The Emerging Challenges of Wearable Biometric Cryptosystems

KA Ajlan, T Alsboui, O Alshaikh, I Inuwa-Dute, S Khan… - Cryptography, 2024 - mdpi.com
Cryptographic key generation and data encryption and decryption using wearable biometric
technologies is an emerging research area with significant potential for authentication and …

A secure biometric key generation mechanism via deep learning and its application

Y Wang, B Li, Y Zhang, J Wu, Q Ma - Applied Sciences, 2021 - mdpi.com
Biometric keys are widely used in the digital identity system due to the inherent uniqueness
of biometrics. However, existing biometric key generation methods may expose biometric …

[HTML][HTML] Personal authentication and cryptographic key generation based on electroencephalographic signals

EA Abdel-Ghaffar, M Daoudi - Journal of King Saud University-Computer …, 2023 - Elsevier
Brain signals have recently been proposed as a strong biometric due to their characteristics
such as, uniqueness, permanence, universality, and confidentiality. There are many factors …

Biometric template protection for neural-network-based face recognition systems: A survey of methods and evaluation techniques

VK Hahn, S Marcel - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
As automated face recognition applications tend towards ubiquity, there is a growing need to
secure the sensitive face data used within these systems. This paper presents a survey of …

A novel blockchain's private key generation mechanism based on facial biometrics and physical unclonable function

Y Wang, B Li, Y Zhang, J Wu, G Liu, Y Li… - Journal of Information …, 2023 - Elsevier
Blockchain technology is widely used in the field of digital currency because of its non-
tamperability, traceability, and decentralization. Blockchain's private key is usually used to …

A High-security-level Iris Recognition System Based on Multi-Scale Dominating Feature Points

KC Lin, YM Chen - IEEE Signal Processing Letters, 2024 - ieeexplore.ieee.org
In this letter, an error-correction-based iris recognition (EC-IR) scheme, which utilizes multi-
scale dominating feature points (msDFPs), is constructed to enhance the security level …

[PDF][PDF] Key Generation and Testing Based on Biometrics

A AbdulRaheeM - Al-Rafidain Journal of Computer Sciences and …, 2024 - iasj.net
Creating and testing a biometric key is a critical process used for security and identity
verification. When using biometric traits such as fingerprints, facial features, iris patterns …

Multiple layer security system to access encrypted secure IP streaming videos using matlab

RR Samantaray, N Hegde… - … Conference on Smart …, 2023 - ieeexplore.ieee.org
Distinguishing one person's identity from another can be easily done by observing their
facial features. Face recognition, a personal identification technique, analyzes physical …

Pembangkitan Kunci Berdasarkan Pengenalan Wajah Menggunakan Algoritma Kanade-Lucas-Tomasi

F Ramadhanti, B Prakoso - Info Kripto, 2024 - infokripto.poltekssn.ac.id
Sistem biometrik menawarkan keunggulan yaitu memiliki keunikan yang berbeda pada
setiap manusia. Biometrik juga memiliki keunggulan yaitu bersifat permanen, sulit …