2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM) 2017
DOI: 10.23919/softcom.2017.8115526
|View full text |Cite
|
Sign up to set email alerts
|

ECG biometrie template protection based on secure sketch scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…In other words, this does not mean that the heart signal is not random. 6 tests [14] Chi-Square [12,91,153] No tests [13,19,140,142,92,149,152,150,154,106,89,90,88,16,158,159] 6. Challenges and Conclusions Challenges and Directions.…”
Section: Summary Of Surveyed Papersmentioning
confidence: 99%
“…In other words, this does not mean that the heart signal is not random. 6 tests [14] Chi-Square [12,91,153] No tests [13,19,140,142,92,149,152,150,154,106,89,90,88,16,158,159] 6. Challenges and Conclusions Challenges and Directions.…”
Section: Summary Of Surveyed Papersmentioning
confidence: 99%
“…A semisupervised clustering scheme for key generation is developed in [27] that delivers consistent and discriminative keys for handwritten signatures. Zaghouani and others [28] design and assess a secure sketch scheme for ECG templates that preserves performance identification of the unprotected systems and maintains an acceptable identification speed as compared to the slower identification speed in fuzzy commitment scheme. A quantization scheme is used by Anees and Chen [29] which caters to the variations in the face templates along with providing security and reducing the feature size.…”
Section: Key-generation Biometric Cryptosystemsmentioning
confidence: 99%
“…[36] planned to focus on a stronger projection matrix design for their proposed work. [28] considered the incorporation of a secure sketch with a secret key, thereby combining key binding and key generation approaches. Face and fingerprint are the two popular modalities for developing biometric template protection schemes when dealing with deep neural networks, leading to other behavioral biometrics being overlooked.…”
Section: Open Challengesmentioning
confidence: 99%