Academic literature on the topic 'BIOMETRIC CRYPTOSYSTEMS'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'BIOMETRIC CRYPTOSYSTEMS.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "BIOMETRIC CRYPTOSYSTEMS"
Barzut, Srđan, Milan Milosavljević, Saša Adamović, Muzafer Saračević, Nemanja Maček, and Milan Gnjatović. "A Novel Fingerprint Biometric Cryptosystem Based on Convolutional Neural Networks." Mathematics 9, no. 7 (March 28, 2021): 730. http://dx.doi.org/10.3390/math9070730.
Full textSandhya, Mulagala, and Munaga V. N. K. Prasad. "Cancelable Fingerprint Cryptosystem Using Multiple Spiral Curves and Fuzzy Commitment Scheme." International Journal of Pattern Recognition and Artificial Intelligence 31, no. 04 (February 2, 2017): 1756004. http://dx.doi.org/10.1142/s0218001417560043.
Full textRiaz, Naveed, Ayesha Riaz, and Sajid Ali Khan. "Biometric template security: an overview." Sensor Review 38, no. 1 (January 15, 2018): 120–27. http://dx.doi.org/10.1108/sr-07-2017-0131.
Full textZhang, Shuai, Lei Sun, Xiuqing Mao, Cuiyun Hu, and Peiyuan Liu. "Review on EEG-Based Authentication Technology." Computational Intelligence and Neuroscience 2021 (December 24, 2021): 1–20. http://dx.doi.org/10.1155/2021/5229576.
Full textDong, Xingbo, Soohyong Kim, Zhe Jin, Jung Yeon Hwang, Sangrae Cho, and Andrew Beng Jin Teoh. "Secure Chaff-less Fuzzy Vault for Face Identification Systems." ACM Transactions on Multimedia Computing, Communications, and Applications 17, no. 3 (July 22, 2021): 1–22. http://dx.doi.org/10.1145/3442198.
Full textSeo, Minhye, Jong Hwan Park, Youngsam Kim, Sangrae Cho, Dong Hoon Lee, and Jung Yeon Hwang. "Construction of a New Biometric-Based Key Derivation Function and Its Application." Security and Communication Networks 2018 (December 2, 2018): 1–14. http://dx.doi.org/10.1155/2018/6107912.
Full textha. D, shob. "Biometric Cryptosystems: for User Authentication." International Journal of Innovative Research in Computer and Communication Engineering 03, no. 05 (May 30, 2015): 4322–26. http://dx.doi.org/10.15680/ijircce.2015.0305046.
Full textUludag, U., S. Pankanti, S. Prabhakar, and A. K. Jain. "Biometric cryptosystems: issues and challenges." Proceedings of the IEEE 92, no. 6 (June 2004): 948–60. http://dx.doi.org/10.1109/jproc.2004.827372.
Full textLiu, Hailun, Dongmei Sun, Ke Xiong, and Zhengding Qiu. "Palmprint Based Multidimensional Fuzzy Vault Scheme." Scientific World Journal 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/819031.
Full textChai, Tong-Yuen, Bok-Min Goi, Yong-Haur Tay, and and Zhe Jin. "A New Design for Alignment-Free Chaffed Cancelable Iris Key Binding Scheme." Symmetry 11, no. 2 (February 1, 2019): 164. http://dx.doi.org/10.3390/sym11020164.
Full textDissertations / Theses on the topic "BIOMETRIC CRYPTOSYSTEMS"
Sarıer, Deniz Neyire [Verfasser]. "Biometric Cryptosystems : Authentication, Encryption and Signature for Biometric Identities [[Elektronische Ressource]] / Neyire Deniz Sarıer." Bonn : Universitäts- und Landesbibliothek Bonn, 2013. http://d-nb.info/1044870044/34.
Full textHarmer, Karl. "Evaluation of candidate fingerprint features for employment within template-free biometric cryptosystems." Thesis, University of Kent, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.509621.
Full textASTHANA, RAJESH KUMAR. "DEVELOPMENT OF EFFICIENT METHODS FOR BIOMETRIC CRYPTOSYSTEMS." Thesis, 2021. http://dspace.dtu.ac.in:8080/jspui/handle/repository/18919.
Full textBhateja, Ashok Kumar. "Biometrics based cryptosystem." Thesis, 2017. http://localhost:8080/xmlui/handle/12345678/7436.
Full textBook chapters on the topic "BIOMETRIC CRYPTOSYSTEMS"
Rathgeb, Christian, Andreas Uhl, and Peter Wild. "Iris Biometric Cryptosystems." In Advances in Information Security, 203–22. New York, NY: Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5571-4_11.
Full textLafkih, Maryam, Mounia Mikram, Sanaa Ghouzali, and Mohamed El Haziti. "Security Analysis of Key Binding Biometric Cryptosystems." In Lecture Notes in Computer Science, 269–81. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31254-0_31.
Full textSuthaharan, Shan. "Enhanced Accuracy Moment Invariants for Biometric Recognition and Cryptosystems." In Lecture Notes in Computer Science, 439–50. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02611-9_44.
Full textLutsenko, Maria, Alexandr Kuznetsov, Anastasiia Kiian, Oleksii Smirnov, and Tetiana Kuznetsova. "Biometric Cryptosystems: Overview, State-of-the-Art and Perspective Directions." In Advances in Information and Communication Technology and Systems, 66–84. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58359-0_5.
Full textKholmatov, Alisher, and Berrin Yanikoglu. "Biometric Cryptosystem Using Online Signatures." In Computer and Information Sciences – ISCIS 2006, 981–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11902140_102.
Full textZhang, Long, Zhenan Sun, Tieniu Tan, and Shungeng Hu. "Robust Biometric Key Extraction Based on Iris Cryptosystem." In Advances in Biometrics, 1060–69. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01793-3_107.
Full textHeena, Patel, Paunwala Chirag, and Vora Aarohi. "Wavelet Based Feature Level Fusion Approach for Multi-biometric Cryptosystem." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 264–73. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-73712-6_28.
Full textBringer, Julien, Hervé Chabanne, Malika Izabachène, David Pointcheval, Qiang Tang, and Sébastien Zimmer. "An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication." In Information Security and Privacy, 96–106. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73458-1_8.
Full textBuhan, Ileana, Jeroen Breebaart, Jorge Guajardo, Koen de Groot, Emile Kelkboom, and Ton Akkermans. "A Quantitative Analysis of Indistinguishability for a Continuous Domain Biometric Cryptosystem." In Data Privacy Management and Autonomous Spontaneous Security, 78–92. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11207-2_7.
Full textShi, Jinyang, and Kwok-Yan Lam. "MinuCode: A Fixed-Value Representation of Fingerprint Minutiae for Biometric Cryptosystem." In Advances in Information Security and Assurance, 382–91. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02617-1_39.
Full textConference papers on the topic "BIOMETRIC CRYPTOSYSTEMS"
Lafkih, Maryam. "Cracking Biometric Authentication Cryptosystems." In 15th International Conference on Computer Vision Theory and Applications. SCITEPRESS - Science and Technology Publications, 2020. http://dx.doi.org/10.5220/0009169405140522.
Full textYu Zhou, Bo Zhao, Jin Han, and Jun Zheng. "An effective scheme for biometric cryptosystems." In 2016 2nd IEEE International Conference on Computer and Communications (ICCC). IEEE, 2016. http://dx.doi.org/10.1109/compcomm.2016.7924701.
Full textKarimovich, Ganiyev Salim, and Khudoykulov Zarif Turakulovich. "Biometric cryptosystems: Open issues and challenges." In 2016 International Conference on Information Science and Communications Technologies (ICISCT). IEEE, 2016. http://dx.doi.org/10.1109/icisct.2016.7777408.
Full textMai, Guangcan, Meng-Hui Lim, and Pong C. Yuen. "Fusing binary templates for multi-biometric cryptosystems." In 2015 IEEE 7th International Conference on Biometrics Theory, Applications and Systems (BTAS). IEEE, 2015. http://dx.doi.org/10.1109/btas.2015.7358764.
Full textMcGuffey, Charles, and Chen Liu. "Multi-core Approach towards Efficient Biometric Cryptosystems." In 2015 44th International Conference on Parallel Processing Workshops (ICPPW). IEEE, 2015. http://dx.doi.org/10.1109/icppw.2015.16.
Full textMaiorana, Emanuele, Daria La Rocca, and Patrizio Campisi. "Cognitive biometric cryptosystems a case study on EEG." In 2015 International Conference on Systems, Signals and Image Processing (IWSSIP). IEEE, 2015. http://dx.doi.org/10.1109/iwssip.2015.7314193.
Full textLafkih, Maryam, Mounia Mikram, Sanaa Ghouzali, Mohamed El Haziti, and Driss Aboutajdine. "Biometric cryptosystems based Fuzzy Vault approach: Security analysis." In 2012 Second International Conference on Innovative Computing Technology (INTECH). IEEE, 2012. http://dx.doi.org/10.1109/intech.2012.6457803.
Full textRanjan, R., and S. K. Singh. "Improved and innovative key generation algorithms for biometric cryptosystems." In 2013 3rd IEEE International Advanced Computing Conference (IACC 2013). IEEE, 2013. http://dx.doi.org/10.1109/iadcc.2013.6514353.
Full textHashem, Mithak Ibrahim, and Kadhim Alibraheemi. "Literature Survey: Biometric Cryptosystems Based on Fingerprint Processing Techniques." In 2022 International Conference on Data Science and Intelligent Computing (ICDSIC). IEEE, 2022. http://dx.doi.org/10.1109/icdsic56987.2022.10076184.
Full textArrahmah, Annisa Istiqomah, Yudi Satria Gondokaryono, and Kyung-Hyune Rhee. "Fast non-random chaff point generator for fuzzy vault biometric cryptosystems." In 2016 6th International Conference on System Engineering and Technology (ICSET). IEEE, 2016. http://dx.doi.org/10.1109/icsengt.2016.7849650.
Full text