2022
DOI: 10.1007/s11042-022-13817-9
|View full text |Cite
|
Sign up to set email alerts
|

Biometric cryptosystems: a comprehensive survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 208 publications
0
5
0
Order By: Relevance
“…In recent years, many pertinent studies have been published in the area of the use of biometrics in cryptosystems. These start from influential work published by Uludag et al (2002) [41] to recent and highly relevant studies in 2023 [42,43]. However, to the best of the authors' knowledge, there are no surveys seeking to understand the role of wearable biometric cryptosystems.…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…In recent years, many pertinent studies have been published in the area of the use of biometrics in cryptosystems. These start from influential work published by Uludag et al (2002) [41] to recent and highly relevant studies in 2023 [42,43]. However, to the best of the authors' knowledge, there are no surveys seeking to understand the role of wearable biometric cryptosystems.…”
Section: Methodsmentioning
confidence: 99%
“…In recent years, there has been increasing research interest in the use of biometric characteristics to improve the security of cryptosystems [43,63]. These attributes consist of fingerprints, iris scans, and facial recognition.…”
Section: Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…P. Kaur et.al. 16 proposed an algorithm in the combination of the fields like biometric and cryptosystem, the biometric will authenticate the data and cryptosystem will provide security. The proposed algorithm is designed using the concept BCS (Biometric and Cryptosystem).…”
Section: Related Workmentioning
confidence: 99%
“…These are severe vulnerabilities in which root or increased permissions can be passed to an unauthorized user, such as an attacker, despite a system equipped with robust security solutions. Fortunately, adding biometrics to an authentication system and biometrics-based keys to cryptographic algorithms have become good solutions for added security in any system [1][2][3][4][5].…”
Section: Introductionmentioning
confidence: 99%