2018
DOI: 10.1007/978-981-10-7871-2_26
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographic Key Generation Scheme from Cancellable Biometrics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…Another key focus is the preservation of the privacy of biometric data used in cryptographic processes, achieved through cancelable biometrics, one-way transformations, and the avoidance of raw template storage [68,81]. Analyzing the security and revocability of systems in the event of template compromise is equally essential.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Another key focus is the preservation of the privacy of biometric data used in cryptographic processes, achieved through cancelable biometrics, one-way transformations, and the avoidance of raw template storage [68,81]. Analyzing the security and revocability of systems in the event of template compromise is equally essential.…”
Section: Discussionmentioning
confidence: 99%
“…However, the challenge lies in the variability of biometrics, making it difficult to consistently generate keys [80], as well as the lack of in-depth security analysis against advanced threats [68,78]. Furthermore, reliance on specific modalities such as fingerprints or ECGs limits its applicability [81]. To enhance the generation of the biometric cryptographic key, researchers should explore techniques such as quantization, grey coding, or error correction codes to extract stable keys from noisy biometric signals [68], introduce cancelable biometrics to enable template renewal in case of compromise [78], and consider emerging wearable-friendly modalities such as EEGs, EMGs, skin conductance to overcome limitations associated with specific modalities [81].…”
Section: Cryptographic Key Generation Using Biometricsmentioning
confidence: 99%
See 1 more Smart Citation
“…The correlation values are used to express the similarity between a test fingerprint and the fingerprints in the database. The higher the score, the higher is the similarity between fingerprints [18][19][20]. Accessing of the system is granted only if the score for a test user is higher than a certain threshold known as the Equal Error Rate (EER), which is estimated at the intersection of the impostor and genuine distributions.…”
Section: 2 2 a Au Ut Th He En Nt Ti Ic Ca At Ti Io On N S St Ta Amentioning
confidence: 99%
“…One of the most advanced alternatives to produce a deformed biometric template is to apply datadependent cryptography. In [32], user fingerprint templates can generate cryptographic keys of an encryption scheme for fingerprints. Therefore, it is sophisticated or impossible for the intruder to impose the secret keys without prior user features.…”
Section: Introductionmentioning
confidence: 99%