2016 International Conference on Information Science and Communications Technologies (ICISCT) 2016
DOI: 10.1109/icisct.2016.7777408
|View full text |Cite
|
Sign up to set email alerts
|

Biometric cryptosystems: Open issues and challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 4 publications
0
1
0
Order By: Relevance
“…Databases is very important part in holding information in our day present day digital [14]. Security measures in databases encompass various techniques aimed at maintaining the quality, trust, and availability of information [15]. In [16], several methods for maintaining database security are proposed, including physical security, network security, password access control, biometric authentication, data encryption, auditing, and logging.…”
Section: Review Of Related Literaturementioning
confidence: 99%
“…Databases is very important part in holding information in our day present day digital [14]. Security measures in databases encompass various techniques aimed at maintaining the quality, trust, and availability of information [15]. In [16], several methods for maintaining database security are proposed, including physical security, network security, password access control, biometric authentication, data encryption, auditing, and logging.…”
Section: Review Of Related Literaturementioning
confidence: 99%
“…One challenge is the need for accurate voice recognition. Voice characteristics can vary due to factors such as age, health conditions, background noise, or changes in speaking style [8,9]. Banks need to ensure that their voice biometric systems are robust enough to accurately identify and authenticate customers under different conditions consistently.…”
Section: Srinivas Publicationmentioning
confidence: 99%
“…The proposed approach is used to improve security and privacy Many researchers have explored different approaches to solve these issues. The traditional bio-key generation scheme is divided into three categories [5,6]: key binding, key generation, and secure sketch and fuzzy extractor, which face the following challenges:…”
Section: Introductionmentioning
confidence: 99%