2023
DOI: 10.1109/tdsc.2022.3162623
|View full text |Cite
|
Sign up to set email alerts
|

Attacks and Countermeasures on Privacy-Preserving Biometric Authentication Schemes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(1 citation statement)
references
References 39 publications
0
1
0
Order By: Relevance
“…3. Authentication Challenges: Deepfake technology raises concerns about the reliability of authentication methods that rely on biometric data [85] like facial recognition [86], [87]. An attacker could use a deepfake to gain unauthorized access to secure systems or accounts by mimicking the targeted individual's biometric data.…”
Section: A User Perspectivementioning
confidence: 99%
“…3. Authentication Challenges: Deepfake technology raises concerns about the reliability of authentication methods that rely on biometric data [85] like facial recognition [86], [87]. An attacker could use a deepfake to gain unauthorized access to secure systems or accounts by mimicking the targeted individual's biometric data.…”
Section: A User Perspectivementioning
confidence: 99%