2019
DOI: 10.1109/tifs.2018.2855669
|View full text |Cite
|
Sign up to set email alerts
|

Random Distance Method for Generating Unimodal and Multimodal Cancelable Biometric Features

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
28
0
1

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 81 publications
(29 citation statements)
references
References 31 publications
0
28
0
1
Order By: Relevance
“…Kaur and Khanna [18] proposes a random distance method. Considering the multimodal cancelable biometric template approach, it generates a discriminative and privacypreserving revocable pseudo-biometric identities.…”
Section: B Biometric Security and Privacy Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Kaur and Khanna [18] proposes a random distance method. Considering the multimodal cancelable biometric template approach, it generates a discriminative and privacypreserving revocable pseudo-biometric identities.…”
Section: B Biometric Security and Privacy Workmentioning
confidence: 99%
“…Lai et al [16] YES NO YES NO Lai et al [17] YES NO YES NO Nagar et al [15] YES NO YES NO Nassir and Perumal [14] YES YES NO NO Rathgeb et al [20] YES NO YES NO Kumar and Kumar [12] YES NO YES NO Li et al [13] YES NO YES NO Kaur and Sofat [35] YES NO NO NO Zhou and Ren [11] YES NO YES NO Toli and Preneel [10] YES YES NO NO Kaur and Khanna [18] YES NO YES NO Our proposed scheme YES YES YES YES complete the purpose task. Also, it allows us to use the IDN algorithm created, ensuring the anonymity of the records.…”
Section: Interoperabilitymentioning
confidence: 99%
See 1 more Smart Citation
“…Feature extraction is an important step in speech retrieval, with most research making use of perceptual hashes [7][8][9] or audio fingerprints [10][11][12]. In addition, in order to improve system security, some good methods have been applied, such as zero-leakage biometric protection [13], cancelable biometrics [14,15], biometrics hashing [16,17], and secret key generation [18].…”
Section: Introductionmentioning
confidence: 99%
“…However, the retrieval efficiency is not high due to its use of a high-complexity encryption algorithm. Cancelable biometrics [14,15] transform the original biometric identity of a user to a pseudo-biometric identity that is used for storage and matching purposes. The use of a pseudo-identity mitigates privacy risks and allows revocability in the case of compromise.…”
Section: Introductionmentioning
confidence: 99%