Cancelable biometrics: A review

VM Patel, NK Ratha… - IEEE signal processing …, 2015 - ieeexplore.ieee.org
Recent years have seen an exponential growth in the use of various biometric technologies
for trusted automatic recognition of humans. With the rapid adaptation of biometric systems …

Cancelable biometrics: a comprehensive survey

Manisha, N Kumar - Artificial Intelligence Review, 2020 - Springer
Biometric recognition is a challenging research field but suffers from privacy and security
concerns. To address this concern, Cancelable Biometrics is suggested in literature in which …

[HTML][HTML] A survey on biometric cryptosystems and cancelable biometrics

C Rathgeb, A Uhl - EURASIP journal on information security, 2011 - Springer
Form a privacy perspective most concerns against the common use of biometrics arise from
the storage and misuse of biometric data. Biometric cryptosystems and cancelable …

Biometric template protection: Bridging the performance gap between theory and practice

K Nandakumar, AK Jain - IEEE Signal Processing Magazine, 2015 - ieeexplore.ieee.org
Biometric recognition is an integral component of modern identity management and access
control systems. Due to the strong and permanent link between individuals and their …

[图书][B] Handbook of fingerprint recognition

D Maltoni, D Maio, AK Jain, S Prabhakar - 2009 - Springer
Biometric recognition, or simply biometrics, refers to the use of distinctive anatomical and/or
behavioral characteristics or identifiers (eg, fingerprints, face, iris, voice, and hand geometry) …

[图书][B] Introduction to biometrics

A Jain, R Bolle, S Pankanti - 1996 - Springer
Biometrics deals with identification of individuals based on their biological or behavioral
characteristics. Biometrics has lately been receiving attention in popular media, it is widely …

Face liveness detection from a single image with sparse low rank bilinear discriminative model

X Tan, Y Li, J Liu, L Jiang - Computer Vision–ECCV 2010: 11th European …, 2010 - Springer
Spoofing with photograph or video is one of the most common manner to circumvent a face
recognition system. In this paper, we present a real-time and non-intrusive method to …

Biometric template security: Challenges and solutions

AK Jain, A Ross, U Uludag - 2005 13th European signal …, 2005 - ieeexplore.ieee.org
A biometric system is vulnerable to a variety of attacks aimed at undermining the integrity of
the authentication process. These attacks are intended to either circumvent the security …

[图书][B] Handbook of pattern recognition and computer vision

CH Chen - 2015 - books.google.com
Pattern recognition, image processing and computer vision are closely linked areas which
have seen enormous progress in the last fifty years. Their applications in our daily life …

Ranking-based locality sensitive hashing-enabled cancelable biometrics: Index-of-max hashing

Z Jin, JY Hwang, YL Lai, S Kim… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
In this paper, we propose a ranking-based locality sensitive hashing inspired two-factor
cancelable biometrics, dubbed “Index-of-Max”(IoM) hashing for biometric template …