Traditional authentication schemes utilize tokens or depend on some secret knowledge possessed by the user for verifying his or her identity. Although these techniques are widely used, they have several limitations. Both tokenand knowledge-based approaches cannot differentiate between an authorized user and an impersonator having access to the tokens or passwords. Biometrics-based authentication schemes overcome these limitations while offering usability advantages in the area of password management. However, despite its obvious advantages, the use of biometrics raises several security and privacy concerns. © 2007 Springer-Verlag London.
CITATION STYLE
Ratha, N., Chikkerur, S., Connell, J., & Bolle, R. (2007). Privacy enhancements for inexact biometric templates. In Security with Noisy Data: On Private Biometrics, Secure Key Storage and Anti-Counterfeiting (pp. 153–168). Springer London. https://doi.org/10.1007/978-1-84628-984-2_10
Mendeley helps you to discover research relevant for your work.