Biometric systems (BSs) have shown prominent results in providing secure authentication protocols and a unique identification ecosystem for various applications. Over the years …
C Rathgeb, A Uhl - EURASIP journal on information security, 2011 - Springer
Form a privacy perspective most concerns against the common use of biometrics arise from the storage and misuse of biometric data. Biometric cryptosystems and cancelable …
A biometric system is vulnerable to a variety of attacks aimed at undermining the integrity of the authentication process. These attacks are intended to either circumvent the security …
S Kumari, X Li, F Wu, AK Das, KKR Choo… - Future Generation …, 2017 - Elsevier
Abstract Big Data and Cloud of Things (CoT) are two inter-related research trends in our data-driven society, and one research challenge is to design efficient security solution that …
W El-Shafai, FAHE Mohamed… - IEEE …, 2021 - ieeexplore.ieee.org
Various cancelable biometric techniques have been proposed to maintain user data security. In this work, a cancelable biometric framework is introduced to satisfy user data …
C Rathgeb, J Merkle, J Scholz, B Tams… - Computers & …, 2022 - Elsevier
Biometric technologies, especially face recognition, have become an essential part of identity management systems worldwide. In deployments of biometrics, secure storage of …
X Guo, P Li, J Zhong, D Wen, B Wei, S Liu, S Qi… - Nature …, 2022 - nature.com
Optical cryptography manifests itself a powerful platform for information security, which involves encrypting secret images into visual patterns. Recently, encryption schemes …
An essential part of cloud computing, IoT, and in general the broad field of digital systems, is constituted by the mechanisms which provide access to a number of services or …
Biometric systems are widely used now for security applications. Two major problems are encountered in biometric systems: the security problem and the dependence on a single …