[go: up one dir, main page]

Hammad et al., 2019 - Google Patents

Cancelable biometric authentication system based on ECG

Hammad et al., 2019

View PDF
Document ID
511675010943336933
Author
Hammad M
Luo G
Wang K
Publication year
Publication venue
Multimedia Tools and Applications

External Links

Snippet

Biometrics are widely deployed in various security systems; however, they have drawbacks in the form of leakage or stealing, therefore numerous solutions have been proposed to secure biometric template such as cancelable biometric, which is one of the possible …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6288Fusion techniques, i.e. combining data from various sources, e.g. sensor fusion
    • G06K9/6292Fusion techniques, i.e. combining data from various sources, e.g. sensor fusion of classification results, e.g. of classification results related to same input data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00087Matching; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6201Matching; Proximity measures
    • G06K9/6202Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/36Image preprocessing, i.e. processing the image information without deciding about the identity of the image
    • G06K9/46Extraction of features or characteristics of the image
    • G06K9/52Extraction of features or characteristics of the image by deriving mathematical or geometrical properties from the whole image
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/74Arrangements for recognition using optical reference masks
    • G06K9/741Arrangements for recognition using optical reference masks using frequency domain filters, e.g. Fourier masks implemented on spatial light modulators
    • G06K9/743Arrangements for recognition using optical reference masks using frequency domain filters, e.g. Fourier masks implemented on spatial light modulators characterised by the kind of filter
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00268Feature extraction; Face representation
    • G06K9/00275Holistic features and representations, i.e. based on the facial image taken as a whole
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00362Recognising human body or animal bodies, e.g. vehicle occupant, pedestrian; Recognising body parts, e.g. hand
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Similar Documents

Publication Publication Date Title
Hammad et al. Cancelable biometric authentication system based on ECG
Liu et al. Finger vein secure biometric template generation based on deep learning
Gumaei et al. Anti-spoofing cloud-based multi-spectral biometric identification system for enterprise security and privacy-preservation
Lumini et al. An improved biohashing for human authentication
Kaur et al. Biometric template protection using cancelable biometrics and visual cryptography techniques
Gupta et al. Novel approach for multimodal feature fusion to generate cancelable biometric
Wang et al. An analysis of random projection for changeable and privacy-preserving biometric verification
Cavoukian et al. Biometric encryption: The new breed of untraceable biometrics
Li et al. Palmprint template protection scheme based on randomized cuckoo hashing and MinHash
Sandhya et al. Multi-instance cancelable iris authentication system using triplet loss for deep learning models
Topcu et al. Practical security and privacy attacks against biometric hashing using sparse recovery
Ali et al. Fingerprint shell with impregnable features
Wang et al. PolyCosGraph: A privacy-preserving cancelable EEG biometric system
US20200028686A1 (en) Systems and methods for extending the domain of biometric template protection algorithms from integer-valued feature vectors to real-valued feature vectors
Ali et al. A novel technique for fingerprint template security in biometric authentication systems
Morampudi et al. Reliable and privacy-preserving multi-instance iris verification using Paillier homomorphic encryption and one-digit checksum
Hossam Eldein Mohamed et al. Cancelable biometric authentication system based on hyperchaotic technique and fibonacci Q-Matrix
Jasmine et al. A privacy preserving based multi-biometric system for secure identification in cloud environment
Alwan et al. Cancellable face template algorithm based on speeded-up robust features and winner-takes-all
Siddhad et al. Cancelable biometric template generation using convolutional autoencoder
Sandhya et al. Multi-algorithmic cancelable fingerprint template generation based on weighted sum rule and T-operators
Ali et al. Cancelable palmprint: intelligent framework toward secure and privacy-aware recognition system
Khallaf et al. Implementation of quaternion mathematics for biometric security
Jin et al. A cancellable ranking based hashing method for fingerprint template protection
Zehir et al. Unifying Heartbeats and Vocal Waves: An Approach to Multimodal Biometric Identification At the Score Level