In the existing cancellable finger vein template protection schemes, the original biometric features cannot be well protected, which results in poor security. In addition, the performance of matching recognition performances after generating a cancellable template is poor. Therefore, a dual hashing index cancellable finger vein template protection based on Gaussian random mapping is proposed in this study. The scheme is divided into an enrollment stage and a verification stage. In the two stages, symmetric data encryption technology was used to generate encryption templates for matching. In the enrollment stage, first, the extracted finger vein features were duplicated to obtain an extended feature vector; then, this extended vector was uni...
Biometric analysis for identifying verification is becoming a widespread reality. It is a very chall...
Abstract: In recent years, the interest in human authentication has been increasing. Biometrics are ...
Abstract: Biometric based authentication systems are being prominently used everywhere. The biometr...
Biometrics has nowadays become a preferred solution for systems requiring secure authentication. How...
Cancelable biometric schemes have emerged as a promising approach for providing robust security guar...
Biometrics has become a widely accepted solution for secure user authentication. However, the use of...
Cancelable biometrics, a template transformation approach, attempts to provide robustness for authen...
© 2020 Elsevier Ltd Biometric template data protection is critical in preventing user privacy and id...
This chapter contributes towards advancing finger vein template protection research by presenting th...
AbstractWide spread use of biometric based authentication implies the need to secure biometric refer...
With the emergence and extensive deployment of biometric based user authentication system, ensuring ...
When biometric recognition is used for identification or verification it is important to assure the ...
The aim of this paper is to protect the information in database by combining two different fingerpri...
Biometrics is widely used in access control systems, but it has a serious drawback in case of steali...
Two-factor cncellable biometrics use tokenized random number as an external factor, however, tokeniz...
Biometric analysis for identifying verification is becoming a widespread reality. It is a very chall...
Abstract: In recent years, the interest in human authentication has been increasing. Biometrics are ...
Abstract: Biometric based authentication systems are being prominently used everywhere. The biometr...
Biometrics has nowadays become a preferred solution for systems requiring secure authentication. How...
Cancelable biometric schemes have emerged as a promising approach for providing robust security guar...
Biometrics has become a widely accepted solution for secure user authentication. However, the use of...
Cancelable biometrics, a template transformation approach, attempts to provide robustness for authen...
© 2020 Elsevier Ltd Biometric template data protection is critical in preventing user privacy and id...
This chapter contributes towards advancing finger vein template protection research by presenting th...
AbstractWide spread use of biometric based authentication implies the need to secure biometric refer...
With the emergence and extensive deployment of biometric based user authentication system, ensuring ...
When biometric recognition is used for identification or verification it is important to assure the ...
The aim of this paper is to protect the information in database by combining two different fingerpri...
Biometrics is widely used in access control systems, but it has a serious drawback in case of steali...
Two-factor cncellable biometrics use tokenized random number as an external factor, however, tokeniz...
Biometric analysis for identifying verification is becoming a widespread reality. It is a very chall...
Abstract: In recent years, the interest in human authentication has been increasing. Biometrics are ...
Abstract: Biometric based authentication systems are being prominently used everywhere. The biometr...