2018
DOI: 10.21833/ijaas.2018.01.009
|View full text |Cite
|
Sign up to set email alerts
|

Biometric covert acquisition protection by enhancing sweat glands and cryptography

Abstract: Various biometric technologies were developed and effectively used around the world which includes fingerprints, face, iris, palm-print, speech and signatures. Fingerprints are most preferred mainly due to low cost of algorithms and sensors. Spoof attacks and template leakage are the major vulnerabilities to biometric authentication system. A biometric authentication plan with template protection is an opposition to almost all types of adversaries. If someone's biometric template which is stored in the databas… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
references
References 7 publications
0
0
0
Order By: Relevance