A secure and privacy preserving iris biometric authentication scheme with matrix transformation
Biometric authentication is the use of unique human features to provide secure, reliable, friendly and convenient access to an environment or a computer installation. However, the use of biometrics as a means of authentication exposes legitimate users to security threats, privacy attacks and loss of...
| Main Authors: | Udzir, Nur Izura, Abdullah, Azizol, Mahmod, Ramlan |
|---|---|
| Other Authors: | Choi, Dooho |
| Format: | Book Section |
| Language: | English |
| Published: |
Springer International Publishing
2017
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/63007/ http://psasir.upm.edu.my/id/eprint/63007/1/A%20secure%20and%20privacy%20preserving%20iris%20biometric%20authentication%20scheme%20with%20matrix%20transformation.pdf |
Similar Items
Modified shielding function for multi-biometric authentication and template protection
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
State of the art in biometric key binding and key generation schemes
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
Modified shielding function for multi-biometric authentication and template protection / Abayomi Jegede ... [et al.]
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
Privacy levels for computer forensics: toward a more efficient
privacy-preserving investigation
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015)
Revocable and non-invertible multibiometric template protection based on matrix transformation
by: Jegede, Abayomi, et al.
Published: (2018)
by: Jegede, Abayomi, et al.
Published: (2018)
A secured and efficient multi-factor biometric authentication scheme using plan recognition technique
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2016)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2016)
Cancelable and hybrid biometric cryptosystems: current directions and open research issues
by: Jegede, Abayomi, et al.
Published: (2017)
by: Jegede, Abayomi, et al.
Published: (2017)
A survey on privacy-preserving authentication schemes in VANETs: attacks, challenges and open issues
by: Ahmed Jan, Sagheer, et al.
Published: (2021)
by: Ahmed Jan, Sagheer, et al.
Published: (2021)
Smart-contract privacy preservation mechanism
by: Siraj, Muhammed, et al.
Published: (2023)
by: Siraj, Muhammed, et al.
Published: (2023)
An application of biometric technology : Iris recognition
by: Khalifa, Othman Omran, et al.
Published: (2011)
by: Khalifa, Othman Omran, et al.
Published: (2011)
Private Biometrics Realisation Through Iris Verification
by: Chong, Siew Chin
Published: (2005)
by: Chong, Siew Chin
Published: (2005)
Character property method for Arabic text steganography with biometric multifactor authentication using liveness detection
by: Roslan, Nuur Alifah, et al.
Published: (2020)
by: Roslan, Nuur Alifah, et al.
Published: (2020)
A XML based, user-centered privacy model in pervasive
computing systems
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
Human Iris Image Recognition System For Biometrics Application
by: Lee , Peik Shyan
Published: (2004)
by: Lee , Peik Shyan
Published: (2004)
Human Iris Image Recognition System for Biometrics Application
by: Lee, Peik Shyan
Published: (2004)
by: Lee, Peik Shyan
Published: (2004)
A novel authentication scheme to increase security for non-repudiation of users
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
Privacy-preserving transactions protocol using mobile agents with mutual authentication
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
Secure unlinkability schemes for privacy preserving data publishing in weighted social networks / Chong Kah Meng
by: Chong , Kah Meng
Published: (2020)
by: Chong , Kah Meng
Published: (2020)
Multimodality to improve Security and Privacy in Fingerprint Authentication System
by: Islam, Md. Rajibul, et al.
Published: (2007)
by: Islam, Md. Rajibul, et al.
Published: (2007)
Multimodality to improve Security and Privacy in Fingerprint Authentication System
by: Islam, Md. Rajibul, et al.
Published: (2007)
by: Islam, Md. Rajibul, et al.
Published: (2007)
A new hybrid embedding method in iris biometric system
by: Zainal Abidin, Zaheera, et al.
Published: (2013)
by: Zainal Abidin, Zaheera, et al.
Published: (2013)
Performance and divisional trust and purpose-based access control for privacy preservation
by: Salji, Mohd Rafiz, et al.
Published: (2018)
by: Salji, Mohd Rafiz, et al.
Published: (2018)
UPEM : user-centered privacy evaluation model in pervasive computing system.
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
UPEM : user-centered privacy evaluation model in pervasive computing systems.
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Active authentication by one time password based on unique factor and behavioral biometric
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
Secure e-transactions protocol preserving privacy for customers and bidders
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Integrated Security And Privacy Preservation Approach In Mobile Crowd Sensing
by: Pius, Owoh Nsikak
Published: (2020)
by: Pius, Owoh Nsikak
Published: (2020)
Bring your own device: security challenges and a theoretical framework for two-factor authentication
by: Olalere, Morufu, et al.
Published: (2016)
by: Olalere, Morufu, et al.
Published: (2016)
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011)
by: Dehghantanha, Ali, et al.
Published: (2011)
Robust partitioning and indexing for iris biometric database based on local features
by: Khalaf, Emad Taha, et al.
Published: (2018)
by: Khalaf, Emad Taha, et al.
Published: (2018)
An efficient indexing and retrieval of iris biometrics data using hybrid transform and firefly based K-means algorithm title
by: Khalaf, Emad Taha
Published: (2019)
by: Khalaf, Emad Taha
Published: (2019)
Intrusion detection system in secure shell traffic in cloud environment
by: Barati, Mehdi, et al.
Published: (2014)
by: Barati, Mehdi, et al.
Published: (2014)
Advancing security measures: A brainwave-based biometric system for user identification and authentication
by: Muhammad Nur Arif, Mohd Farid, et al.
Published: (2024)
by: Muhammad Nur Arif, Mohd Farid, et al.
Published: (2024)
Iris authentication using privatized advanced correlation filter
by: Chong, , SC, et al.
Published: (2006)
by: Chong, , SC, et al.
Published: (2006)
An Efficient Framework Of Identity-based Conditional Privacy-preserving Authentication For Vehicular Ad Hoc Networks
by: Shareeda, Mahmood Arif Lafta Al
Published: (2022)
by: Shareeda, Mahmood Arif Lafta Al
Published: (2022)
Two-Factor Cancelable Biometrics Authenticator
by: Pang, Ying Han, et al.
Published: (2007)
by: Pang, Ying Han, et al.
Published: (2007)
A secure authentication scheme for bluetooth connection
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
Blockchain-enabled Secure Privacy-preserving System for Public Health-center Data
by: Islam, Md. Shohidul, et al.
Published: (2023)
by: Islam, Md. Shohidul, et al.
Published: (2023)
Similar Items
-
Modified shielding function for multi-biometric authentication and template protection
by: Jegede, Abayomi, et al.
Published: (2017) -
State of the art in biometric key binding and key generation schemes
by: Jegede, Abayomi, et al.
Published: (2017) -
Modified shielding function for multi-biometric authentication and template protection / Abayomi Jegede ... [et al.]
by: Jegede, Abayomi, et al.
Published: (2017) -
Privacy levels for computer forensics: toward a more efficient
privacy-preserving investigation
by: Halboob, Waleed Abduljabbar Mohammed, et al.
Published: (2015) -
Revocable and non-invertible multibiometric template protection based on matrix transformation
by: Jegede, Abayomi, et al.
Published: (2018)