Hammad et al., 2019 - Google Patents
Cancelable biometric authentication system based on ECGHammad et al., 2019
View PDF- Document ID
- 511675010943336933
- Author
- Hammad M
- Luo G
- Wang K
- Publication year
- Publication venue
- Multimedia Tools and Applications
External Links
Snippet
Biometrics are widely deployed in various security systems; however, they have drawbacks in the form of leakage or stealing, therefore numerous solutions have been proposed to secure biometric template such as cancelable biometric, which is one of the possible …
- 239000011159 matrix material 0 abstract description 113
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6288—Fusion techniques, i.e. combining data from various sources, e.g. sensor fusion
- G06K9/6292—Fusion techniques, i.e. combining data from various sources, e.g. sensor fusion of classification results, e.g. of classification results related to same input data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00087—Matching; Classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6201—Matching; Proximity measures
- G06K9/6202—Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6267—Classification techniques
- G06K9/6268—Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/36—Image preprocessing, i.e. processing the image information without deciding about the identity of the image
- G06K9/46—Extraction of features or characteristics of the image
- G06K9/52—Extraction of features or characteristics of the image by deriving mathematical or geometrical properties from the whole image
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/74—Arrangements for recognition using optical reference masks
- G06K9/741—Arrangements for recognition using optical reference masks using frequency domain filters, e.g. Fourier masks implemented on spatial light modulators
- G06K9/743—Arrangements for recognition using optical reference masks using frequency domain filters, e.g. Fourier masks implemented on spatial light modulators characterised by the kind of filter
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00268—Feature extraction; Face representation
- G06K9/00275—Holistic features and representations, i.e. based on the facial image taken as a whole
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00362—Recognising human body or animal bodies, e.g. vehicle occupant, pedestrian; Recognising body parts, e.g. hand
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Hammad et al. | Cancelable biometric authentication system based on ECG | |
| Liu et al. | Finger vein secure biometric template generation based on deep learning | |
| Gumaei et al. | Anti-spoofing cloud-based multi-spectral biometric identification system for enterprise security and privacy-preservation | |
| Lumini et al. | An improved biohashing for human authentication | |
| Kaur et al. | Biometric template protection using cancelable biometrics and visual cryptography techniques | |
| Gupta et al. | Novel approach for multimodal feature fusion to generate cancelable biometric | |
| Wang et al. | An analysis of random projection for changeable and privacy-preserving biometric verification | |
| Cavoukian et al. | Biometric encryption: The new breed of untraceable biometrics | |
| Li et al. | Palmprint template protection scheme based on randomized cuckoo hashing and MinHash | |
| Sandhya et al. | Multi-instance cancelable iris authentication system using triplet loss for deep learning models | |
| Topcu et al. | Practical security and privacy attacks against biometric hashing using sparse recovery | |
| Ali et al. | Fingerprint shell with impregnable features | |
| Wang et al. | PolyCosGraph: A privacy-preserving cancelable EEG biometric system | |
| US20200028686A1 (en) | Systems and methods for extending the domain of biometric template protection algorithms from integer-valued feature vectors to real-valued feature vectors | |
| Ali et al. | A novel technique for fingerprint template security in biometric authentication systems | |
| Morampudi et al. | Reliable and privacy-preserving multi-instance iris verification using Paillier homomorphic encryption and one-digit checksum | |
| Hossam Eldein Mohamed et al. | Cancelable biometric authentication system based on hyperchaotic technique and fibonacci Q-Matrix | |
| Jasmine et al. | A privacy preserving based multi-biometric system for secure identification in cloud environment | |
| Alwan et al. | Cancellable face template algorithm based on speeded-up robust features and winner-takes-all | |
| Siddhad et al. | Cancelable biometric template generation using convolutional autoencoder | |
| Sandhya et al. | Multi-algorithmic cancelable fingerprint template generation based on weighted sum rule and T-operators | |
| Ali et al. | Cancelable palmprint: intelligent framework toward secure and privacy-aware recognition system | |
| Khallaf et al. | Implementation of quaternion mathematics for biometric security | |
| Jin et al. | A cancellable ranking based hashing method for fingerprint template protection | |
| Zehir et al. | Unifying Heartbeats and Vocal Waves: An Approach to Multimodal Biometric Identification At the Score Level |