2020
DOI: 10.3390/e22121361
|View full text |Cite
|
Sign up to set email alerts
|

Discrete Transforms and Matrix Rotation Based Cancelable Face and Fingerprint Recognition for Biometric Security Applications

Abstract: The security of information is necessary for the success of any system. So, there is a need to have a robust mechanism to ensure the verification of any person before allowing him to access the stored data. So, for purposes of increasing the security level and privacy of users against attacks, cancelable biometrics can be utilized. The principal objective of cancelable biometrics is to generate new distorted biometric templates to be stored in biometric databases instead of the original ones. This paper presen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
16
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
9

Relationship

5
4

Authors

Journals

citations
Cited by 52 publications
(20 citation statements)
references
References 49 publications
0
16
0
Order By: Relevance
“…Similarity tools in statistics can be utilized with these techniques. Several studies have introduced a general survey [17][18][19][20][21][22][23][24][25] for different types of forgery techniques. In the copy-move technique [26][27][28][29][30][31][32][33][34], the copied parts share characteristics such as lighting conditions, background, and dynamic range with the rest of the images.…”
Section: Related Workmentioning
confidence: 99%
“…Similarity tools in statistics can be utilized with these techniques. Several studies have introduced a general survey [17][18][19][20][21][22][23][24][25] for different types of forgery techniques. In the copy-move technique [26][27][28][29][30][31][32][33][34], the copied parts share characteristics such as lighting conditions, background, and dynamic range with the rest of the images.…”
Section: Related Workmentioning
confidence: 99%
“…Biometrics is the oldest known document in the history of China, Egypt, and Ancient Babylon. Recently, biometric recognition systems have become a significant processing field for many applications, especially in security [2][3][4].…”
Section: Introductionmentioning
confidence: 99%
“…4 Therefore, the ECG technology can be adopted in several applications, such as physical access control, managing medical records, commercial applications, federal applications, token-based systems, and forensic applications. [5][6][7] Most organizations aim to protect their assets by providing methods for controlling them. In this process, the right person must be identified and delegated to achieve the proper task.…”
Section: Introductionmentioning
confidence: 99%