2019
DOI: 10.1007/s10462-019-09767-8
|View full text |Cite
|
Sign up to set email alerts
|

Cancelable Biometrics: a comprehensive survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
40
0
2

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 100 publications
(42 citation statements)
references
References 141 publications
0
40
0
2
Order By: Relevance
“…The privacy-issue in biometrics can also be seen from the perspective of cancelable biometrics. Similar to soft-biometric privacy, cancelable biometrics approaches apply one-way functions to transform biometric data [1], [23], [32] and store the transformed data [4]. However, the solutions from both areas target different goals.…”
Section: Related Workmentioning
confidence: 99%
“…The privacy-issue in biometrics can also be seen from the perspective of cancelable biometrics. Similar to soft-biometric privacy, cancelable biometrics approaches apply one-way functions to transform biometric data [1], [23], [32] and store the transformed data [4]. However, the solutions from both areas target different goals.…”
Section: Related Workmentioning
confidence: 99%
“…Lack of standard performance measures: There are several measures that have been used to assess the performance of a biometric system. Due to the lack of a single measure to quantify the system, it is very hard to make a comparison of different methods that have been published in the literature (Ryu et al, 2021;Kumar, Prasad & Raju, 2020;Manisha & Kumar, 2020). There is a need to work on a unified measure that is widely adopted by the researchers to evaluate different authentication systems, and making the literature standardized and valid for performing direct comparisons.…”
Section: Open Challenges and Future Directions Challengesmentioning
confidence: 99%
“…Template protection has been approached from many different angles. The different methods can be classified into the following main categories [26]: a) Cryptosystems: cryptographic keys are derived from or bound to the biometric information. Some relevant methods are BioHashing [27] and Fuzzy Extractors [28], which will be further explained in the next Section.…”
Section: B On Template Protectionmentioning
confidence: 99%