Journal articles on the topic 'Biometric information protection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Biometric information protection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Lee, Boo-Ha, and Shin-Uk Park. "Legislative Policy Consideration for Reinforcement of Biometrics Protection." LAW RESEARCH INSTITUTE CHUNGBUK NATIONAL UNIVERSITY 13, no. 1 (June 30, 2022): 171–98. http://dx.doi.org/10.34267/cbstl.2022.13.1.171.
Teng, Jackson Horlick, Thian Song Ong, Kalaiarasi S. M. A., and Connie Tee. "Finger Vein Template Protection with Directional Bloom Filter." HighTech and Innovation Journal 4, no. 2 (June 1, 2023): 412–33. http://dx.doi.org/10.28991/hij-2023-04-02-013.
Taha, Mohammed A., and Hanaa M. Ahmed. "A fuzzy vault development based on iris images." EUREKA: Physics and Engineering, no. 5 (September 13, 2021): 3–12. http://dx.doi.org/10.21303/2461-4262.2021.001997.
Kim, Younjin, and Ilhwan Kim. "Study on the Protection of the Right to Self-Determination of Personal Information with the Development of Facial Recognition Technology." Korean Constitutional Law Association 28, no. 4 (December 30, 2022): 535–82. http://dx.doi.org/10.35901/kjcl.2022.28.4.535.
Shin, Yong-Nyuo, Yong-Jun Lee, and Myung-Geun Chun. "Biometric Template Security for Personal Information Protection." Journal of Korean Institute of Intelligent Systems 18, no. 4 (August 25, 2008): 437–44. http://dx.doi.org/10.5391/jkiis.2008.18.4.437.
Lee, Yong-Joon, and Won-Shik Na. "E-Passport Advanced Security Technique Using Biometric Information Watermarking." Journal of Computational and Theoretical Nanoscience 18, no. 5 (May 1, 2021): 1540–49. http://dx.doi.org/10.1166/jctn.2021.9614.
Lee, Yong-Joon, and Won-Shik Na. "E-Passport Advanced Security Technique Using Biometric Information Watermarking." Journal of Computational and Theoretical Nanoscience 18, no. 5 (May 1, 2021): 1540–49. http://dx.doi.org/10.1166/jctn.2021.9614.
Sulavko, Alexey. "Highly reliable authentication based on handwritten passwords using hybrid neural networks with protection of biometric templates from being compromised." Information and Control Systems, no. 4 (August 24, 2020): 61–77. http://dx.doi.org/10.31799/1684-8853-2020-4-61-77.
Punithavathi, P., and S. Geetha. "Random Projection-based Cancelable Template Generation for Sparsely Distributed Biometric Patterns." Indonesian Journal of Electrical Engineering and Computer Science 7, no. 3 (September 1, 2017): 877. http://dx.doi.org/10.11591/ijeecs.v7.i3.pp877-886.
Ma, Ruoxue. "Legislative Conception for the Special Protection of Biometric Information: A Study Based on Extraterritorial Experience." Lecture Notes in Education Psychology and Public Media 10, no. 1 (September 14, 2023): 220–28. http://dx.doi.org/10.54254/2753-7048/10/20230195.
Joyce, S., and S. Veni. "Iris Biometric Watermarking for Authentication Using Multiband Discrete Wavelet Transform and Singular-Value Decomposition." International journal of electrical and computer engineering systems 14, no. 3 (March 28, 2023): 259–66. http://dx.doi.org/10.32985/ijeces.14.3.3.
Arutyunov, V. V., and N. S. Natkin. "Comparative analysis of biometric systems for information protection." Scientific and Technical Information Processing 37, no. 2 (April 2010): 87–93. http://dx.doi.org/10.3103/s0147688210020012.
Tot, Ivan, Jovan Bajčetić, Boriša Jovanović, Mladen Trikoš, Dušan Bogićević, and Tamara Gajić. "Biometric standards and methods." Vojnotehnicki glasnik 69, no. 4 (2021): 963–77. http://dx.doi.org/10.5937/vojtehg69-32296.
Kumaran, P., R. Ashoka Rajan, T. Veeramani, and R. Thilagavathy. "Template Protection Using Multi Biometric Web Modulo Graph." Journal of Computational and Theoretical Nanoscience 16, no. 11 (November 1, 2019): 4883–88. http://dx.doi.org/10.1166/jctn.2019.8400.
Voznyi, Yaroslav, Mariia Nazarkevych, Volodymyr Hrytsyk, Nataliia Lotoshynska, and Bohdana Havrysh. "DESIGN OF BIOMETRIC PROTECTION AUTHENTIFICATION SYSTEM BASED ON K-AVERAGE METHOD." Cybersecurity: Education, Science, Technique 12, no. 4 (June 24, 2021): 85–95. http://dx.doi.org/10.28925/2663-4023.2021.12.8595.
Yang, Wencheng, Song Wang, Jiankun Hu, Ahmed Ibrahim, Guanglou Zheng, Marcelo Jose Macedo, Michael N. Johnstone, and Craig Valli. "A Cancelable Iris- and Steganography-Based User Authentication System for the Internet of Things." Sensors 19, no. 13 (July 6, 2019): 2985. http://dx.doi.org/10.3390/s19132985.
Astrakhantsev, Andrii, and Galyna Liashenko. "Data protection management process during remote biometric authentication." System research and information technologies, no. 3 (October 30, 2022): 71–85. http://dx.doi.org/10.20535/srit.2308-8893.2022.3.05.
Bisogni, Carmen, Lucia Cascone, and Fabio Narducci. "Periocular Data Fusion for Age and Gender Classification." Journal of Imaging 8, no. 11 (November 9, 2022): 307. http://dx.doi.org/10.3390/jimaging8110307.
Shin, Yong-Nyuo, and Myung-Geun Chun. "Personal Information Protection for Biometric Verification based TeleHealth Services." Journal of Korean Institute of Intelligent Systems 20, no. 5 (October 25, 2010): 659–64. http://dx.doi.org/10.5391/jkiis.2010.20.5.659.
Liu, Yue. "Property rights for biometric information – a protection measure?" International Journal of Private Law 2, no. 3 (2009): 244. http://dx.doi.org/10.1504/ijpl.2009.024141.
Utegen, D., and B. Zh Rakhmetov. "Facial Recognition Technology and Ensuring Security of Biometric Data: Comparative Analysis of Legal Regulation Models." Journal of Digital Technologies and Law 1, no. 3 (August 20, 2023): 825–44. http://dx.doi.org/10.21202/jdtl.2023.36.
KOPCZEWSKI, Marian, and Tomasz SMAL. "POSSIBILITIES FOR THE USE OF BIOMETRIC DATA IN SECURITY SYSTEMS." Journal of Science of the Gen. Tadeusz Kosciuszko Military Academy of Land Forces 186, no. 4 (October 2, 2017): 168–79. http://dx.doi.org/10.5604/01.3001.0010.7226.
Patil, Sonali D., Roshani Raut, Rutvij H. Jhaveri, Tariq Ahamed Ahanger, Pallavi V. Dhade, Atul B. Kathole, and Kapil N. Vhatkar. "Robust Authentication System with Privacy Preservation of Biometrics." Security and Communication Networks 2022 (May 2, 2022): 1–14. http://dx.doi.org/10.1155/2022/7857975.
Shi, Quan. "Guardians of Privacy: Understanding the European Union's Framework for Biometric Data Protection." International Journal of Biology and Life Sciences 3, no. 1 (May 30, 2023): 59–61. http://dx.doi.org/10.54097/ijbls.v3i1.9669.
S. Jahromi, Mohammad N., Pau Buch-Cardona, Egils Avots, Kamal Nasrollahi, Sergio Escalera, Thomas B. Moeslund, and Gholamreza Anbarjafari. "Privacy-Constrained Biometric System for Non-Cooperative Users." Entropy 21, no. 11 (October 24, 2019): 1033. http://dx.doi.org/10.3390/e21111033.
Kim, Jun Hwan, Woon-Kyung Song, and Hyun Cheol Lee. "Exploring the Determinants of Travelers’ Intention to Use the Airport Biometric System: A Korean Case Study." Sustainability 15, no. 19 (September 24, 2023): 14129. http://dx.doi.org/10.3390/su151914129.
Mohan, Mamtha, and B. K. Sujatha. "A Tenable Approach for Protection of Electronic Medical Records Using Thermal Image Watermarking." International Journal of Biomedical and Clinical Engineering 6, no. 2 (July 2017): 46–61. http://dx.doi.org/10.4018/ijbce.2017070104.
Zhao, Dongdong, Shu Fang, Jianwen Xiang, Jing Tian, and Shengwu Xiong. "Iris Template Protection Based on Local Ranking." Security and Communication Networks 2018 (2018): 1–9. http://dx.doi.org/10.1155/2018/4519548.
Loboda, Dmitriy I. "Protection of biometric information in the framework of aviation security procedures." Herald of the Azerbaijan Engineering Academy 14, no. 4 (2022): 21–28. http://dx.doi.org/10.52171/2076-0515_2022_14_04_21_28.
NI, YIN, and LING YE. "Legal Protection Dilemma and Countermeasures of Chinese consumers" Personal Biometric Information." Dong-A Journal of International Business Transactions Law 39 (October 31, 2022): 105–34. http://dx.doi.org/10.31839/ibt.2022.10.39.105.
Hayat Al-Dmour, Et al. "Enhancing Biometric Security: A Framework for Detecting and Preventing False Identification." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (November 5, 2023): 3681–90. http://dx.doi.org/10.17762/ijritcc.v11i9.9591.
王, 丹. "Research on the Special Protection Mechanism of Biometric Information in the Implementation of the Personal Information Protection Law." Open Journal of Legal Science 12, no. 05 (2024): 2956–63. http://dx.doi.org/10.12677/ojls.2024.125421.
Gomez-Barrero, Marta, Christian Rathgeb, Guoqiang Li, Raghavendra Ramachandra, Javier Galbally, and Christoph Busch. "Multi-biometric template protection based on bloom filters." Information Fusion 42 (July 2018): 37–50. http://dx.doi.org/10.1016/j.inffus.2017.10.003.
Gazina, Nayana Igorevna. "International and National Legal Approaches to the Protection of Genetic Information." Международное право, no. 4 (April 2022): 49–59. http://dx.doi.org/10.25136/2644-5514.2022.4.39236.
Hameed Yassir, Mohammed Ali, Rudzidatul Akmam Dziyauddin, Norshaliza Kamaruddin, and Norulhusna Ahmad. "A standard ranking algorithm for robust iris template protection." Indonesian Journal of Electrical Engineering and Computer Science 34, no. 2 (May 1, 2024): 1214. http://dx.doi.org/10.11591/ijeecs.v34.i2.pp1214-1225.
Hu, Jian Feng, and Zhen Dong Mu. "Authentication System for Biometric Applications Using Mobile Devices." Applied Mechanics and Materials 457-458 (October 2013): 1224–27. http://dx.doi.org/10.4028/www.scientific.net/amm.457-458.1224.
Feilu Hang, Et al. "Design Of Intelligent Countermeasure System for Power System Network Security Defense." Journal of Electrical Systems 19, no. 4 (January 25, 2024): 227–40. http://dx.doi.org/10.52783/jes.635.
Potocký, Sebastián, and Jozef Štulrajter. "The Human Interface Device (HID) Attack on Android Lock Screen Non-Biometric Protections and Its Computational Complexity." Science & Military 17, no. 1 (2022): 29–36. http://dx.doi.org/10.52651/sam.a.2022.1.29-36.
Ren, Lijing, and Denghui Zhang. "A Privacy-Preserving Biometric Recognition System with Visual Cryptography." Advances in Multimedia 2022 (March 22, 2022): 1–7. http://dx.doi.org/10.1155/2022/1057114.
Kuznetsov, A. A. "Legal Basis of Biometric Methods of Identity Authentication." Economics. Law. Innovaion, no. 1 (March 30, 2021): 85–90. http://dx.doi.org/10.17586/2713-1874-2021-1-85-90.
Zannou, Boris Jerson, Tahirou Djara, and Antoine Vianou. "Cylindrical Curve for Contactless Fingerprint Template Securisation." International Journal of Information Security and Privacy 16, no. 1 (January 1, 2022): 1–28. http://dx.doi.org/10.4018/ijisp.303664.
Zhongyu, Yin, and Yang Zihan. "Research on Legal Protection of Biometric Information in the Era of Web3.0." Progress in Social Sciences 6, no. 2 (2024): 179–89. http://dx.doi.org/10.35534/pss.0602015.
Yugai, Lyudmila. "ON THE ISSUE OF ENSURING BIOMETRIC DATA SECURITY DURING THE PERIOD OF THE DIGITALIZATION OF SOCIETY." Review of Law Sciences 5, no. 3 (November 24, 2021): 63–74. http://dx.doi.org/10.51788/tsul.rols.2021.5.3./avtc7994.
Hernández-Álvarez, Luis, José María de Fuentes, Lorena González-Manzano, and Luis Hernández Encinas. "Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review." Sensors 21, no. 1 (December 25, 2020): 92. http://dx.doi.org/10.3390/s21010092.
Hölbl, Marko, Boštjan Kežmah, and Marko Kompara. "Data Protection Heterogeneity in the European Union." Applied Sciences 11, no. 22 (November 18, 2021): 10912. http://dx.doi.org/10.3390/app112210912.
Kupiec, Mateusz. "Protection of Students’ Personal Data in Times of Development of Biometric Technologies as a Challenge for Universities in Poland." Białostockie Studia Prawnicze 25, no. 4 (December 1, 2020): 85–95. http://dx.doi.org/10.15290/bsp.2020.25.04.06.
Guo, Chunjie, Lin You, and Gengran Hu. "A Novel Biometric Identification Scheme Based on Zero-Knowledge Succinct Noninteractive Argument of Knowledge." Security and Communication Networks 2022 (September 13, 2022): 1–13. http://dx.doi.org/10.1155/2022/2791058.
Krausová, Alžběta. "Online Behavior Recognition: Can We Consider It Biometric Data under GDPR?" Masaryk University Journal of Law and Technology 12, no. 2 (September 17, 2018): 161–78. http://dx.doi.org/10.5817/mujlt2018-2-3.
Kuznetsov, A. A., and D. O. Zakharov. "Deep learning-based models’ application to generating a cryptographic key from a face image." Radiotekhnika, no. 213 (June 16, 2023): 31–40. http://dx.doi.org/10.30837/rt.2023.2.213.03.
Gunasekaran, Elavarasi, and Vanitha Muthuraman. "Light Weight Cryptography Based Encrypted Multiple Secret Share Creation for Biometrics Images." Journal of Computational and Theoretical Nanoscience 17, no. 12 (December 1, 2020): 5469–76. http://dx.doi.org/10.1166/jctn.2020.9441.