Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Private biometrics

Known as: BioCryptics, Biometric encryption 
A form of biometrics, also called Biometric Encryption or BioCryptics, in which the prover is protected against the misuse of template data by a… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
We present a technique that uses privacy enhancing technologies and biometrics to prevent the unauthorized lending of credentials… Expand
  • figure 1
  • figure 2
  • figure 5
Highly Cited
2011
Highly Cited
2011
Highly Cited
2009
Highly Cited
2009
An in-depth examination of the cutting edge of biometrics This book fills a gap in the literature by detailing the recent… Expand
Highly Cited
2009
Highly Cited
2009
The increasing use of biometrics has given rise to new privacy concerns. Biometric encryption systems have been proposed in order… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
2006
2006
Ant Colony Optimisation.- A Constrained Ant Colony Algorithm for Image Registration.- A Novel ACO Algorithm with Adaptive… Expand
Highly Cited
2005
Highly Cited
2005
The goal of a biometric encryption system is to embed a secret into a biometric template in a way that can only be decrypted with… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Highly Cited
1998
Highly Cited
1998
In developing secure applications and systems, designers must often incorporate secure user identification in the design… Expand
  • figure 1
  • figure 2
  • figure 3
Highly Cited
1998
Highly Cited
1998
Biometric EncryptionTM is an algorithm which has been developed to securely link and retrieve a digital key using the interaction… Expand
Highly Cited
1998
Highly Cited
1998
Biometric EncryptionTM is an algorithm which has been developed to securely link and retrieve a digital key using the interaction… Expand