Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,393,622 papers from all fields of science
Search
Sign In
Create Free Account
Private biometrics
Known as:
BioCryptics
, Biometric encryption
A form of biometrics, also called Biometric Encryption or BioCryptics, in which the prover is protected against the misuse of template data by a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
Biometric passport
Database
Encryption
Password
Expand
Broader (1)
Biometrics
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Non-invertible Biometric Encryption to Generate Cancelable Biometric Templates
Harkeerat Kaur
,
P. Khanna
2017
Corpus ID: 53140172
Tremendous use of biometric based authentication systems has led to increased attacks on biometric data. It has given rise to…
Expand
2015
2015
Research of Biometric Key Generation Based on Fingerprint Bit-strings
Jiayong Liu
2015
Corpus ID: 2937946
Biometric key technology is the organic combination of biometric encryption technology and traditional cryptography. Biometric…
Expand
Review
2014
Review
2014
A Survey based Accomplishment Techniques for Biometric Finger Print Matching System
Dipti M. Jawalkar
,
M. Sarode
2014
Corpus ID: 1484236
Fingerprints are the biometric features most used for detection. Dormant prints are routinely recovered commencing crime scenes…
Expand
2011
2011
A Biometric Key Establishment Protocol for Body Area Networks
Lin Yao
,
Bing Liu
,
Guowei Wu
,
Kai Yao
,
Jia Wang
Int. J. Distributed Sens. Networks
2011
Corpus ID: 40069520
Current advances in semiconductor technology have made it possible to implant a network of biosensors inside the human body for…
Expand
Highly Cited
2009
Highly Cited
2009
Near Infrared Face Based Biometric Key Binding
Meng Ao
,
S. Li
International Conference on Biometrics
2009
Corpus ID: 24060634
Biometric encryption is the basis for biometric template protection and information security. While existing methods are based on…
Expand
Review
2009
Review
2009
Key Binding Based on Biometric Shielding Functions
Huixian Li
,
Wang Man
,
Liaojun Pang
,
Weidong Zhang
Fifth International Conference on Information…
2009
Corpus ID: 922826
The tremendous evolution in networking, communication and mobility creates greater security assurance demand than can be provided…
Expand
Highly Cited
2009
Highly Cited
2009
Security issues of Biometric Encryption
A. Stoianov
,
T. Kevenaar
,
M. V. D. Veen
IEEE Toronto International Conference Science and…
2009
Corpus ID: 45766696
Security issues of Biometric Encryption are discussed in terms of resilience to the attacks. A number of previously unpublished…
Expand
2009
2009
The Relevance of Untraceable Biometrics and Biometric Encryption : A Discussion of Biometrics for Authentication Purposes
2009
Corpus ID: 16478663
2006
2006
Computational Intelligence and Bioinformatics, International Conference on Intelligent Computing, ICIC 2006, Kunming, China, August 16-19, 2006. Proceedings, Part III
De-shuang Huang
,
Kang Li
,
G. Irwin
International Conference on Intelligent Computing
2006
Corpus ID: 36846499
Ant Colony Optimisation.- A Constrained Ant Colony Algorithm for Image Registration.- A Novel ACO Algorithm with Adaptive…
Expand
2006
2006
A Biometric Encryption Approach Incorporating Fingerprint Indexing in Key Generation
F. Han
,
Jiankun Hu
,
Xinghuo Yu
International Conference on Intelligent Computing
2006
Corpus ID: 38537514
This paper presents a new biometric encryption protocol in which encryption key is incorporated with fingerprint indexing. Based…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE