Modern authentication schemes in smartphones and IoT devices: An empirical survey

MT Ahvanooey, MX Zhu, Q Li… - IEEE Internet of …, 2021 - ieeexplore.ieee.org
User authentication remains a challenging issue, despite the existence of a large number of
proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web …

Feature extraction and learning approaches for cancellable biometrics: A survey

W Yang, S Wang, J Hu, X Tao… - CAAI Transactions on …, 2024 - Wiley Online Library
Biometric recognition is a widely used technology for user authentication. In the application
of this technology, biometric security and recognition accuracy are two important issues that …

Ranking-based locality sensitive hashing-enabled cancelable biometrics: Index-of-max hashing

Z Jin, JY Hwang, YL Lai, S Kim… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
In this paper, we propose a ranking-based locality sensitive hashing inspired two-factor
cancelable biometrics, dubbed “Index-of-Max”(IoM) hashing for biometric template …

Secureface: Face template protection

G Mai, K Cao, X Lan, PC Yuen - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
It has been shown that face images can be reconstructed from their representations
(templates). We propose a randomized CNN to generate protected face biometric templates …

Random distance method for generating unimodal and multimodal cancelable biometric features

H Kaur, P Khanna - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
The cancelable biometric-based template protection method proposed in this paper
addresses security and privacy concerns emerging from the phenomenal usage of biometric …

Pairwise based deep ranking hashing for histopathology image classification and retrieval

X Shi, M Sapkota, F Xing, F Liu, L Cui, L Yang - Pattern Recognition, 2018 - Elsevier
Hashing has become a popular tool on histopathology image analysis due to the significant
gain in both computation and storage. However, most of current hashing techniques learn …

Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption

LA Abou Elazm, S Ibrahim, MG Egila, H Shawky… - Multimedia Tools and …, 2020 - Springer
Biometric systems are widely used now for security applications. Two major problems are
encountered in biometric systems: the security problem and the dependence on a single …

Alignment-robust cancelable biometric scheme for iris verification

MJ Lee, Z Jin, SN Liang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In this paper, we propose a histogram of oriented gradient inspired cancelable biometrics–
Random Augmented Histogram of Gradients (HoG) for iris template protection. The …

Privacy-preserving iris authentication using fully homomorphic encryption

MK Morampudi, MVNK Prasad, USN Raju - Multimedia Tools and …, 2020 - Springer
Rapid advancement in technology has led to the use of biometric authentication in every
field. In particular, from the past few years, iris recognition systems has gained …

Privacy preserving remote multi-server biometric authentication using cancelable biometrics and secret sharing

H Kaur, P Khanna - Future Generation Computer Systems, 2020 - Elsevier
Biometric authentication over cloud and network applications demands a wide range of
solutions against increasing cyber crimes and digital identity thefts. This work addresses …