2016
DOI: 10.1049/iet-bmt.2015.0035
|View full text |Cite
|
Sign up to set email alerts
|

Review of key‐binding‐based biometric data protection schemes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
8
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 114 publications
1
8
0
Order By: Relevance
“…To provide new insight into depression detection, there are different types of re-search exploring the relationship between mental wellbeing and language use. Sig-mund Freud [13], dating back to the earliest years of psychology, wrote about Freud-ian slips or linguistic errors to expose the authors' inner thoughts and feelings. Vari-ous approaches to the relationship between depression and its language have been established through the development of sociology and psycholinguistic theories.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…To provide new insight into depression detection, there are different types of re-search exploring the relationship between mental wellbeing and language use. Sig-mund Freud [13], dating back to the earliest years of psychology, wrote about Freud-ian slips or linguistic errors to expose the authors' inner thoughts and feelings. Vari-ous approaches to the relationship between depression and its language have been established through the development of sociology and psycholinguistic theories.…”
Section: Related Workmentioning
confidence: 99%
“…For example, according to the cognitive theory of depression of Aaron. [ 13], affect-ed people appear to view themselves and their environment in mostly negative terms. Via derogatory words and first-person pronouns, they also express them-selves.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Biometric cryptosystems [8][9][10][11][12][13] are designed to securely bind a cryptographic key with biometrics or generate a key from a biometric. Key binding biometric techniques [14] offer solutions to biometric-dependent key release and biometric template protection. The key binding biometric techniques have the following security advantages [1]: template protection, secure key release, pseudonymous authentication, prevention from several traditional attacks against biometric systems, biometric comparisons are performed indirectly, and more social acceptance.…”
Section: Motivationmentioning
confidence: 99%
“…The ISO/IEC Standard 24745 on biometric information protection defines two major components for any BTP scheme: pseudonymous identifier and auxiliary data [6]. Based upon the generation technique of these two pieces of information, BTP schemes are broadly categorised as either cancellable biometrics [7] or biometric cryptosystems [8]. Our work is related to the later notion in which the biometric features are encoded using one‐way transformation functions.…”
Section: Introductionmentioning
confidence: 99%