Biometrics has been evolving as an exciting yet challenging area in the last decade. Though face recognition is one of the most promising biometrics techniques, it is vulnerable to …
C Rathgeb, A Uhl - EURASIP journal on information security, 2011 - Springer
Form a privacy perspective most concerns against the common use of biometrics arise from the storage and misuse of biometric data. Biometric cryptosystems and cancelable …
Y Dodis, L Reyzin, A Smith - … : International Conference On The Theory And …, 2004 - Springer
We provide formal definitions and efficient secure techniques for turning biometric information into keys usable for any cryptographic application, and reliably and securely …
We provide formal definitions and efficient secure techniques for turning noisy information into keys usable for any cryptographic application, and, in particular, reliably and securely …
Biometric data offer a potential source of high-entropy, secret information that can be used in cryptographic protocols provided two issues are addressed:(1) biometric data are not …
Y Sutcu, HT Sencar, N Memon - Proceedings of the 7th Workshop on …, 2005 - dl.acm.org
In this paper, we propose a secure biometric based authentication scheme which fundamentally relies on the use of a robust hash function. The robust hash function is a one …
P Tuyls, J Goseling - International Workshop on Biometric Authentication, 2004 - Springer
In this paper, we formulate precisely the requirements for privacy protecting biometric authentication systems. The secrecy capacity C s is investigated for the discrete and the …
A dual-factor authentication methodology coined as S-Iris Encoding is proposed based on the iterated inner-products between the secret pseudo-random number and the iris feature …
V Shehu, A Dika - Proceedings of the ITI 2010, 32nd …, 2010 - ieeexplore.ieee.org
This paper introduces a new approach in automatic attendance management systems, extended with computer vision algorithms. We propose using real time face detection …