Biometric key generation using pseudo-signatures (original) (raw)

Modified Private Key Generation for Biometric Signatures

Yakoob Siyal

2001

View PDFchevron_right

On Soft Biometrics

Paulo Correia

Pattern Recognition Letters, 2015

View PDFchevron_right

Biometric System Verification Close to “Real World” Conditions

Guillermo Gonzalez

Lecture Notes in Computer Science, 2009

View PDFchevron_right

Efficient cancellable biometric key generation scheme for cryptography

Dr Sunil V K Gaddam, Manohar Lal

2010

View PDFchevron_right

Amended Biometric Authentication using Secret Sharing

SONALI PATIL

International Journal of Computer Applications, 2014

View PDFchevron_right

Intelligent Biometric System

Anupam Shukla

Journal of Information Technology Research, 2008

View PDFchevron_right

A Biometric Identification Course for eSience Virtual Lab

mostefai messaoud

Lecture Notes on Software Engineering, 2014

View PDFchevron_right

An Overview on Privacy Preserving Biometrics

rima belguechi

Recent Application in Biometrics, 2011

View PDFchevron_right

Secure biometric template generation for multi-factor authentication

Mudassar Farooq

Pattern Recognition, 2015

View PDFchevron_right

Safeguarding the Transmission of Biometric Measurements Used for Authenticating Individuals

Ernst Leiss

Springer eBooks, 2007

View PDFchevron_right

Biometric Evolution of Space

Paul Bavister

2023

View PDFchevron_right

Biometric technologies and their perception by the common citizen

Vítor J Sá

International Journal of Electronic Security and Digital Forensics, 2012

View PDFchevron_right

Intricacies of Secured Multi-Biometric System

Emmanuel Chinweuba Nwani

TEXILA INTERNATIONAL JOURNAL OF ACADEMIC RESEARCH, 2017

View PDFchevron_right

Privacy preserving security using biometrics in cloud computing

amit singh

Multimedia Tools and Applications, 2017

View PDFchevron_right

Biometric authentication in relation to payment systems and ATMs

Gerik von Graevenitz

Datenschutz und Datensicherheit - DuD, 2007

View PDFchevron_right

Analog approach to analysis and modeling of biometric information

Alexei Nikitin

View PDFchevron_right

Privacy-preserving fingercode authentication

D. Catalano

2010

View PDFchevron_right

Audio-Visual Biometrics and Forgery

Hanna Greige

Advanced Biometric Technologies, 2011

View PDFchevron_right

Basic on-line handwritten signature features for personal biometric authentication

Petra Grd

2011

View PDFchevron_right

Quality Measures in Biometric Systems

Fernando Alonso-Fernandez

IEEE Security & Privacy, 2011

View PDFchevron_right

Security Mechanisms and Access Control Infrastructure for Biometrics Passport using Cryptographic Protocols

Javier Lopez

International Journal of Intelligent Systems and Applications

View PDFchevron_right

Identity – Africa – Biometrics

Marcin Senko

African Journal of Economics, Politics and Social Studies., 2023

View PDFchevron_right

A Novel Biometric Approach for Authentication In Pervasive Computing Environments

Dr. D. H. Rao

Advanced Computational Intelligence: An International Journal (ACII), 2016

View PDFchevron_right

ICDAR 2021 Competition on On-Line Signature Verification

felix ahumada

Document Analysis and Recognition – ICDAR 2021, 2021

View PDFchevron_right

Secure speech biometric templates for user authentication

Daniel Lopresti

IET Biometrics, 2012

View PDFchevron_right

A novel crypto-biometric scheme for establishing secure communication sessions between two clients

Dijana Petrovska-delacrétaz

2012

View PDFchevron_right

HANDBOOK of APPLIED CRYPTOGRAPHY

Guilherme Morais

View PDFchevron_right

Cancelable Biometric Template Generation Using Random Feature Vector Transformations

Tony Thomas

IEEE access, 2024

View PDFchevron_right

Fuzzy evaluation of biometric authentication systems

Arkadiusz Banasik

Proceedings of the 6th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems, 2011

View PDFchevron_right

Establishing User Authentication using Face Geometry

GAUTAM Sanyal

International Journal of Computer Applications, 2014

View PDFchevron_right

Cryptographic Authentication from the Iris

James Steel

Lecture Notes in Computer Science, 2019

View PDFchevron_right

On fingerprint template synthesis

Xudong Jiang

2000

View PDFchevron_right

Personal Verification System Using ID Card and Face Photo

Pattarawit Polpinit

International Journal of Machine Learning and Computing, 2019

View PDFchevron_right

Biometric Template Security based on Watermarking

Gaurav Bhatnagar

Procedia Computer Science, 2010

View PDFchevron_right

On Hunting Animals of the Biometric Menagerie for Online Signature

Sonia Garcia-salicetti

PLOS ONE, 2016

View PDFchevron_right