Journal articles on the topic 'BIOMETRIC CRYPTOSYSTEMS'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'BIOMETRIC CRYPTOSYSTEMS.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Barzut, Srđan, Milan Milosavljević, Saša Adamović, Muzafer Saračević, Nemanja Maček, and Milan Gnjatović. "A Novel Fingerprint Biometric Cryptosystem Based on Convolutional Neural Networks." Mathematics 9, no. 7 (March 28, 2021): 730. http://dx.doi.org/10.3390/math9070730.
Full textSandhya, Mulagala, and Munaga V. N. K. Prasad. "Cancelable Fingerprint Cryptosystem Using Multiple Spiral Curves and Fuzzy Commitment Scheme." International Journal of Pattern Recognition and Artificial Intelligence 31, no. 04 (February 2, 2017): 1756004. http://dx.doi.org/10.1142/s0218001417560043.
Full textRiaz, Naveed, Ayesha Riaz, and Sajid Ali Khan. "Biometric template security: an overview." Sensor Review 38, no. 1 (January 15, 2018): 120–27. http://dx.doi.org/10.1108/sr-07-2017-0131.
Full textZhang, Shuai, Lei Sun, Xiuqing Mao, Cuiyun Hu, and Peiyuan Liu. "Review on EEG-Based Authentication Technology." Computational Intelligence and Neuroscience 2021 (December 24, 2021): 1–20. http://dx.doi.org/10.1155/2021/5229576.
Full textDong, Xingbo, Soohyong Kim, Zhe Jin, Jung Yeon Hwang, Sangrae Cho, and Andrew Beng Jin Teoh. "Secure Chaff-less Fuzzy Vault for Face Identification Systems." ACM Transactions on Multimedia Computing, Communications, and Applications 17, no. 3 (July 22, 2021): 1–22. http://dx.doi.org/10.1145/3442198.
Full textSeo, Minhye, Jong Hwan Park, Youngsam Kim, Sangrae Cho, Dong Hoon Lee, and Jung Yeon Hwang. "Construction of a New Biometric-Based Key Derivation Function and Its Application." Security and Communication Networks 2018 (December 2, 2018): 1–14. http://dx.doi.org/10.1155/2018/6107912.
Full textha. D, shob. "Biometric Cryptosystems: for User Authentication." International Journal of Innovative Research in Computer and Communication Engineering 03, no. 05 (May 30, 2015): 4322–26. http://dx.doi.org/10.15680/ijircce.2015.0305046.
Full textUludag, U., S. Pankanti, S. Prabhakar, and A. K. Jain. "Biometric cryptosystems: issues and challenges." Proceedings of the IEEE 92, no. 6 (June 2004): 948–60. http://dx.doi.org/10.1109/jproc.2004.827372.
Full textLiu, Hailun, Dongmei Sun, Ke Xiong, and Zhengding Qiu. "Palmprint Based Multidimensional Fuzzy Vault Scheme." Scientific World Journal 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/819031.
Full textChai, Tong-Yuen, Bok-Min Goi, Yong-Haur Tay, and and Zhe Jin. "A New Design for Alignment-Free Chaffed Cancelable Iris Key Binding Scheme." Symmetry 11, no. 2 (February 1, 2019): 164. http://dx.doi.org/10.3390/sym11020164.
Full textR, Sreemol, and Kavitha N. "A Review on Different Multi Biometric Cryptosystems." IJARCCE 6, no. 3 (March 30, 2017): 1000–1001. http://dx.doi.org/10.17148/ijarcce.2017.63232.
Full textKumar, Amioy, M. Hanmandlu, and Hari M. Gupta. "A New Scheme for the Polynomial Based Biometric Cryptosystems." ISRN Machine Vision 2014 (April 22, 2014): 1–13. http://dx.doi.org/10.1155/2014/161932.
Full textAftab, Anum, Farrukh Aslam Khan, Muhammad Khurram Khan, Haider Abbas, Waseem Iqbal, and Farhan Riaz. "Hand-based multibiometric systems: state-of-the-art and future challenges." PeerJ Computer Science 7 (October 7, 2021): e707. http://dx.doi.org/10.7717/peerj-cs.707.
Full textMohamed, Heba G. "BioGamal Based Authentication Scheme for Cloud Assisted IoT Based WBAN." European Journal of Electrical Engineering and Computer Science 6, no. 3 (May 26, 2022): 11–18. http://dx.doi.org/10.24018/ejece.2022.6.3.437.
Full textJin, Zhe, Andrew Beng Jin Teoh, Bok-Min Goi, and Yong-Haur Tay. "Biometric cryptosystems: A new biometric key binding and its implementation for fingerprint minutiae-based representation." Pattern Recognition 56 (August 2016): 50–62. http://dx.doi.org/10.1016/j.patcog.2016.02.024.
Full textMcGuffey, Charles, Chen Liu, and Stephanie Schuckers. "Hardware Accelerator Approach Towards Efficient Biometric Cryptosystems for Network Security." Journal of Computing and Information Technology 23, no. 4 (2015): 329. http://dx.doi.org/10.2498/cit.1002764.
Full textMai, Guangcan, Meng-Hui Lim, and Pong C. Yuen. "Binary feature fusion for discriminative and secure multi-biometric cryptosystems." Image and Vision Computing 58 (February 2017): 254–65. http://dx.doi.org/10.1016/j.imavis.2016.11.011.
Full textZhou Qing, Hu Yue, and Liao Xiao-Feng. "A key generation algorithm for biometric cryptosystems based on TD-ERCS." Acta Physica Sinica 58, no. 7 (2009): 4477. http://dx.doi.org/10.7498/aps.58.4477.
Full textJegede, et al. "Cancelable and hybrid biometric cryptosystems: current directions and open research issues." International Journal of ADVANCED AND APPLIED SCIENCES 4, no. 11 (November 2017): 65–77. http://dx.doi.org/10.21833/ijaas.2017.011.010.
Full textEsttaifan, Bashar Adel. "A Modified Vigenère Cipher based on Time and Biometrics features." Journal of Engineering 29, no. 6 (June 1, 2023): 128–39. http://dx.doi.org/10.31026/j.eng.2023.06.10.
Full textSayani Chandra, Sayani Chandra. "Generate an Encryption Key by using Biometric Cryptosystems to secure transferring of Data over a Network." IOSR Journal of Computer Engineering 12, no. 1 (2013): 16–22. http://dx.doi.org/10.9790/0661-1211622.
Full textAnna, Ilyenko, Ilyenko Sergii, and Herasymenko Marharyta. "A Biometric AsymmetricCryptosystem Software Module Based on Convolutional Neural Networks." International Journal of Computer Network and Information Security 13, no. 6 (December 8, 2021): 1–12. http://dx.doi.org/10.5815/ijcnis.2021.06.01.
Full textVasilyev, Vladimir I., Pavel S. Lozhnikov, Alexey E. Sulavko, Grigory A. Fofanov, and Samal S. Zhumazhanova S. "Flexible fast learning neural networks and their application for building highly reliable biometric cryptosystems based on dynamic features." IFAC-PapersOnLine 51, no. 30 (2018): 527–32. http://dx.doi.org/10.1016/j.ifacol.2018.11.272.
Full textBabenko, L. K., O. B. Makarevitch, and E. P. Tumoian. "BIOMETRICAL CRYPTOSYSTEMS. A WAY TO SECURED BIOMETRICS." Vestnik Yuzhnogo nauchnogo tsentra 1, no. 3 (2005): 95–99. http://dx.doi.org/10.23885/1813-4289-2005-1-3-95-99.
Full textAziz, Nur Adibah Saffa. "Mutual Authentication in Body Area Networks (BANs) Using Multi-Biometric and Physiological Signal-Based Key Agreement." Journal of IT in Asia 9, no. 1 (November 30, 2021): 108–20. http://dx.doi.org/10.33736/jita.3847.2021.
Full textLiu, Xiaolong, Wei-Bin Lee, Quy-Anh Bui, Chia-Chen Lin, and Hsiao-Ling Wu. "Biometrics-Based RSA Cryptosystem for Securing Real-Time Communication." Sustainability 10, no. 10 (October 9, 2018): 3588. http://dx.doi.org/10.3390/su10103588.
Full textDamaševičius, Robertas, Rytis Maskeliūnas, Egidijus Kazanavičius, and Marcin Woźniak. "Combining Cryptography with EEG Biometrics." Computational Intelligence and Neuroscience 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/1867548.
Full textLadhiya, Karan. "Privacy Preserving Bio-Metric Authentication." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 114–24. http://dx.doi.org/10.22214/ijraset.2022.40570.
Full textLozhnikov, Pavel, and Samal Zhumazhanova. "Model of the "biometry-code" converter based on artificial neural networks for analysis of facial thermograms." Digital Technology Security, no. 2 (June 25, 2021): 154–65. http://dx.doi.org/10.17212/2782-2230-2021-2-154-165.
Full textChauhan, Alka. "A Development of Fingerprint Based Biometric Cryptosystem." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (June 30, 2022): 4653–75. http://dx.doi.org/10.22214/ijraset.2022.44945.
Full textQin, Ying, and Bob Zhang. "Privacy-Preserving Biometrics Image Encryption and Digital Signature Technique Using Arnold and ElGamal." Applied Sciences 13, no. 14 (July 12, 2023): 8117. http://dx.doi.org/10.3390/app13148117.
Full textJiang, Xing Chen, and Jian De Zheng. "An Indirect Fingerprint Authentication Scheme in Cloud Computing." Applied Mechanics and Materials 484-485 (January 2014): 986–90. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.986.
Full textLai, Yen-Lung, Jung Yeon Hwang, Zhe Jin, Soohyong Kim, Sangrae Cho, and Andrew Beng Jin Teoh. "Symmetric keyring encryption scheme for biometric cryptosystem." Information Sciences 502 (October 2019): 492–509. http://dx.doi.org/10.1016/j.ins.2019.05.064.
Full textBelousova, A. A., V. I. Nobeleva, and N. N. Tokareva. "On codes used in biometrical cryptosystems." Prikladnaya diskretnaya matematika. Prilozhenie, no. 11 (September 1, 2018): 105–6. http://dx.doi.org/10.17223/2226308x/11/32.
Full textChakole, Ashish Vijayanand. "Performance Evaluation of Biometric Cryptosystem Using Fuzzy Vault." International Journal for Research in Applied Science and Engineering Technology V, no. IV (April 26, 2017): 734–38. http://dx.doi.org/10.22214/ijraset.2017.4133.
Full text., J. Lenin, B. Sundaravadivazhagan, and M. Sulthan Ibrahim. "Blending Biometric To Generate Symmetric Key for Cryptosystem." International Journal of Computer Sciences and Engineering 7, no. 4 (April 30, 2019): 220–24. http://dx.doi.org/10.26438/ijcse/v7i4.220224.
Full textLu, Li, and Jialiang Peng. "Finger Multi-biometric Cryptosystem using Feature-Level Fusion." International Journal of Signal Processing, Image Processing and Pattern Recognition 7, no. 3 (June 30, 2014): 223–36. http://dx.doi.org/10.14257/ijsip.2014.7.3.18.
Full textImamverdiyev, Yadigar, Andrew Beng Jin Teoh, and Jaihie Kim. "Biometric cryptosystem based on discretized fingerprint texture descriptors." Expert Systems with Applications 40, no. 5 (April 2013): 1888–901. http://dx.doi.org/10.1016/j.eswa.2012.10.009.
Full textKuznetsov, А. А., R. V. Serhiienko, and A. A. Uvarova. "Code based fuzzy extractor for biometric cryptography." Radiotekhnika, no. 195 (December 28, 2018): 224–34. http://dx.doi.org/10.30837/rt.2018.4.195.23.
Full textItakura, Yukio, and Shigeo Tsujii. "Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures." International Journal of Information Security 4, no. 4 (March 8, 2005): 288–96. http://dx.doi.org/10.1007/s10207-004-0065-5.
Full textAlarcon-Aquino, Vicente, JuanManuel Ramirez-Cortes, Oleg Starostenko, HectorAugusto Garcia-Baleon, and Pilar Gomez-Gil. "Biometric Cryptosystem based on Keystroke Dynamics and K-medoids." IETE Journal of Research 57, no. 4 (2011): 385. http://dx.doi.org/10.4103/0377-2063.86341.
Full textA. Abou Elazm, Lamiaa, Walid El-Shafai, Sameh Ibrahim, Mohamed G. Egila, H. Shawkey, Mohamed K. H. Elsaid, Naglaa F. Soliman, Hussah Nasser AlEisa, and Fathi E. Abd El-Samie. "Efficient Hardware Design of a Secure Cancellable Biometric Cryptosystem." Intelligent Automation & Soft Computing 36, no. 1 (2023): 929–55. http://dx.doi.org/10.32604/iasc.2023.031386.
Full textKannan, S., and V. Seenivasagam. "Structure and Performance Analysis of Multi Stage Biometric Cryptosystem." Research Journal of Information Technology 6, no. 1 (February 1, 2015): 1–7. http://dx.doi.org/10.19026/rjit.6.1636.
Full textRajan, R. Ashoka, and P. Kumaran. "Multi-biometric cryptosystem using graph for secure cloud authentication." Journal of Intelligent & Fuzzy Systems 38, no. 5 (May 29, 2020): 6437–44. http://dx.doi.org/10.3233/jifs-179724.
Full textNagar, Abhishek, Karthik Nandakumar, and Anil K. Jain. "A hybrid biometric cryptosystem for securing fingerprint minutiae templates." Pattern Recognition Letters 31, no. 8 (June 2010): 733–41. http://dx.doi.org/10.1016/j.patrec.2009.07.003.
Full textMaiorana, Emanuele. "Biometric cryptosystem using function based on-line signature recognition." Expert Systems with Applications 37, no. 4 (April 2010): 3454–61. http://dx.doi.org/10.1016/j.eswa.2009.10.043.
Full textAli, Rifaqat, and Arup Kumar Pal. "A Secure and Robust Three-Factor Based Authentication Scheme Using RSA Cryptosystem." International Journal of Business Data Communications and Networking 13, no. 1 (January 2017): 74–84. http://dx.doi.org/10.4018/ijbdcn.2017010107.
Full textLalithamani, N., and M. Sabrigiriraj. "Technique to generate face and palm vein-based fuzzy vault for multi-biometric cryptosystem." Machine Graphics and Vision 23, no. 1/2 (January 14, 2012): 97–114. http://dx.doi.org/10.22630/mgv.2014.23.1.6.
Full textPrasanalakshmi, B., A. Kannammal, B. Gomathi, K. Deepa, and R. Sridevi. "Biometric Cryptosystem Involving Two Traits And Palm Vein As Key." Procedia Engineering 30 (2012): 303–10. http://dx.doi.org/10.1016/j.proeng.2012.01.865.
Full textChanukya, Padira S. V. V. N., and T. K. Thivakaran. "Multimodal biometric cryptosystem for human authentication using fingerprint and ear." Multimedia Tools and Applications 79, no. 1-2 (September 7, 2019): 659–73. http://dx.doi.org/10.1007/s11042-019-08123-w.
Full text