2023
DOI: 10.3390/math11030703
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Multi-Biometric Secure-Storage Scheme Based on Deep Learning and Crypto-Mapping Techniques

Abstract: Cybersecurity has been one of the interesting research fields that attract researchers to investigate new approaches. One of the recent research trends in this field is cancelable biometric template generation, which depends on the storage of a cipher (cancelable) template instead of the original biometric template. This trend ensures the confidential and secure storage of the biometrics of a certain individual. This paper presents a cancelable multi-biometric system based on deep fusion and wavelet transforma… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 39 publications
0
4
0
Order By: Relevance
“…1. Logistic map [27,28]: The first 1,000 elements (x-999…x0) are ignored due to the transient period. If n > 0, then the time series is calculated for xn.…”
Section: Generation Of Synthetic Time Seriesmentioning
confidence: 99%
“…1. Logistic map [27,28]: The first 1,000 elements (x-999…x0) are ignored due to the transient period. If n > 0, then the time series is calculated for xn.…”
Section: Generation Of Synthetic Time Seriesmentioning
confidence: 99%
“…The design of cancelable biometric transforms makes the recovery of the original biometric data a computationally hard process [8,9]. Several studies have been presented to generate cancelable biometrics [10][11][12][13].…”
Section: Related Workmentioning
confidence: 99%
“…In collaborative learning, some people might act dishonestly by giving false information or doing things wrong, either to keep data private or for selfish reasons [1,2]. There are many sensitive pieces of data created by social activities, like network activities, travel data, electronic health records, financial data, and personal information [3,4].…”
Section: Introductionmentioning
confidence: 99%