A review on performance, security and various biometric template protection schemes for biometric authentication systems

A Sarkar, BK Singh - Multimedia Tools and Applications, 2020 - Springer
Identifying a person based on their behavioral and biological qualities in an automated
manner is called biometrics. The authentication system substituting traditional password and …

A survey on biometric cryptosystems and their applications

S Sharma, A Saini, S Chaudhury - Computers & Security, 2023 - Elsevier
Biometric systems (BSs) have shown prominent results in providing secure authentication
protocols and a unique identification ecosystem for various applications. Over the years …

A survey on biometric cryptosystems and cancelable biometrics

C Rathgeb, A Uhl - EURASIP journal on information security, 2011 - Springer
Form a privacy perspective most concerns against the common use of biometrics arise from
the storage and misuse of biometric data. Biometric cryptosystems and cancelable …

Biometric template security: Challenges and solutions

AK Jain, A Ross, U Uludag - 2005 13th European signal …, 2005 - ieeexplore.ieee.org
A biometric system is vulnerable to a variety of attacks aimed at undermining the integrity of
the authentication process. These attacks are intended to either circumvent the security …

Design of a provably secure biometrics-based multi-cloud-server authentication scheme

S Kumari, X Li, F Wu, AK Das, KKR Choo… - Future Generation …, 2017 - Elsevier
Abstract Big Data and Cloud of Things (CoT) are two inter-related research trends in our
data-driven society, and one research challenge is to design efficient security solution that …

Efficient and secure cancelable biometric authentication framework based on genetic encryption algorithm

W El-Shafai, FAHE Mohamed… - IEEE …, 2021 - ieeexplore.ieee.org
Various cancelable biometric techniques have been proposed to maintain user data
security. In this work, a cancelable biometric framework is introduced to satisfy user data …

Deep face fuzzy vault: Implementation and performance

C Rathgeb, J Merkle, J Scholz, B Tams… - Computers & …, 2022 - Elsevier
Biometric technologies, especially face recognition, have become an essential part of
identity management systems worldwide. In deployments of biometrics, secure storage of …

Stokes meta-hologram toward optical cryptography

X Guo, P Li, J Zhong, D Wen, B Wei, S Liu, S Qi… - Nature …, 2022 - nature.com
Optical cryptography manifests itself a powerful platform for information security, which
involves encrypting secret images into visual patterns. Recently, encryption schemes …

A review on protection and cancelable techniques in biometric systems

JC Bernal-Romero, JM Ramirez-Cortes… - Ieee …, 2023 - ieeexplore.ieee.org
An essential part of cloud computing, IoT, and in general the broad field of digital systems, is
constituted by the mechanisms which provide access to a number of services or …

Cancelable face and fingerprint recognition based on the 3D jigsaw transform and optical encryption

LA Abou Elazm, S Ibrahim, MG Egila, H Shawky… - Multimedia Tools and …, 2020 - Springer
Biometric systems are widely used now for security applications. Two major problems are
encountered in biometric systems: the security problem and the dependence on a single …