2019
DOI: 10.1002/mmce.21905
|View full text |Cite
|
Sign up to set email alerts
|

Double watermarking‐based biometric access control for radio frequency identification card

Abstract: The integration of data privacy and security into radio frequency identification (RFID) technology, particularly into RFID tags, has become one of the most attractive research areas. A crucial challenge in RFID technology research lies in providing an efficient protection for systems against information theft and illegitimate access. This article proposes a secure solution based on an RFID card for physical biometric access-control applications. This is done by integrating two biometric modalities, namely face… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 34 publications
0
5
0
Order By: Relevance
“…The post-quantum McEliece cryptosystem has been carried out for remote education [20]. Watermarking and deep learning techniques canbe implemented for facial and fingerprint recognition [17,27]. Hashing algorithms are also exploited where the MD5 algorithm in [25] and SHA3-224 with Burrows-Abadi-Needham logic in [34] were used to increase integrity.…”
Section: Rfid Security Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…The post-quantum McEliece cryptosystem has been carried out for remote education [20]. Watermarking and deep learning techniques canbe implemented for facial and fingerprint recognition [17,27]. Hashing algorithms are also exploited where the MD5 algorithm in [25] and SHA3-224 with Burrows-Abadi-Needham logic in [34] were used to increase integrity.…”
Section: Rfid Security Solutionsmentioning
confidence: 99%
“…Hashing algorithms are also exploited where the MD5 algorithm in [25] and SHA3-224 with Burrows-Abadi-Needham logic in [34] were used to increase integrity. Meanwhile, we can mention the IDEA cipher [35], Present [42], the modified Mickey 2.0 [21], and the multi-factor authentication schemes [12,27], among other alternative solutions that might replace the commonly used ones.…”
Section: Rfid Security Solutionsmentioning
confidence: 99%
“…A security solution based on RFID card-based physical biometric access control is proposed in [22]. This scheme combines RFID technology and dual watermark technology to provide a biometric control access framework.…”
Section: Related Workmentioning
confidence: 99%
“…Compared to several biometric recognition modalities El Kissi Ghalleb and Amara [3]; Mhenni et al [4]; Rzouga Haddada and Essoukri Ben Amara [5] that expose the weaknesses for authentication, face modality Ouannes et al [6] is the main natural biometric measure that makes it efficient with a high level of security. Therefore, over the last few years, facial recognition systems have gained wide attention from many corporations and government organizations, notably for surveillance purposes [7].…”
Section: Introductionmentioning
confidence: 99%