2022
DOI: 10.1109/access.2022.3174350
|View full text |Cite
|
Sign up to set email alerts
|

A Cancelable Biometric Security Framework Based on RNA Encryption and Genetic Algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 45 publications
0
4
0
Order By: Relevance
“…Other attacks, such as zero effort, stolen biometrics, stolen tokens, and worse stolen token-case attacks, were mitigated on iris features using an aggregation learning of patch-level ordinal relations proposed by Singh et al [95]. Mohamed et al [105] also mitigated correlation attacks on multimodal features using a genetic algorithm-based DNA and RNA approach. Likewise, despite overcoming inversion, brute-force, and ARM using adaptive, Mohamed et al [105] is able to use the same approach to wade substitution and presentation attacks on multimodal features.…”
Section: Discussion On Other Attack Scenariosmentioning
confidence: 99%
See 3 more Smart Citations
“…Other attacks, such as zero effort, stolen biometrics, stolen tokens, and worse stolen token-case attacks, were mitigated on iris features using an aggregation learning of patch-level ordinal relations proposed by Singh et al [95]. Mohamed et al [105] also mitigated correlation attacks on multimodal features using a genetic algorithm-based DNA and RNA approach. Likewise, despite overcoming inversion, brute-force, and ARM using adaptive, Mohamed et al [105] is able to use the same approach to wade substitution and presentation attacks on multimodal features.…”
Section: Discussion On Other Attack Scenariosmentioning
confidence: 99%
“…Mohamed et al [105] also mitigated correlation attacks on multimodal features using a genetic algorithm-based DNA and RNA approach. Likewise, despite overcoming inversion, brute-force, and ARM using adaptive, Mohamed et al [105] is able to use the same approach to wade substitution and presentation attacks on multimodal features. Similarly, Walia et al [112] utilized the same deep feature unification approach for evading brute-force and ARM attacks to overcome dictionary and substitution attacks, while Singh et al [114] also mitigated attacks such as zero effort, stolen biometrics, and stolen key attacks from iris and knuckle features using the phase-wise incremental learning approach.…”
Section: Discussion On Other Attack Scenariosmentioning
confidence: 99%
See 2 more Smart Citations