Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

A review on performance,security and various biometric template protection schemes for biometric authentication systems

Published: 01 October 2020 Publication History

Abstract

Identifying a person based on their behavioral and biological qualities in an automated manner is called biometrics. The authentication system substituting traditional password and token for authentication and relies gradually on biometric authentication methods for verification of the identity of an individual. This proves the fact that society has started depending on biometric-based authentication systems. Security of biometric authentication needs to be reviewed and discussed as there are multiple points related to integrity and public reception of biometric-based authentication systems. Security and recognition accuracy are the two most important aspects which must be considered while designing biometric authentication systems. During enrollment phase scanning of biometric data is done to determine a set of distinct biometric feature set known as biometric template. Protection of biometric templates from various hacking efforts is a topic of vital importance as unlike passwords or tokens, compromised biometric templates cannot be reissued. Therefore, giving powerful protection techniques for biometric templates and still at that very moment preparing great identification accuracy is a good research problem nowadays, as well as in the future. Furthermore, efficiency under non-ideal conditions is also supposed to be inadequate and thus needs special attention in the design of a biometric authentication system. Disclosure of various biometric traits in miscellaneous applications creates a severe compromise on the privacy of the user. Biometric authentication can be utilized for remote user authentication. In this case, the biometric data of users typically called templates are stored in a server. The uniqueness and stability of biometrics ended it useful over traditional authentication systems. But, a similar thing made the enduring harm of a user’s identity in biometric systems. The architecture of the biometric system leads to several hazards that lead to numerous security concerns and privacy threats. To address this issue, biometric templates are secured using several schemes that are categorized as biometric cryptosystems, cancelable biometrics, hybrid methods, Homomorphic Encryption, visual cryptography based methods. Biometric cryptosystems and cancelable biometrics techniques provide reliable biometric security at a great level. However, there persist numerous concerns and encounters that are being faced during the deployment of these protection technologies. This paper reviews and analyses various biometric template protection methods. This review paper also reflects the limitations of various biometric template protection methods being used in present times and highlights the scope of future work.

References

[1]
Ratha NK, Connell JH, and Bolle RM Enhancing security and privacy in biometrics-based authentication systems IBM Syst J 2001 40 3 614-634
[2]
Stallings W Cryptography and network security: principles and practice 2010 Englewood Cliffs Prentice Hall 5e-5e
[3]
Jung H and Heo Y Fingerprint liveness map construction using convolutional neural network Electron Lett 2018 54 564-566
[4]
Kundargi J, Karandikar R (2017) Fingerprint liveness detection using wavelet-based completed LBP descriptor. In: Proceedings of the 2nd international conference on computer vision and image processing, Roorkee, India. Germany, 2018; pp 187–202. Springer, Berlin, pp 9–12
[5]
Xia Z, Yuan C, Lv R, Sun X, Xiong NN, Shi Y-QA (2018) Novel weber local binary descriptor for fingerprint liveness detection. IEEE Trans Syst Man Cybern Syst
[6]
Yuan C, Sun X, Wu QJ (2018) Difference co-occurrence matrix using BP neural network for fingerprint liveness detection. Soft Comput: 1–13
[7]
Tan B, Schuckers S (2006) Liveness detection for fingerprint scanners based on the statistics of wavelet signal processing. In: Proceedings of the conference on computer vision and pattern recognition workshop (CVPRW’06), New York, NY, USA, p 26
[8]
Coli P, Marcialis GL, and Roli F Fingerprint silicon replicas: static and dynamic features for vitality detection using an optical capture device Int J Image Graphics 2008 8 495-512
[9]
Galbally J, Alonso-Fernandez F, Fierrez J, and Ortega-Garcia JA High performance fingerprint liveness detection method based on quality related features Future Gener Comput Syst 2012 28 311-321
[10]
Kim W Fingerprint liveness detection using local coherence patterns IEEE Signal Process Lett 2017 24 51-55
[11]
Cappelli R, Ferrara M, and Maltoni D Minutia cylinder-code: a new representation and matching technique for fingerprint recognition IEEE Trans Pattern Anal Mach Intell 2010 32 2128-2141
[12]
Yoon S, Cao K, Liu E, Jain AK (2013) LFIQ: latent fingerprint image quality. In: Proceedings of the 2013 IEEE sixth international conference on biometrics: theory, applications and systems (BTAS), Arlington, VA, USA, pp 1–8
[13]
Cao K, Liu E, and Jain AK Segmentation and enhancement of latent fingerprints: a coarse to fine ridgestructure dictionary IEEE Trans Pattern Anal Mach Intell 2014 36 1847-1859
[14]
Arora SS, Liu E, Cao K, and Jain AK Latent fingerprint matching: performance gain via feedback from exemplar prints IEEE Trans Pattern Anal Mach Intell 2014 36 2452-2465
[15]
Li P, Yang X, Cao K, Tao X, Wang R, and Tian J An alignment-free fingerprint cryptosystem based on fuzzy vault scheme J Netw Comput Appl 2010 33 207-220
[16]
Alam B, Jin Z, Yap W-S, and Goi B-M An alignment-free cancelable fingerprint template for bio-cryptosystems J Netw Comput Appl 2018 115 20-32
[17]
Arjona R, Prada-Delgado MA, Baturone I, Ross A (2018) Securing minutia cylinder codes for fingerprints through physically unclonable functions: an exploratory study. In: Proceedings of the 2018 international conference on biometrics (ICB), Gold Coast, Australia, pp 54–60
[18]
Wang S, Deng G, and Hu JA partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representationsPattern Recogn201761447-4581428.68279
[19]
Yang W, Hu J, Wang S, and Wu Q Biometrics based privacy-preserving authentication and mobile template protection Wirel Commun Mobile Comput 2018 2018 17
[20]
Liu E and Zhao Q Encrypted domain matching of fingerprint minutia cylinder-code (MCC) with i1 minimization Neurocomputing 2017 259 3-13
[21]
Yang W, Hu J, Wang S (2012) A delaunay triangle-based fuzzy extractor for fingerprint authentication. In: Proceedings of the 2012 IEEE 11th international conference on trust, security and privacy in computing and communications (TrustCom), Liverpool, UK, pp 66–70
[22]
Liu E, Zhao H, Liang J, Pang L, Xie M, Chen H, Li Y, Li P, and Tian JA Key binding system based on n-nearest minutiae structure of fingerprint Pattern Recogn Lett 2011 32 666-675
[23]
Sandhya M and Prasad MV Securing fingerprint templates using fused structures IET Biom 2017 6 173-182
[24]
Wang S and Hu J A blind system identification approach to cancelable fingerprint templates Pattern Recogn 2016 54 14-22
[25]
Zhang N, Yang X, Zang Y, Jia X, Tian J (2013) Generating registration-free cancelable fingerprint templates based on Minutia Cylinder-Code representation. In: Proceedings of the IEEE sixth international conference on biometrics: theory, applications and systems (BTAS), Arlington, VA, USA, pp 1–6
[26]
Ferrara M, Maltoni D, Cappelli R (2014) A two-factor protection scheme for MCC fingerprint templates. In: Proceedings of the 2014 international conference of the biometrics special interest group (BIOSIG), Darmstadt, Germany, pp 1–8
[27]
Yang W, Hu J, Wang S, and Wu Q Biometrics based privacy-preserving authentication and mobile template protection Wirel Commun Mobile Comput 2018 2018 17
[28]
Yang W, Wang S, Hu J, Zheng G, and Valli C A fingerprint and finger-vein based cancelable multi-biometric system Pattern Recogn 2018 78 242-251
[29]
Dwivedi R, Dey S (2018) A novel hybrid score level and decision level fusion scheme for cancelable multi-biometric verification. arXiv:1805.10433
[30]
BEAT Biometrics Evaluation and Testing. http://www.beat-eu.org/-2012. Funded under the 7th FP Theme SEC-2011.5.1-1 Evaluation of identification technologies, including Biometrics, N. Poh, C-H. Chan, J. Kittler, Javier Gabbaly, Julian Fierrez, Andrés Anjos, Sébastien Marcel, Cagatay Karabat
[31]
Teoh A, Goh A, and Ngo D Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs IEEE Trans Pattern Anal Mach Intell 2006 28 12 1892-1901
[32]
Connie T, Teoh A, Goh M, and Ngo DPalmhashing: a novel approach for cancelable biometricsInf Process Lett20059311-52103163
[33]
Chin CS, Jin ATB, and Ling DNC High security iris verification system based on random secret integration Comput Vis Image Underst 2006 102 2 169-177
[34]
Leng L and Zhang J Palmhash code vs. palmphasor code Neurocomputing 2013 108 1-12
[35]
Leng L, Teoh ABJ, Li M, and Khan MK Analysis of correlation of 2d palmhash code and orientation range suitable for transposition Neurocomputing 2014 131 377-387
[36]
Jeong M, Lee C, Kim J, Choi JY, Toh KA, Kim J (2006) Changeable biometrics for appearance based face recognition. In: Biometrics symposium: special session on research at the biometric consortium conference, pp 1–5
[37]
Yip WK, Teoh ABJ, and Ngo DCL Replaceable and securely hashed keys from onlinecsignatures IEICE Electron Expr 2006 3 18 410-416
[38]
Kong A, Cheung KH, Zhang D, Kamel M, You J, and Jensen GJAn analysis of biohashing and its variantsPattern Recogn20063971359-13681095.68665
[39]
Teoh A, Ngo D (2006) Biophasor: token supplemented cancellable biometrics. In: 9th international conference on control, automation robotics and vision (ICARCV), pp 1–5
[40]
Teoh A and Yuang CT Cancelable biometrics realization with multispace random projections IEEE Trans Syst Man Cybern 2007 37 5 1096-1106
[41]
Teoh ABJ and Chong LY Secure speech template protection in speaker verification system Speech Comm 2010 52 2 150-163
[42]
Savvides M, Vijaya Kumar BVK, Khosla PK (2004) Cancelable biometric filters for face recognition. In: Proceedings of the 17th international conference on pattern recognition, 2004. ICPR 2004., Cambridge. 10.1109/ICPR.2004.1334679, vol 3, pp 922–925
[43]
Kim Y, Toh KA (2007) A method to enhance face biometric security. In: First international conference on biometrics: theory, applications, and systems (BTAS), pp 1–6
[44]
Wang Y, Plataniotis K (2007) Face based biometric authentication with changeable and privacy preservable templates. Biometrics Symposium: 1–6
[45]
Teoh AB, Kuan YW, and Lee SCancellable biometrics and annotations on biohashPattern Recogn20084162034-20441132.68666
[46]
Ouda O, Tsumura N, Nakaguchi T (2010) Tokenless cancelable biometrics scheme for protecting iris code. In: 20th international conference on pattern recognition (ICPR), pp 882–885
[47]
Osama O, Tsumura N, and Nakaguchi T Bioencoding: a reliable tokenless cancelable biometrics scheme for protecting iris codes IEICE Trans Inf Syst 2010 93 7 1878-1888
[48]
Zuo J, Ratha N, Connell J (2008) Cancelable iris biometric. In: 19th international conference on pattern recognition (ICPR), pp 1–4
[49]
Bolle RM, Connell JH, and Ratha NKBiometric perils and patchesPattern Recogn200235122727-27381010.68148
[50]
Ratha NK, Chikkerur S, Connell JH, and Bolle RM Generating cancelable fingerprint templates IEEE Trans Pattern Anal Mach Intell 2007 29 4 561-572
[51]
Boult T (2006) Robust distance measures for face-recognition supporting revocable biometric tokens. In: Proc. int. conf. automatic face and gesture recognition, pp 560–566
[52]
Boult T, Scheirer W, Woodworth R (2007) Revocable fingerprint biotokens: accuracy and security analysis. In: Proc. IEEE conf. computer vision and pattern recognition, pp 1–8
[53]
Maiorana E, Campisi P, Fierrez J, Ortega-Garcia J, and Neri A Cancelable templates for sequence-based biometrics with application to on-line signature recognition IEEE Trans Syst Man Cybern A 2010 40 3 525-538
[54]
Hmmerle-Uhl J, Pschernig E, Uhl A (2009) Cancelable iris biometrics using block re-mapping and image warping. In: Samarati P, Yung M, Martinelli F, Ardagna C (eds) Information security (Lecture Notes in Computer Science), vol 5735. Springer, Berlin, pp 135–142
[55]
Yang B, Hartung D, Simoens K, Busch C (2010) Dynamic random projection for biometric template protection. In: Proc. IEEE int. conf. biometrics: theory applications and systems, pp 1–7
[56]
Das P, Karthik K, and Garai BC A robust alignment-free fingerprint hashing algorithm based on minimum distance graphs Pattern Recogn 2012 45 9 3373-3388
[57]
Wang S and Hu J Design of alignment-free cancelable fingerprint templates via curtailed circular convolution Pattern Recogn 2014 47 3 1321-1329
[58]
Chikkerur S, Ratha N, Connell J, Bolle R (sept. 2008) Generating registration-free cancelable fingerprint templates. In: Proc. IEEE int. conf. biometrics: theory, applications and systems, pp 1–6
[59]
Rathgeb C, Breitinger F, Busch C (2013) Alignment-free cancelable iris biometric templates based on adaptive bloom filters. In: International conference on biometrics (ICB), pp 1–8
[60]
Rathgeb C, Breitinger F, Busch C, and Baier H On application of bloom filters to iris biometrics IET Biom 2014 3 4 207-218
[61]
Rathgeb C and Busch C Cancelable multi-biometrics: mixing iris-codes based on adaptive bloom filters Comput Secur 2014 42 1-12
[62]
Rathgeb C, Uhl A (2010) Secure iris recognition based on local intensity variations. In: Image analysis and recognition. Springer, Berlin, pp 266–275
[63]
Bringer J, Morel C, Rathgeb C (2015) Security analysis of bloom filter-based iris biometric template protection. In: 8th IAPR international conference on biometrics (ICB), pp 527–534
[64]
Zhe J, Jin A (2011) Fingerprint template protection with minutia vicinity decomposition. In: International joint conference on biometrics (IJCB), pp 1–7
[65]
Jin Z, Goi BM, Teoh A, and Tay YH A two-dimensional random projected minutiae vicinity decomposition-based cancellable fingerprint template Secur Commun Netw 2014 7 11 1691-1701
[66]
Jin Z, Lim MH, Teoh ABJ, and Goi BM A non-invertible randomized graph-based hamming embedding for generating cancelable fingerprint template Pattern Recogn Lett 2014 42 137-147
[67]
Sandhya M, Prasad MV, and Chillarige RR Generating cancellable fingerprint templates based on delaunay triangle feature set construction IET Biom 2016 5 2 131-139
[68]
Prasad MV, Swathi P, Rao C, and Deekshatulu B Minimum spanning tree (MST) based techniques for generation of cancelable fingerprint templates Int J Pattern Recognit Artif Intell 2014 28 06 1456, 013
[69]
Prasad MV and Kumar CS Fingerprint template protection using multiline neighboring relation Expert Syst Appl 2014 41 14 6114-6122
[70]
Moujahdi C, Bebis G, Ghouzali S, and Rziza M Fingerprint shell: secure representation of fingerprint template Pattern Recogn Lett 2014 45 189-196
[71]
Pillai J, Patel V, Chellappa R, Ratha N (2010) Sectored random projections for cancelable iris biometrics. In: International conference on acoustics speech and signal processing (ICASSP), pp 1838–1841
[72]
Lee C and Kim J Cancelable fingerprint templates using minutiae-based bit-strings J Netw Comput Appl 2010 33 3 236-246
[73]
Nanni L, Maiorana E, Lumini A, and Campisi P Combining local, regional and global matchers for a template protected on-line signature verification system Expert Syst Appl 2010 37 5 3676-3684
[74]
Ahmad T, Hu J, and Wang S Pair-polar coordinate-based cancelable fingerprint templates Pattern Recogn 2011 44 10–11 2555-2564
[75]
Takahashi K and Hirata S Cancelable biometrics with provable security and its application to fingerprint verification IEICE Trans Fundam Electron Commun Comput Sci 2011 94 1 233-244
[76]
Moujahdi C, Ghouzali S, Kram MM, Rziza M, Bebis G (2012) Spiral cube for biometric template protection. In: Image and signal processing. Springer, Berlin, pp 235–244
[77]
Ferrara M, Maltoni D, and Cappelli R Noninvertible minutia cylinder-code representation IEEE Trans Inf Forensics Secur 2012 7 6 1727-1737
[78]
Wong WJ, Wong MLD, and Kho YH Multi-line code: a low complexity revocable fingerprint template for cancelable biometrics J Cent South Univ 2013 20 5 1292-1297
[79]
Wong WJ, Teoh AB, Wong MD, and Kho YH Enhanced multi-line code for minutiae-based fingerprint template protection Pattern Recogn Lett 2013 34 11 1221-1229
[80]
Yang W, Hu J, Wang S, Yang J (2013) Cancelable fingerprint templates with delaunay trianglebased local structures. In: Proceedings of cyberspace safety and security, pp 81–91
[81]
Ghammam L, Barbier M, Rosenberger C (2018) Enhancing the security of transformation based biometric template protection schemes. CyberWorlds. Singapour, Singapore
[82]
Li H, Qiu J, Teoh AB, and Palmprint J Template protection scheme based on randomized cuckoo hashing and MinHash Multimed Tools Appl 2020 79 11947-11971
[83]
Qiu J, Li H, Dong J (2018) Generating cancelable palmprint templates based on Bloom filters. In: Proceedings of the 2018 6th international conference on bioinformatics and computational biology (ICBCB 2018). ACM, New York, pp 78–82
[84]
Bringer J, Morel C, and Rathgeb C Security analysis and improvement of some biometric protected templates based on Bloom filters Image Vis Comput 2017 58 239-253
[85]
Debanjan S and Balasubramanian R Generation of cancelable Iris templates via randomized bit sampling IEEE Trans Inf Forensic Secur 2019 14 11 2972-2986
[86]
Drozdowski P, Garg S, Rathgeb C, et al. (2018) Privacy-preserving indexing of Iris-codes with cancelable Bloom filter-based search structures. In: Proceedings of European signal processing conference (EUSIPCO), Rome, Italy
[87]
Marta G, Christian R, Javier G, et al.Unlinkable and irreversible biometric template protection based on bloom filtersInf Sci201637018-323547576
[88]
Jin Z, Hwang J, KS LaiY, and Teoh ABJ Ranking based locality sensitive hashing enabled cancelable biometrics: index-of-max hashing IEEE Trans Inf Forensic Secur 2018 13 2 393-407
[89]
Lee MJ, Jin Z, Teoh ABJ (2018) One-factor cancellable scheme for fingerprint template protection: Extended Feature Vector (EFV) Hashing. In: 2018 IEEE international workshop on information forensics and security (WIFS), pp 1–7
[90]
Leng L, Andrew BJ, and Teoh ML Simplified 2DPalmhash code for secure Palmprint verification Multimed Tools Appl 2017 76 6 8373-8398
[91]
Hmmerle-Uhl J, Pschernig E, Uhl A (2009) Cancelable iris biometrics using block re-mapping and image warping. In: Samarati P, Yung M, Martinelli F, Ardagna C (eds) Information security (Lecture Notes in Computer Science), vol 5735. Springer, Berlin, pp 135–142
[92]
Juels A, Wattenberg M (1999) A fuzzy commitment scheme. In: Proceedings of the 6th ACM conference on computer and communications security, pp 28–36
[93]
Hao F, Anderson R, and Daugman J Combining cryptography with biometrics effectively IEEE Trans Comput 2006 55 9 1081-1088
[94]
VanderVeen M, Kevenaar T, Schrijen GJ, Akkermans TH, Zuo F (2006) Face biometrics with renewable templates. In: Proceedings of SPIE: security, steganography, and watermarking of multimedia contents, vol 6072
[95]
Zheng G, Li W, Zhan C (2006) Cryptographic key generation from biometric data using lattice mapping. In: 18th international conference on pattern recognition (ICPR), vol 4, pp 513– 516
[96]
Bringer J, Chabanne H, Cohen G, Kindarji B, Zemor G (2007) Optimal iris fuzzy sketches. In: First international conference on biometrics: theory, applications, and systems (BTAS), pp 1–6
[97]
Bringer J, Chabanne H, Cohen G, Kindarji B, and Zemor G Theoretical and practical boundaries of binary secure sketches IEEE Trans Inf Forensics Secur 2008 3 4 673-683
[98]
Teoh ABJ and Kim J Secure biometric template protection in fuzzy commitment scheme IEICE Electron Expr 2007 4 23 724-730
[99]
Maiorana E, Campisi P, and Neri A User adaptive fuzzy commitment for signature template protection and renewability J Electron Imaging 2008 17 1 011011
[100]
Ao M, Li S (2009) Near infrared face based biometric key binding. In: Advances in biometrics. Springer, Berlin, pp 376–385
[101]
Rathgeb C, Uhl A (2009) Systematic construction of iris-based fuzzy commitment schemes. In: 3rd international conference on biometrics (ICB), pp 940–949
[102]
Lu H, Martin K, Bui F, Plataniotis KN, Hatzinakos D (2009) Face recognition with biometric encryption for privacy-enhancing self-exclusion. In: Proceedings of the 16th international conference on digital signal processing, pp 625–632
[103]
Maiorana E and Campisi P Fuzzy commitment for function based signature template protection IEEE Signal Process Lett 2010 17 3 249-252
[104]
Nandakumar K (2010) A fingerprint cryptosystem based on minutiae phase spectrum. In: IEEE international workshop on information forensics and security (WIFS), pp 1–6
[105]
Rathgeb C, Uhl A (2010) Adaptive fuzzy commitment scheme based on iris-code error analysis. In: European workshop on visual information processing (EUVIP), pp 41–44
[106]
Rathgeb C, Uhl A, Wild P (2011) Reliability-balanced feature level fusion for fuzzy commitment scheme. In: International joint conference on biometrics (IJCB), pp 1–7
[107]
Rathgeb C and Uhl A Statistical attack against fuzzy commitment scheme IET Biom 2012 1 2 94-104
[108]
Zhou X, Kuijper A, Veldhuis R, Busch C (2011) Quantifying privacy and security of biometric fuzzy commitment. In: International joint conference on biometrics (IJCB), pp 1–8
[109]
Zhou X, Kuijper A, Busch C (2012) Retrieving secrets from iris fuzzy commitment. In: 5th IAPR international conference on biometrics (ICB), pp 238–244
[110]
Zhou X, Busch C (2012) Measuring privacy and security of iris fuzzy commitment. In: IEEE international Carnahan conference on security technology (ICCST), pp 168–173
[111]
Kelkboom E, Breebaart J, Buhan I, and Veldhuis R Maximum key size and classification performance of fuzzy commitment for gaussian modeled biometric sources IEEE Trans Inf Forensics Secur 2012 7 4 1225-1241
[112]
Li P, Yang X, Qiao H, Cao K, Liu E, and Tian J An effective biometric cryptosystem combining fingerprints with error correction codes Expert Syst Appl 2012 39 7 6562-6574
[113]
Imamverdiyev Y, Teoh ABJ, and Kim J Biometric cryptosystem based on discretized fingerprint texture descriptors Expert Syst Appl 2013 40 5 1888-1901
[114]
Juels A, Sudan M (2002) A fuzzy vault scheme. In: Proceedings of IEEE international symposium on information theory
[115]
Clancy T, Lin D, Kiyavash N (2003) Secure smartcard-based fingerprint authentication. In: Proceedings of the ACMSIGMM workshop on biometric methods and applications. Berkley, Mich, USA, pp 45–52
[116]
Yang S, Verbauwhede I (2005) Automatic secure fingerprint verification system based on fuzzy vault scheme. In: Proceedings of the IEEE international conference on acoustics, speech and signal processing (ICASSP’05). Philadelphia, PA, USA, vol 5, pp 609–612
[117]
Chung Y, Moon D, Lee S, Jung S, Kim T, Ahn D (2005) Automatic alignment of fingerprint features for fuzzy fingerprint vault. In: Proceedings of the 1st conference on information security and cryptology (CISC’05) vol 3822 of Lecture Notes in Computer Science. Beijing, China, pp 358–369
[118]
Uludag U, Jain AK (2006) Securing fingerprint template: fuzzy vault with helper data. In: Proceedings of the conference on computer vision and pattern recognition workshops (CVPRW’06). New York, NY, USA, p 163
[119]
Uludag U, Pankanti S, Jain AK (2005) Fuzzy vault for fingerprints. In: Proceedings of 5th international conference on audio- and video-based biometric person authentication, AVBPA 2005, Hilton Rye Town, NY, USA
[120]
Nagar A, Chaudhury S (2006) Biometrics based asymmetric cryptosystem design using modified fuzzy vault scheme. In: Proceedings of the 18th international conference on pattern recognition (ICPR ’06). Hong Kong, vol 4, pp 537–540
[121]
Nagar A, Nandakumar K, Jain AK (2008) Securing fingerprint template: fuzzy vault with minutiae descriptors. In: 19th international conference on pattern recognition (ICPR), pp 1–4
[122]
Nandakumar K, Jain A, and Pankanti S Fingerprint-based fuzzy vault: implementation and performance IEEE Trans Inf Forensics Secur 2007 2 4 744-757
[123]
Nandakumar K, Nagar A, Jain AK (2007) Hardening fingerprint fuzzy vault using password. In: International conference on biometrics (ICB), pp 927–937
[124]
Feng YC, Yuen PC (2006) Protecting face biometric data on smartcard with reed-solomon code. In: Proceedings of the conference on computer vision and pattern recognition workshops (CVPRW’06). New York, NY, USA, p 29
[125]
Lee YJ, Bae K, Lee SJ, Park KR, Kim J (2007) Biometric key binding: fuzzy vault based on iris images. Seoul, South Korea, vol 800–808, p Proceedings of 2nd international conference on biometrics
[126]
Nguyen TH, Wang Y, Ha Y, and Li R Performance and security-enhanced fuzzy vault scheme based on ridge features for distorted fingerprints IET Biom 2015 4 1 29-39
[127]
Tams B, Mihailescu P, and Munk A Security considerations in minutiae-based fuzzy vaults IEEE Trans Inf Forensics Secur 2015 10 5 985-998
[128]
Tams B, Merkle J, Rathgeb C, Wagner J, Korte U, Busch C (2015) Improved fuzzy vault scheme for alignment-free fingerprint features. In: International conference of the biometrics special interest group (BIOSIG), pp 1–12
[129]
Bansal D, Sofat S, Kaur M (2015) Fingerprint fuzzy vault using Hadamard transformation. In: International conference on advances in computing, communications and informatics (ICACCI), pp 1830–1834
[130]
Lafkih M, Lacharme P, Rosenberger C, Mikram M, Ghouzali S, El Haziti M, Aboutajdine D (2015) Vulnerabilities of fuzzy vault schemes using biometric data with traces. In: International wireless communications and mobile computing conference (IWCMC), pp 822–827
[131]
Li C and Hu J A security-enhanced alignment-free fuzzy vault-based fingerprint cryptosystem using pair-polar minutiae structures IEEE Trans Inf Forensics Secur 2016 11 3 543-555
[132]
Lee YJ, Park KR, Lee SJ, Bae K, and Kim J A new method for generating an invariant iris private key based on the fuzzy vault system IEEE Trans Syst Man Cybern B Cybern 2008 38 5 1302-1313
[133]
Zhou X, Opel A, Merkle J, Korte U, Busch C (2011) Enhanced template protection with passwords for fingerprint recognition. In: Third international workshop on security and communication networks (IWSCN), pp 67–74
[134]
Hong-wei L, Yao W (2012) A new fuzzy fingerprint vault using multivariable linear function based on lorenz chaotic system. In: International conference on computer science and automation engineering (CSAE), vol 1, pp 531–534
[135]
Bhateja A, Chaudhury S, Saxena P (2014) A robust online signature based cryptosystem. In: 14th international conference on frontiers in handwriting recognition (ICFHR), pp 79–84
[136]
Hoque S, Fairhurst M, Howells G (2008) Evaluating biometric encryption key generation using handwritten signatures. In: Symposium on bio-inspired learning and intelligent systems for security (BLISS’08), pp 17–22
[137]
Rathgeb C, Uhl A (2009) An iris-based interval-mapping scheme for biometric key generation. In: Proceedings of 6th international symposium on image and signal processing and analysis, pp 511– 516
[138]
Carrara B, Adams C (2010) You are the key: generating cryptographic keys from voice biometrics. In: Eighth annual international conference on privacy security and trust (PST), pp 213–222
[139]
Wu L, Liu X, Yuan S, Xiao P (2010) A novel key generation cryptosystem based on face features. In: 10th international conference on signal processing (ICSP), pp 1675–1678
[140]
Liu E, Liang J, Pang L, Xie M, and Tian J Minutiae and modified biocode fusion for fingerprint-based key generation J Netw Comput Appl 2010 33 3 221-235
[141]
Ranjan R, Singh S (2013) Improved and innovative key generation algorithms for biometric cryptosystems. In: 3rd international advance computing conference (IACC), pp 943–946
[142]
Yang W, Hu J, Wang S, and Stojmenovic M An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures Pattern Recogn 2014 47 3 1309-1320
[143]
Yang W, Hu J, and Wang S A delaunay quadrangle-based fingerprint authentication systemwith template protection using topology code for local registration and security enhancement IEEE Trans Inf Forensics Secur 2014 9 7 1179-1192
[144]
Dodis Y, Ostrovsky R, Reyzin L, Smith A (2006) Fuzzy extractors: how to generate strong keys from biometrics and other noisy data, Tech. Rep. 235, Cryptology ePrint Archive
[145]
Dodis Y, Reyzin L, Smith A (2004) Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Proceedings of international conference on the theory and applications of cryptographic techniques: advances in cryptology (EUROCRYPT ’04), vol 3027 of Lecture Notes in Computer Science. Interlaken, Switzerland, pp 523–540
[146]
Sarkar A, Singh BK, Bhaumik U (2017) RSA key generation from cancelable fingerprint biometrics. In: International conference on computing, communication, control and automation (ICCUBEA), Pune 2017. 10.1109/ICCUBEA.2017.8463959, pp 1–6
[147]
Sarkar A, Singh BK (2018) Cryptographic key generation from cancelable fingerprint templates. In: 2018 4th international conference on recent advances in information technology (RAIT), Dhanbad. 10.1109/RAIT.2018.8389007, pp 1–6
[148]
Sarkar A, Singh BK, Cancellable U (2017) Bhaumik cryptographic key generation scheme from biometrics. In: 2018 progress in computing, analytics and networking proceedings of ICCAN. 10.1007/978-981-10-7871-2-26
[149]
Buhan I, Doumen J, Hartel P, Veldhuis R (2007) Fuzzy extractors for continuous distributions. In: Proceedings of the 2nd ACM symposium on information, computer and communications security (ASIACCS’07). Singapore, pp 353–355
[150]
Arakala A, Jeffers J, Horadam KJ (2007) Fuzzy extractors for minutiae-based fingerprint authentication. In: Proceedings of the 2nd international conference on biometrics. Seoul, South Korea, pp 760–769
[151]
Chang EC, Roy S (2007) Robust extraction of secret bits from minutiae. In: Proceedings of 2nd international conference on biometrics. Seoul, South Korea, pp 750–759
[152]
Zhou X (2007) Template protection and its implementation in 3D face recognition systems. In: Biometric technology for human identification IV, vol 6539 of Proceedings of SPIE. Orlando, Fla, USA, pp 214?-225
[153]
Sutcu Y, Li Q, Memon N (2007) Secure biometric templates from fingerprint-face features. In: Proceedings of the IEEE computer society conference on computer vision and pattern recognition (CVPR’07), Minneapolis, Minn, USA
[154]
Boyen X, Dodis Y, Katz J, Ostrovsky R, Smith A (2005) Secure remote authentication using biometric data. In: Proceedings of the 24th annual international conference on advances in cryptology (EUROCRYPT ’06), vol 3494 of Lecture Notes in Computer Science. Aarhus, Denmark, pp 147–163
[155]
Buhan IR, Doumen JM, Hartel PH, Veldhuis RNJ (2007) Secure ad-hoc pairing with biometrics: safe. In: Proceedings of 1st international workshop on security for spontaneous interaction (IWSSI’07). Innsbruck, Austria, pp 450–456
[156]
Li Q, Chang E-C (2006) Robust, short and sensitive authentication tags using secure sketch. In: Proceedings of the 8th multimedia and security workshop (MM and Sec ’06). Geneva, Switzerland, pp 56–61
[157]
Sutcu Y, Li Q, and Memon N Protecting biometric templates with sketch: theory and practice IEEE Transactions on Information Forensics and Security 2007 2 3 503-512
[158]
Feng YC, Yuen PC, and Jain AK A hybrid approach for generating secure and discriminating face template IEEE Trans Inf Forensics Secur 2010 5 1 103-117
[159]
Nagar A, Nandakumar K, and Jain AK A hybrid biometric cryptosystem for securing fingerprint minutiae templates Pattern Recogn Lett 2010 31 8 733-741
[160]
Liu H, Sun D, Xiong K, and Qiu Z A hybrid approach to protect palmprint templates Sci World J 2014 2014 686754
[161]
Chin Y, Ong T, Teoh A, and Goh K Integrated biometrics template protection technique based on fingerprint and palmprint feature-level fusion Inf Fusion 2014 18 161-174
[162]
Jin Z, Teoh ABJ, Goi BM, and Tay YH Biometric cryptosystems: a new biometric key binding and its implementation for fingerprint minutiae-based representation Pattern Recogn 2016 56 50-62
[163]
Bringer J, Chabanne H, and Kindarji BThe best of both worlds: applying secure sketches to cancelable biometricsSci Comput Program2008741-243-5126546731162.68600
[164]
Wong WJ, Wong MLD, Teoh ABJ (2014) A security- and privacydriven hybrid biometric template protection technique. In: Proc. int. conf. electron inf. commun., pp 1–5
[165]
Monwar MM, Gavrilova ML (2009) Enhancing security through a hybrid multibiometric system. In: Proc. IEEE int. conf. comput. intell. biometrics, theory, algorithms, appl., pp 84–91
[166]
Zhu H-H, He Q-H, Li Y-X (2012) A two -step hybrid approach for voiceprint-biometric template protection. In: Proc. IEEE int. conf. mach. learn, pp 560–565
[167]
Hammad M, Luo G, and Wang K Cancelable biometric authentication system based on ECG Multimed Tools Appl 2019 78 1857-1887
[168]
Dang TK, Huynh VQP, and Truong QH A hybrid template protection approach using secure sketch and ann for strong biometric key generation with revocability guarantee Int Arab J Inf Technol (IAJIT) 2018 15 2 331-340
[169]
Dang TK et al. A combination of fuzzy vault and periodic transformation for cancelable biometric template IET Biometrics, The Institution of Engineering and Technology, United Kingdom 2016 5 229-235
[170]
Zakaria Y, Nassar RM, Zahran O, Hussein GA, El-Rabaie E-SM, Elkhamy S, Al-Nuaimy W, Eldokany IM, and Abd El-Samie FE Cancelable multi-biometric security system based on double random phase encoding and cepstral analysis Multimedia Tools and Applications 2019 78 32333-32355
[171]
Nguyen TAT, Dang TK, Nguyen DT (2019) A new biometric template protection using random orthonormal projection and fuzzy commitment. In: Lee S, Ismail R, Choo H (eds) Proceedings of the 13th international conference on ubiquitous information management and communication (IMCOM) 2019. IMCOM 2019. Advances in Intelligent Systems and Computing, vol 935. Springer, Cham
[172]
Yuan L (2014) Multimodal cryptosystem based on fuzzy commitment. In: Proc. IEEE 17th int. conf. comput. sci. eng., pp 1545–1549
[173]
Rivest RL, Adleman L, and Dertouzos MLOn data banks and privacy homomorphismsFound Secure Comput1978411169-180521254
[174]
Gentry C (2009) Fully homomorphic encryption using ideal lattices, pp 169–178
[175]
Gentry C, Halevi S (2011) Implementing Gentry’s fully-homomorphic encryption scheme. In: Proc. 30th annu. int. conf. EUROCRYPT, pp 129–148
[176]
Plantard T, Susilo W, and Zhang Z Fully homomorphic encryption using hidden ideal lattice IEEE Trans Inf Forensics Security 2013 8 12 2127-2137
[177]
Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Proc. EUROCRYPT, pp 223–238
[178]
Osadchy M, Pinkas B, Jarrous A, Moskovich B (2010) SCiFIA system for secure face identification. In: Proc. IEEE int. conf. secur. privacy, p 239254
[179]
Rabin MO (1981) How to exchange secrets with oblivious transfer. Aiken Comput. Lab, Harvard Univ., Cambridge, MA, USA, Tech. Rep. TR-81
[180]
Gomez-Barrero M, Fierrez J, Galbally J (2016) Variable-length template protection based on homomorphic encryption with application to signature biometrics. In: 4th international conference on biometrics and forensics (IWBF), pp 1–6
[181]
Erkin Z, Franz M, Guajardo J, Katzenbeisser S, Lagendijk I, Toft T (2009) Privacy-preserving face recognition. In: Privacy enhancing technologies. Springer, Berlin, pp 235–253
[182]
Sadeghi AR, Schneider T, Wehrenberg I (2009) Efficient privacy-preserving face recognition. In: Information, security and cryptology. Springer, Berlin, pp 229–244
[183]
Barnrni M, Bianchi T, Catalano D, Raimondo MD, Labati RD, Failla P, Fiore D, Lazzeretti R, Piuri V, Piva A, Scotti F (2010) A privacy-compliant fingerprint recognition system based on homomorphic encryption and fingercode templates. In: International conference on biometrics: theory applications and systems (BTAS), pp 1–7
[184]
Barni M, Bianchi T, Catalano D, Di Raimondo M, Donida Labati R, Failla P, Fiore D, Lazzeretti R, Piuri V, Scotti F, et al. (2010) Privacy-preserving fingercode authentication. In: Proceedings of the 12th ACM workshop on multimedia and security, pp 231–240
[185]
Karabat C, Kiraz MS, Erdogan H, and Savas E Thrive: threshold homomorphic encryption based secure and privacy preserving biometric verification system EURASIP J Adv Signal Process 2015 2015 1 1-18
[186]
Kulkarni R, Namboodiri A (2013) Secure hamming distance based biometric authentication. In: International conference on biometrics (ICB), pp 1–6
[187]
Naor M, Shamir A (1995) Visual cryptography. In: Advances in CryptologyEUROCRYPT’94. Springer, pp 1–12
[188]
Divya C and Surya E Visual cryptography using palm print based on dct algorithm International Journal of Emerging Technology and Advanced Engineering 2012 2 12 2250-2459
[189]
Monoth T and Anto PB Tamperproof transmission of fingerprints using visual cryptography schemes Procedia Computer Science 2010 2 143-148
[190]
Ross A and Othman A Visual cryptography for biometric privacy IEEE transactions on information forensics and security 2011 6 1 70-81
[191]
Ross A, Othman AA (2010) Visual cryptography for face privacy. In: SPIE defense, security, and sensing, international society for optics and photonics, pp 76,670B–76,670B
[192]
Revenkar P, Anjum A, Gandhare W (2010) Secure iris authentication using visual cryptography. arXiv:10041748
[193]
Siew Chin C, Beng Jin AT, and Chek Ling DN High security iris verification system based on random secret integration Comp Vision Image Underst 2006 102 2 169-177
[194]
Sinduja R, Sathiya R, Vaithiyanathan V (2012) Sheltered iris attestation by means of visual cryptography (sia-vc). In: 2012 international conference on advances in engineering, science and management (ICAESM), pp 650–655
[195]
Jain AK, Nandakumar K, Nagar A, et al. (2008) Biometric template security. EURASIP Journal on Advances in Signal Processing 2008
[196]
Tuyls P, Hollmann HD, Van Lint JH, and Tolhuizen LXor-based visual cryptography schemesDes Codes Crypt2005371169-18621650481136.94324
[197]
Ilavarsan K and Malvika R A multiple level visual cryptography scheme for biometric privacy without pixel expansion International Journal of Communications and Engineering 2012 4 4 59-63
[198]
Muhammed RP (2011) A secured approach to visual cryptographic biometric template. International Journal on Information Technology 1(2)
[199]
Takur V, Jaiswal R, Sonawane S, Nalavade R, et al. (2012) Biometric data security using recursive visual cryptography. In: Information and knowledge management, vol 2, pp 32–36
[200]
Ateniese G, Blundo C, Santis AD, and Stinson DRExtended capabilities for visual cryptographyTheor Comput Sci20012501143-16117952410952.68056
[201]
Nakajima M, Yamaguchi Y (2002) Extended visual cryptography for natural images
[202]
Othman A, Ross A (2011) Mixing fingerprints for generating virtual identities. In: 2011 IEEE international workshop on information forensics and security (WIFS). IEEE, pp 1–6
[203]
Ross A, Othman A (2011) Mixing fingerprints for template security and privacy. In: Proceedings of the 19th eur. sign. proc. conf. (EUSIPCO)
[204]
Jain AK, Uludag U (2003) Hiding biometric data. In: IEEE transactions on pattern analysis and machine intelligence, vol 25, pp 1494–1498
[205]
Na W, Chiya Z, Li Xia, Yunjin W (2010) Enhancing iris-feature security with steganography. In: IEEE conference on industrial electronics and applications, pp 2233–2237
[206]
Ntalianis K, Tsapatsoulis N, and Drigas A Video-object oriented biometrics hiding for user authentication under error-prone transmissions EURASIP Journal on Information Security 2011 2011 12
[207]
Ojala T, Pietikainen M, and Harwood D A comparative study of texture measures with classification based on feature distributions Pattern Recogn 1996 29 51-59
[208]
Zhenhua G, Lei Z, David Z, Xuanqin M (2010) Hierarchical multiscale LBP for face and palmprint recognition. In: IEEE 17th international conference on image processing, Hong Kong
[209]
Chedded A (2009) Steganoflage: a new image steganography algorithm. School of Computing & Intelligent Systems Faculty of Computing & Engineering University of Ulster
[210]
Malkhasyan N (2013) Authentication based on fingerprints with steganographic data protection. International Journal BInformation Theories and Applications 20(3)
[211]
Lavanya N, Manjula V, Krishna Rao NV (2012) Robust and secure data hiding in image using biometrictechnique. International Journal of Computer Science and Information Technologies 3(5)
[212]
Amritha G, Varkey M (2013) A security enhanced approach for digital image steganography using DWT and RC4 encryption. Int J Comput Trends Technol 4(6)
[213]
Park K, Jeong D, Kang B, and Lee E A study on iris feature watermarking on face data, vol 4432 2007 Berlin Springer 415-423
[214]
Hassanien A, Abraham A, and Grosan C Spiking neural network and wavelets for hiding iris data in digital images Soft Comput 2009 13 4 401-416
[215]
Majumder S, Devi KJ, and Sarkar SK Singular value decomposition and wavelet-based iris biometric watermarking IET Biometrics 2013 2 1 21-27
[216]
Paunwala M and Patnaik S Biometric template protection with DCTbased watermarking Mach Vis Appl 2014 25 1 263-275
[217]
Abdullah MAM, Dlay SS, Woo WL (2015) Securing iris images with a robust watermarking algorithm based on discrete cosine transform. In: Proceedings of the 10th international conference on computer vision theory and applications, vol 3, pp 108–114
[218]
Poongodi P, Betty P (2014) A study on biometric template protection techniques. International Journal of Engineering Trends and Technology (IJETT) 7(4)
[219]
Fazli SAn improved watermarking algorithm for hiding biometric dataInternational Journal of Science and Engineering Investigations20121211-152925015
[220]
Naik AK and Holambe RS A blind DCT domain digital watermarking for biometric authentication International Journal of Computer Applications 2010 1 16 11-15
[221]
Daugman J (1999) Recognizing persons by their iris patterns. In: Jain AK, Bolle R, Pankanti S (eds) Biometrics: personal identification in networked society. Kluwer Academic Publishers, London, pp 103–122
[222]
Poh N, Rattani A, and Roli F Critical analysis of adaptive biometric systems IET Biometrics 2012 1 4 179-187
[223]
JTC1 SC27 IT Security Techniques: Biometric Information Protection, document ISO/IEC 24745, Intl Organization for Standardization, 2011
[224]
Malarvizhi N, Selvarani P, and Raj P Adaptive fuzzy genetic algorithm for multi biometric authentication Multimed Tools Appl 2020 79 9131-9144
[225]
Cappelli R, Maltoni D, Mario D, Wayman J, and Jain A Performance evaluation of fingerprint verification systems IEEE Transactions on Pattern Analysis and Machine Intelligence 2006 28 20
[226]
Yang W, Hu J, Wang S, Yang J, Shu L (2013) Biometrics for securing mobile payments: benefits, challenges and solutions. In: 2013 6th international congress on image and signal processing (CISP) Hangzhou, pp 1699–1704
[227]
Laghari A, ur rehman W, Memon ZA (2016) Biometric authentication technique using smartphone sensor. In: 2016 13th international bhurban conference on applied sciences and technology (IBCAST), Islamabad, pp 381–384
[228]
Wojciechowska A, Choras M, and Kozik R The overview of trends and challenges in mobile biometrics Journal of Applied Mathematics and Computational Mechanics 2017 16 173-185
[229]
Rattani A, Reddy N, Derakhshani R (2018) Convolutional neural networks for gender prediction from smartphone-based ocular images, vol 7, pp 423–430, 9
[230]
Menotti D, Chiachia G, Pinto A, Schwartz WR, Pedrini H, Falcao AX, and Rocha A Deep representations for iris, face, and fingerprint spoofing detection IEEE Trans Inf Foren Sec 2015 10 864-879
[231]
Goodfellow I, Bengio Y, and Courville A Deep learning, vol 1 2016 Cambridge MIT Press 800-800
[232]
Pandya B, Cosma G, Alani AA, Taherkhani A, Bharadi V, McGinnity TM (2018) Fingerprint classification using a deep convolutional neural network. In: 2018 4th international conference on information management (ICIM), Oxford, pp 86–91
[233]
Dieckmann B, Merkle J, and Rathgeb C Fingerprint pre-alignment based on deep learning International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, Germany 2019 2019 1-6

Cited By

View all
  • (2024)Hierarchical Perceptual Noise Injection for Social Media Fingerprint Privacy ProtectionIEEE Transactions on Image Processing10.1109/TIP.2024.338177133(2714-2729)Online publication date: 1-Apr-2024
  • (2024)AI-powered biometrics for Internet of Things securityJournal of Information Security and Applications10.1016/j.jisa.2024.10374882:COnline publication date: 1-May-2024
  • (2024)Metaheuristic Algorithms for Enhancing Multicepstral Representation in Voice Spoofing Detection: An Experimental ApproachAdvances in Swarm Intelligence10.1007/978-981-97-7181-3_20(247-262)Online publication date: 22-Aug-2024
  • Show More Cited By

Index Terms

  1. A review on performance,security and various biometric template protection schemes for biometric authentication systems
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Please enable JavaScript to view thecomments powered by Disqus.

            Information & Contributors

            Information

            Published In

            cover image Multimedia Tools and Applications
            Multimedia Tools and Applications  Volume 79, Issue 37-38
            Oct 2020
            1586 pages

            Publisher

            Kluwer Academic Publishers

            United States

            Publication History

            Published: 01 October 2020
            Accepted: 08 June 2020
            Revision received: 10 May 2020
            Received: 27 March 2019

            Author Tags

            1. Biometrics
            2. Template protection schemes
            3. Biometric authentication systems

            Qualifiers

            • Research-article

            Contributors

            Other Metrics

            Bibliometrics & Citations

            Bibliometrics

            Article Metrics

            • Downloads (Last 12 months)0
            • Downloads (Last 6 weeks)0
            Reflects downloads up to 04 Oct 2024

            Other Metrics

            Citations

            Cited By

            View all
            • (2024)Hierarchical Perceptual Noise Injection for Social Media Fingerprint Privacy ProtectionIEEE Transactions on Image Processing10.1109/TIP.2024.338177133(2714-2729)Online publication date: 1-Apr-2024
            • (2024)AI-powered biometrics for Internet of Things securityJournal of Information Security and Applications10.1016/j.jisa.2024.10374882:COnline publication date: 1-May-2024
            • (2024)Metaheuristic Algorithms for Enhancing Multicepstral Representation in Voice Spoofing Detection: An Experimental ApproachAdvances in Swarm Intelligence10.1007/978-981-97-7181-3_20(247-262)Online publication date: 22-Aug-2024
            • (2023)Beware the Doppelgänger: Attacks against Adaptive Thresholds in Facial Recognition SystemsProceedings of the 18th International Conference on Availability, Reliability and Security10.1145/3600160.3600179(1-11)Online publication date: 29-Aug-2023
            • (2022)Robust Authentication System with Privacy Preservation of BiometricsSecurity and Communication Networks10.1155/2022/78579752022Online publication date: 1-Jan-2022
            • (2022)Cancelable biometric scheme based on dynamic salting of random patchesMultimedia Tools and Applications10.1007/s11042-022-13764-582:10(14337-14366)Online publication date: 15-Sep-2022
            • (2022)Quantized random projections of SIFT features for cancelable fingerprintsMultimedia Tools and Applications10.1007/s11042-022-13646-w82:5(7917-7937)Online publication date: 15-Aug-2022
            • (2021)A biometric cryptosystem scheme based on random projection and neural networkSoft Computing - A Fusion of Foundations, Methodologies and Applications10.1007/s00500-021-05732-225:11(7657-7670)Online publication date: 1-Jun-2021
            • (2021)Full Quaternion Matrix and Random Projection for Bimodal Face Template ProtectionBiometric Recognition10.1007/978-3-030-86608-2_41(374-383)Online publication date: 10-Sep-2021

            View Options

            View options

            Get Access

            Login options

            Media

            Figures

            Other

            Tables

            Share

            Share

            Share this Publication link

            Share on social media