2020
DOI: 10.1109/access.2020.3043689
|View full text |Cite
|
Sign up to set email alerts
|

Optical PTFT Asymmetric Cryptosystem-Based Secure and Efficient Cancelable Biometric Recognition System

Abstract: Recently, biometric systems are extensively and commonly utilized for authentication and verification applications. The security issue and the dependence on a specific biometric for the biometric verification process are the main challenges confronted in biometric systems. The security issue comes due to the exploitation of the original biometrics in stored servers. Therefore, if any attacks have been introduced to the stored biometrics, they will be missed indefinitely. Consequently, the stored original biome… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
28
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
2

Relationship

5
3

Authors

Journals

citations
Cited by 62 publications
(28 citation statements)
references
References 41 publications
0
28
0
Order By: Relevance
“…The RP can be free from training and much faster. Some extensions of one-dimensional RP (1D RP), including two-dimensional RP (2DRP) [10], two-directional two-dimensional RP (2D) 2 RP [11,12], sparse RP [13], require far lower computational complexity and storage cost than those of traditional 1D RP.…”
Section: Data Reduction Stepmentioning
confidence: 99%
See 1 more Smart Citation
“…The RP can be free from training and much faster. Some extensions of one-dimensional RP (1D RP), including two-dimensional RP (2DRP) [10], two-directional two-dimensional RP (2D) 2 RP [11,12], sparse RP [13], require far lower computational complexity and storage cost than those of traditional 1D RP.…”
Section: Data Reduction Stepmentioning
confidence: 99%
“…So, 1D cancelable palmprint codes are extended to 2D cancelable palmprint codes. Moreover, the authors in [11] proposed a novel method called (2D) 2 RP for feature extraction from biometrics, where they employed (2D) 2 RP and its variations on the face and palmprint databases.…”
Section: Data Reduction Stepmentioning
confidence: 99%
“…Similarity tools in statistics can be utilized with these techniques. Several studies have introduced a general survey [17][18][19][20][21][22][23][24][25] for different types of forgery techniques. In the copy-move technique [26][27][28][29][30][31][32][33][34], the copied parts share characteristics such as lighting conditions, background, and dynamic range with the rest of the images.…”
Section: Related Workmentioning
confidence: 99%
“…The electrical signal is introduced by a transformer, as a photodetector, from the incident light beam. This electrical signal interprets the applied data of the scanned biometric template [27]. A 2D digital image of the scanned input object is extracted from the scanned electrical data by storing it in a digital form on a computer.…”
Section: Related Workmentioning
confidence: 99%
“…These transformations are one-way functions used for the extracted features that enhance the diversity and unlinkability properties. The same biometric template can be suffered from different transformations for various services to forbidden cross-matching between stored biometrics in various cloud datasets [22][23][24][25][26][27]. Another type of cancelable biometric system is called a hybrid approach.…”
Section: Introductionmentioning
confidence: 99%