Login / Signup
A secure biometric authentication scheme based on robust hashing.
Yagiz Sutcu
Husrev T. Sencar
Nasir D. Memon
Published in:
MM&Sec (2005)
Keyphrases
</>
authentication scheme
user authentication
security analysis
smart card
image encryption
authentication protocol
secret key
image authentication
security flaws
public key
tampering detection
elliptic curve cryptography
biometric systems
information security
feature extraction
key management
face recognition