2020
DOI: 10.1155/2020/8841021
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced Biometric Recognition for Secure Authentication Using Iris Preprocessing and Hyperelliptic Curve Cryptography

Abstract: Biometrics combined with cryptography can be employed to solve the conceptual and factual identity frauds in digital authentication. Biometric traits are proven to provide enhanced security for detecting crimes because of its interesting features such as accuracy, stability, and uniqueness. Although diverse techniques have been raised to address this objective, limitations such as higher computational time, minimal accuracy, and maximum recognition time remain. To overcome these challenges, an enhanced iris re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…That database spans 150 fingers and includes 12 specimens per finger. The notations used in the proposed approach are false positives (FPs), true negatives (TNs), false negatives (FNs), and true positives (TPs) 26 .…”
Section: Resultsmentioning
confidence: 99%
“…That database spans 150 fingers and includes 12 specimens per finger. The notations used in the proposed approach are false positives (FPs), true negatives (TNs), false negatives (FNs), and true positives (TPs) 26 .…”
Section: Resultsmentioning
confidence: 99%
“…Technique (Year) Performance (EER %) Hyperelliptic Curve Cryptography (2020) [23] 2.5 Fully homomorphic encryption (2020) [15] 1.38 Local Ranking (2018) [24] 1.32 Modified Logistic Map (2018) [25] 1.17 randomized response technique (2018) [26] 1.03 Fully homomorphic encryption (2021) [27] 0.95 Double Random Phase Encoding (2018) [28] 0.63 Random Projection (2018) [29] 0.58 Binary Confidence Matrix (2021) [30] 0.51 Random Projection and Double Random Phase Encoding (2021) [31] 0.46 Salting Technique (2020) [11] 0.43 Comb Filtering (2020) [32] 0.38 Proposed iris recognition system 0.37…”
Section: Table I Comparison With the State-of-the-art Techniquesmentioning
confidence: 99%
“…Traditional routing involves unicast traffic that transfers the packet from one node to another node in the hop-by-hop network. ExOR technique defined by IEEE 802.15 as a unicast routing scheme to improve bit rates in wireless multi-site networks [12]. It is worth noting that coding procedures is not introduced by ExOR, but it still enhances system performance.…”
Section: Figure 1 Structure Of Wsnmentioning
confidence: 99%