2014
DOI: 10.14445/22315381/ijett-v7p244
|View full text |Cite
|
Sign up to set email alerts
|

A Study on Biometric Template Protection Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…The template that is kept in the database may be exposed to eavesdropping which makes the protecting of it a challenging task in the biometric system. Because of these reasons, many researches used cryptography, stenography and watermarking for biometric data and template protection in the system [6]. Despite the biometrics advantages as an approach of identity verification, some concerns are raised because of the high sensitivity of biometric data: Information leakage poses a serious privacy threat.…”
Section: Introductionmentioning
confidence: 99%
“…The template that is kept in the database may be exposed to eavesdropping which makes the protecting of it a challenging task in the biometric system. Because of these reasons, many researches used cryptography, stenography and watermarking for biometric data and template protection in the system [6]. Despite the biometrics advantages as an approach of identity verification, some concerns are raised because of the high sensitivity of biometric data: Information leakage poses a serious privacy threat.…”
Section: Introductionmentioning
confidence: 99%
“…The invader marks the storage record straightaway via a visibly conceded application to mount denial-of-service (Arjunwadkar et al, 2012;Habibu & Sam, 2018;Poongodi & Betty, 2014). Figure 3 characterized point eight attack.…”
Section: Attack On Database Templatementioning
confidence: 99%