Biometric cryptosystems: issues and challenges

U Uludag, S Pankanti, S Prabhakar… - Proceedings of the …, 2004 - ieeexplore.ieee.org
In traditional cryptosystems, user authentication is based on possession of secret keys; the
method falls apart if the keys are not kept secret (ie, shared with non-legitimate users) …

Face liveness detection using artificial intelligence techniques: A systematic literature review and future directions

S Khairnar, S Gite, K Kotecha, SD Thepade - Big Data and Cognitive …, 2023 - mdpi.com
Biometrics has been evolving as an exciting yet challenging area in the last decade. Though
face recognition is one of the most promising biometrics techniques, it is vulnerable to …

A survey on biometric cryptosystems and cancelable biometrics

C Rathgeb, A Uhl - EURASIP journal on information security, 2011 - Springer
Form a privacy perspective most concerns against the common use of biometrics arise from
the storage and misuse of biometric data. Biometric cryptosystems and cancelable …

Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

Y Dodis, L Reyzin, A Smith - … : International Conference On The Theory And …, 2004 - Springer
We provide formal definitions and efficient secure techniques for turning biometric
information into keys usable for any cryptographic application, and reliably and securely …

Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

Y Dodis, R Ostrovsky, L Reyzin, A Smith - SIAM journal on computing, 2008 - SIAM
We provide formal definitions and efficient secure techniques for turning noisy information
into keys usable for any cryptographic application, and, in particular, reliably and securely …

Secure remote authentication using biometric data

X Boyen, Y Dodis, J Katz, R Ostrovsky… - Advances in Cryptology …, 2005 - Springer
Biometric data offer a potential source of high-entropy, secret information that can be used in
cryptographic protocols provided two issues are addressed:(1) biometric data are not …

A secure biometric authentication scheme based on robust hashing

Y Sutcu, HT Sencar, N Memon - Proceedings of the 7th Workshop on …, 2005 - dl.acm.org
In this paper, we propose a secure biometric based authentication scheme which
fundamentally relies on the use of a robust hash function. The robust hash function is a one …

Capacity and examples of template-protecting biometric authentication systems

P Tuyls, J Goseling - International Workshop on Biometric Authentication, 2004 - Springer
In this paper, we formulate precisely the requirements for privacy protecting biometric
authentication systems. The secrecy capacity C s is investigated for the discrete and the …

High security iris verification system based on random secret integration

CS Chin, ATB Jin, DNC Ling - Computer Vision and Image Understanding, 2006 - Elsevier
A dual-factor authentication methodology coined as S-Iris Encoding is proposed based on
the iterated inner-products between the secret pseudo-random number and the iris feature …

Using real time computer vision algorithms in automatic attendance management systems

V Shehu, A Dika - Proceedings of the ITI 2010, 32nd …, 2010 - ieeexplore.ieee.org
This paper introduces a new approach in automatic attendance management systems,
extended with computer vision algorithms. We propose using real time face detection …