2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI) 2019
DOI: 10.1109/icoei.2019.8862563
|View full text |Cite
|
Sign up to set email alerts
|

Multimodal Biometric Authentication with Secured Templates — A Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 31 publications
0
7
0
Order By: Relevance
“…Kodituwakku [ 140 ] believes biometric technology can be classified into two general categories: physiological biometric techniques and behavioral biometric techniques. Jain et al [ 141 ] and Choudhary and Naik [ 142 ] also classify biometrics into two categories: physiological and behavioral. In the literature, not only signature, voice, and gait are considered behavioral biometric features, but also ECG, EMG, and EEG [ 143 ], while other authors distinguish cognitive biometrics [ 144 , 145 ], including electroencephalography (EEG), electrocardiography (ECG), electrodermal response (EDR), blood pulse volume (BVP), near-infrared spectroscopy (NIR), electromyography (EMG), eye trackers (pupillometry), hemoencephalography (HEG), and related technologies [ 145 ].…”
Section: Brain and Biometric Affect Sensorsmentioning
confidence: 99%
“…Kodituwakku [ 140 ] believes biometric technology can be classified into two general categories: physiological biometric techniques and behavioral biometric techniques. Jain et al [ 141 ] and Choudhary and Naik [ 142 ] also classify biometrics into two categories: physiological and behavioral. In the literature, not only signature, voice, and gait are considered behavioral biometric features, but also ECG, EMG, and EEG [ 143 ], while other authors distinguish cognitive biometrics [ 144 , 145 ], including electroencephalography (EEG), electrocardiography (ECG), electrodermal response (EDR), blood pulse volume (BVP), near-infrared spectroscopy (NIR), electromyography (EMG), eye trackers (pupillometry), hemoencephalography (HEG), and related technologies [ 145 ].…”
Section: Brain and Biometric Affect Sensorsmentioning
confidence: 99%
“…In light of growing privacy concerns with regard to data usage, countries enacted laws to protect personal data by imposing solutions to mitigate the problem of attacks and data leaks [2], [3]. For many years, the main approach adopted to ensure biometric networks' security and privacy was applying biometric template techniques [1], [4]- [8]. The work of Ross et al [9] pushes a lot of achievements to deal with template protection using biometric cryptosystems [10]- [17] and cancelable biometric (feature transformations) [18]- [21].…”
Section: Introductionmentioning
confidence: 99%
“…Privacy is contextually based on the specifics of who should do what and where [ 1 ]. Recently, the availability of low-cost data that aids in ample data communication, securing data and applications from unauthorized identities is becoming very important to help control access to software, data, devices and physical buildings [ 2 ]. Despite the widespread use of passwords to authenticate users, there are many weaknesses and drawbacks associated with this method of user authentication [ 3 ].…”
Section: Introductionmentioning
confidence: 99%