips-k.org
In the Internet-of-Things (IoT) or blockchain-based network systems, secure keys may be
stored in individual devices; thus, individual devices should protect data by performing …

Cryptographic key generation based on multiple biometrics

J Li, J Walker - US Patent 9,407,435, 2016 - Google Patents
BACKGROUND Use of a biometric for authentication is a recent trend for non-password
authentication. Biometrics may be used in bio metric encryption (“biometric cryptosystem'). In …

Template Security Using Fuzzy Extractor: A Review

NK Gupta, S Meena, P Kumar, VC Dobhal… - Advances in Systems …, 2021 - Springer
Biometric systems are used for the unique identification of a person by using one or more
biological traits. There are a number of attack points (levels) in biometric systems, but the …

Securing digital data using 256-bit multimodal biometrics based cryptographic key

V Arulalan, KS Joseph… - 2016 World Conference …, 2016 - ieeexplore.ieee.org
In this digital era, digital documents are widely used. The merits of digital documents are
huge while its security and privacy are at large. Hence Cryptography is used to secure …

[PDF][PDF] Sequential subspace estimator for an efficient multibiometrics authentication and encryption

MO Malek - 2015 - rshare.library.torontomu.ca
The principal challenge in biometric authentication is to mitigate the effects of any noise
while extracting biometric features for biometric template generation. Most biometric systems …