2022
DOI: 10.1007/978-981-19-2004-2_21
|View full text |Cite
|
Sign up to set email alerts
|

Reliable Biometric Authentication with Privacy Protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 20 publications
0
1
0
Order By: Relevance
“…Fingerprint, retina, iris recognition, speaker recognition, hand and finger geometry, vein geometry, voice identity, etc., [2], [3] are just a few standard authentication methods. Due to the myriad facial traits and the ease with which facial recognition systems can be implemented, face recognition has emerged as the most significant physiological biometric modality to manage data security [4][5][6][7][8]. These systems are deceived by spoofing attacks such as images, movies, cut photos, masks, etc.…”
Section: Introductionmentioning
confidence: 99%
“…Fingerprint, retina, iris recognition, speaker recognition, hand and finger geometry, vein geometry, voice identity, etc., [2], [3] are just a few standard authentication methods. Due to the myriad facial traits and the ease with which facial recognition systems can be implemented, face recognition has emerged as the most significant physiological biometric modality to manage data security [4][5][6][7][8]. These systems are deceived by spoofing attacks such as images, movies, cut photos, masks, etc.…”
Section: Introductionmentioning
confidence: 99%