Privacy enhancements for inexact biometric templates

5Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Traditional authentication schemes utilize tokens or depend on some secret knowledge possessed by the user for verifying his or her identity. Although these techniques are widely used, they have several limitations. Both tokenand knowledge-based approaches cannot differentiate between an authorized user and an impersonator having access to the tokens or passwords. Biometrics-based authentication schemes overcome these limitations while offering usability advantages in the area of password management. However, despite its obvious advantages, the use of biometrics raises several security and privacy concerns. © 2007 Springer-Verlag London.

Cite

CITATION STYLE

APA

Ratha, N., Chikkerur, S., Connell, J., & Bolle, R. (2007). Privacy enhancements for inexact biometric templates. In Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting (pp. 153–168). Springer London. https://doi.org/10.1007/978-1-84628-984-2_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free