Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 219,937,496 papers from all fields of science
Search
Sign In
Create Free Account
Private biometrics
Known as:
BioCryptics
, Biometric encryption
A form of biometrics, also called Biometric Encryption or BioCryptics, in which the prover is protected against the misuse of template data by a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
Biometric passport
Database
Encryption
Password
Expand
Broader (1)
Biometrics
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Non-invertible Biometric Encryption to Generate Cancelable Biometric Templates
Harkeerat Kaur
,
P. Khanna
2017
Corpus ID: 53140172
Tremendous use of biometric based authentication systems has led to increased attacks on biometric data. It has given rise to…
Expand
Review
2014
Review
2014
A Survey based Accomplishment Techniques for Biometric Finger Print Matching System
Dipti M. Jawalkar
,
M. Sarode
2014
Corpus ID: 1484236
Fingerprints are the biometric features most used for detection. Dormant prints are routinely recovered commencing crime scenes…
Expand
Review
2013
Review
2013
Developing Biometric Encryption Techniques for Securing Biometric Data and Privacy Preserving
Jin Zhe
2013
Corpus ID: 53139601
With the wide deployment of biometric authentication systems, biometric template protection has gained great attention due to…
Expand
2011
2011
A Biometric Key Establishment Protocol for Body Area Networks
Lin Yao
,
Bing Liu
,
Guowei Wu
,
Kai Yao
,
Jia Wang
Int. J. Distributed Sens. Networks
2011
Corpus ID: 40069520
Current advances in semiconductor technology have made it possible to implant a network of biosensors inside the human body for…
Expand
Review
2009
Review
2009
Key Binding Based on Biometric Shielding Functions
Huixian Li
,
Wang Man
,
Liaojun Pang
,
Weidong Zhang
Fifth International Conference on Information…
2009
Corpus ID: 922826
The tremendous evolution in networking, communication and mobility creates greater security assurance demand than can be provided…
Expand
2009
2009
The Relevance of Untraceable Biometrics and Biometric Encryption : A Discussion of Biometrics for Authentication Purposes
2009
Corpus ID: 16478663
2008
2008
Evaluating Biometric Encryption Key Generation Using Handwritten Signatures
Sanaul Hoque
,
M. Fairhurst
,
G. Howells
Bio-inspired, Learning, and Intelligent Systems…
2008
Corpus ID: 14334658
In traditional cryptosystems, user authentication is based on the possession of secret keys/tokens. Such keys can be forgotten…
Expand
2006
2006
Computational Intelligence and Bioinformatics, International Conference on Intelligent Computing, ICIC 2006, Kunming, China, August 16-19, 2006. Proceedings, Part III
De-shuang Huang
,
Kang Li
,
G. Irwin
International Conference on Intelligent Computing
2006
Corpus ID: 36846499
Ant Colony Optimisation.- A Constrained Ant Colony Algorithm for Image Registration.- A Novel ACO Algorithm with Adaptive…
Expand
2006
2006
A Biometric Encryption Approach Incorporating Fingerprint Indexing in Key Generation
F. Han
,
Jiankun Hu
,
Xinghuo Yu
International Conference on Intelligent Computing
2006
Corpus ID: 38537514
This paper presents a new biometric encryption protocol in which encryption key is incorporated with fingerprint indexing. Based…
Expand
2004
2004
A biometric-based framework for digital rights protection
Zhang Ge
,
Zhang Chao
Proceedings 7th International Conference on…
2004
Corpus ID: 22144718
This paper addresses the problems about biometric-based data security and digital rights protection. Based on the idea of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE