Articles with "preserving biometric" as a keyword



Photo by dtopkin1 from unsplash

Privacy preserving biometric authentication using Chaos on remote untrusted server

Sign Up to like & get
recommendations!
Published in 2021 at "Measurement"

DOI: 10.1016/j.measurement.2021.109257

Abstract: Abstract Biometric-based authentication systems are promising because of unique biometric features for each person. Generally, biometric features are generated , and biometric templates or bio-hash codes are calculated and stored in Authentication Data Table (ADT)… read more here.

Keywords: authentication; privacy preserving; untrusted server; based authentication ... See more keywords
Photo from wikipedia

Attacks and Countermeasures on Privacy-Preserving Biometric Authentication Schemes

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2022.3162623

Abstract: Based on the Threshold Predicate Encryption (TPE), the biometric authentication scheme PassBio aims to correctly authenticate genuine end-users without leaking their biometric privacy information. However, this article proposes two impersonation attacks to PassBio by merely… read more here.

Keywords: authentication; biometric authentication; countermeasures privacy; privacy preserving ... See more keywords
Photo by lensingmyworld from unsplash

A novel privacy-preserving biometric authentication scheme

Sign Up to like & get
recommendations!
Published in 2023 at "PLOS ONE"

DOI: 10.1371/journal.pone.0286215

Abstract: Most existing secure biometric authentication schemes are server-centric, and users must fully trust the server to store, process, and manage their biometric data. As a result, users’ biometric data could be leaked by outside attackers… read more here.

Keywords: authentication; authentication scheme; biometric authentication; privacy preserving ... See more keywords