Skip to Content

76 Results Found

  • Article
  • Open Access
18 Citations
6,202 Views
19 Pages

Post-Quantum Biometric Authentication Based on Homomorphic Encryption and Classic McEliece

  • Rosario Arjona,
  • Paula López-González,
  • Roberto Román and
  • Iluminada Baturone

5 January 2023

Homomorphic encryption is a powerful mechanism that allows sensitive data, such as biometric data, to be compared in a protected way, revealing only the comparison result when the private key is known. This is very useful for non-device-centric authe...

  • Article
  • Open Access
45 Citations
10,358 Views
24 Pages

29 December 2018

Biometric verification systems have become prevalent in the modern world with the wide usage of smartphones. These systems heavily rely on storing the sensitive biometric data on the cloud. Due to the fact that biometric data like fingerprint and iri...

  • Feature Paper
  • Article
  • Open Access
1,520 Views
22 Pages

9 September 2025

Homomorphic encryption solutions tend to be costly in terms of memory and computational resources, making them difficult to implement. In this paper, we present Kyber AHE, a lightweight additive homomorphic encryption scheme for computing the additio...

  • Article
  • Open Access
9 Citations
2,986 Views
26 Pages

12 September 2023

In this paper, a new physical layer authenticated encryption (PLAE) scheme based on the multi-parameter fractional Fourier transform–Orthogonal frequency division multiplexing (MP-FrFT-OFDM) is suggested for secure image transmission over the I...

  • Review
  • Open Access
78 Citations
13,550 Views
23 Pages

A Review of Homomorphic Encryption for Privacy-Preserving Biometrics

  • Wencheng Yang,
  • Song Wang,
  • Hui Cui,
  • Zhaohui Tang and
  • Yan Li

29 March 2023

The advancement of biometric technology has facilitated wide applications of biometrics in law enforcement, border control, healthcare and financial identification and verification. Given the peculiarity of biometric features (e.g., unchangeability,...

  • Article
  • Open Access
27 Citations
7,158 Views
22 Pages

Cloud computing offers the possibility of providing suitable access within a network for a set of resources. Many users use different services for outsourcing their data within the cloud, saving and mitigating the local storage and other resources in...

  • Article
  • Open Access
6 Citations
4,597 Views
16 Pages

This paper provides preliminary research regarding the implementation and evaluation of a hybrid mechanism of authentication based on fingerprint recognition interconnected with RFID technology, using Arduino modules, that can be deployed in differen...

  • Article
  • Open Access
20 Citations
4,124 Views
20 Pages

A Hybrid AES with a Chaotic Map-Based Biometric Authentication Framework for IoT and Industry 4.0

  • Ayman Altameem,
  • Prabu P,
  • Senthilnathan T,
  • Ramesh Chandra Poonia and
  • Abdul Khader Jilani Saudagar

5 January 2023

The Internet of Things (IoT) is being applied in multiple domains, including smart homes and energy management. This work aims to tighten security in IoTs using fingerprint authentications and avoid unauthorized access to systems for safeguarding use...

  • Article
  • Open Access
1 Citations
939 Views
28 Pages

4 August 2025

The proliferation of biometric technology across various domains including user identification, financial services, healthcare, security, law enforcement, and border control introduces convenience in user identity verification while necessitating rob...

  • Article
  • Open Access
1,178 Views
30 Pages

As quantum computing continues to advance, it threatens the long-term protection of traditional cryptographic methods, especially in biometric authentication systems where it is important to protect sensitive data. To overcome this challenge, we pres...

  • Proceeding Paper
  • Open Access
396 Views
9 Pages

Secure and Efficient Biometric Data Streaming with IoT for Wearable Healthcare

  • Nikolaos Tournatzis,
  • Stylianos Katsoulis,
  • Ioannis Chrysovalantis Panagou,
  • Evangelos Nannos,
  • Ioannis Christakis and
  • Grigorios Koulouras

15 February 2026

The growing adoption of wearable devices creates a critical need for robust and secure Internet of Things solutions to manage biometric data streams. Current architectures often lack emphasis on seamless data capture, secure cloud storage and integra...

  • Review
  • Open Access
115 Citations
22,144 Views
26 Pages

Biometrics for Internet-of-Things Security: A Review

  • Wencheng Yang,
  • Song Wang,
  • Nor Masri Sahri,
  • Nickson M. Karie,
  • Mohiuddin Ahmed and
  • Craig Valli

14 September 2021

The large number of Internet-of-Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment. Biometrics offers an interesting window of opportunity to improve the usability and security...

  • Article
  • Open Access
45 Citations
7,794 Views
15 Pages

Securing Fingerprint Template Using Blockchain and Distributed Storage System

  • Moses Arhinful Acquah,
  • Na Chen,
  • Jeng-Shyang Pan,
  • Hong-Mei Yang and
  • Bin Yan

4 June 2020

Biometrics, with its uniqueness to every individual, has been adapted as a security authentication feature by many institutions. These biometric data are processed into templates that are saved on databases, and a central authority centralizes and co...

  • Article
  • Open Access
255 Views
34 Pages

A Robust Image Encryption Framework Using Deep Feature Extraction and AES Key Optimization

  • Sahara A. S. Almola,
  • Hameed A. Younis and
  • Raidah S. Khudeyer

This article presents a novel framework for encrypting color images to enhance digital data security using deep learning and artificial intelligence techniques. The system employs a two-model neural architecture: the first, a Convolutional Neural Net...

  • Article
  • Open Access
8 Citations
5,332 Views
12 Pages

Methods of Generating Key Sequences Based on Parameters of Handwritten Passwords and Signatures

  • Pavel Lozhnikov,
  • Alexey Sulavko,
  • Alexander Eremenko and
  • Danil Volkov

25 October 2016

The modern encryption methods are reliable if strong keys (passwords) are used, but the human factor issue cannot be solved by cryptographic methods. The best variant is binding all authenticators (passwords, encryption keys, and others) to the ident...

  • Article
  • Open Access
5 Citations
3,315 Views
23 Pages

19 April 2021

With the recent advances in mobile technologies, biometric verification is being adopted in many smart devices as a means for authenticating their owners. As biometric data leakage may cause stringent privacy issues, many proposals have been offered...

  • Article
  • Open Access
24 Citations
4,637 Views
19 Pages

27 January 2023

Demand for data security is increasing as information technology advances. Encryption technology based on biometrics has advanced significantly to meet more convenient and secure needs. Because of the stability of face traits and the difficulty of co...

  • Article
  • Open Access
11 Citations
3,316 Views
20 Pages

15 January 2024

In the current context in which user authentication is the first line of defense against emerging attacks and can be considered a defining element of any security infrastructure, the need to adopt alternative, non-invasive, contactless, and scalable...

  • Article
  • Open Access
12 Citations
3,823 Views
20 Pages

12 July 2023

The scientific study of privacy-preserving biometrics, represented by the palmprint, face, and iris, has grown tremendously. That being said, there has not been much attention paid to the proper preservation, transmission, and authentication of biome...

  • Article
  • Open Access
32 Citations
12,502 Views
31 Pages

25 November 2021

With the expansion of smartphone and financial technologies (FinTech), mobile money emerged to improve financial inclusion in many developing nations. The majority of the mobile money schemes used in these nations implement two-factor authentication...

  • Article
  • Open Access
27 Citations
8,898 Views
33 Pages

Information Security Methods—Modern Research Directions

  • Alexander Shelupanov,
  • Oleg Evsyutin,
  • Anton Konev,
  • Evgeniy Kostyuchenko,
  • Dmitry Kruchinin and
  • Dmitry Nikiforov

29 January 2019

In Tomsk University of Control Systems and Radioelectronics (TUSUR) one of the main areas of research is information security. The work is carried out by a scientific group under the guidance of Professor Shelupanov. One of the directions is the deve...

  • Article
  • Open Access
8 Citations
2,936 Views
22 Pages

Intelligent Bio-Latticed Cryptography: A Quantum-Proof Efficient Proposal

  • Ohood Saud Althobaiti,
  • Toktam Mahmoodi and
  • Mischa Dohler

8 November 2022

The emergence of the Internet of Things (IoT) and the tactile internet presents high-quality connectivity strengthened by next-generation networking to cover a vast array of smart systems. Quantum computing is another powerful enabler of the next tec...

  • Article
  • Open Access
6 Citations
4,261 Views
14 Pages

Novel and Efficient Privacy-Preserving Continuous Authentication

  • Ahmed Fraz Baig,
  • Sigurd Eskeland and
  • Bian Yang

Continuous authentication enhances security by re-verifying a user’s validity during the active session. It utilizes data about users’ behavioral actions and contextual information to authenticate them continuously. Such data contain info...

  • Article
  • Open Access
22 Citations
8,443 Views
26 Pages

Facial Image Encryption for Secure Face Recognition System

  • Eimad Abusham,
  • Basil Ibrahim,
  • Kashif Zia and
  • Muhammad Rehman

A biometric authentication system is more convenient and secure than graphical or textual passwords when accessing information systems. Unfortunately, biometric authentication systems have the disadvantage of being susceptible to spoofing attacks. Au...

  • Article
  • Open Access
17 Citations
3,764 Views
19 Pages

15 July 2023

In recent times, there has been a noticeable increase in the application of human biometrics for user authentication in various domains, such as online banking. However, the use of biometric systems poses security risks and the potential for misuse,...

  • Article
  • Open Access
19 Citations
5,896 Views
24 Pages

A Secure Biometric Key Generation Mechanism via Deep Learning and Its Application

  • Yazhou Wang,
  • Bing Li,
  • Yan Zhang,
  • Jiaxin Wu and
  • Qianya Ma

13 September 2021

Biometric keys are widely used in the digital identity system due to the inherent uniqueness of biometrics. However, existing biometric key generation methods may expose biometric data, which will cause users’ biometric traits to be permanently unava...

  • Article
  • Open Access
25 Citations
4,098 Views
23 Pages

Efficient Implementation of Homomorphic and Fuzzy Transforms in Random-Projection Encryption Frameworks for Cancellable Face Recognition

  • Abeer D. Algarni,
  • Ghada M. El Banby,
  • Naglaa F. Soliman,
  • Fathi E. Abd El-Samie and
  • Abdullah M. Iliyasu

To circumvent problems associated with dependence on traditional security systems on passwords, Personal Identification Numbers (PINs) and tokens, modern security systems adopt biometric traits that are inimitable to each individual for identificatio...

  • Article
  • Open Access
64 Citations
7,324 Views
18 Pages

14 January 2021

This paper proposes a novel identity management framework for Internet of Things (IoT) and cloud computing-based personalized healthcare systems. The proposed framework uses multimodal encrypted biometric traits to perform authentication. It employs...

  • Article
  • Open Access
1,953 Views
27 Pages

5 August 2024

Remote data backup technology avoids the risk of data loss and tampering, and has higher security compared to local data backup solutions. However, the data transmission channel for remote data backup is not secure, and the backup server cannot be fu...

  • Article
  • Open Access
5 Citations
3,285 Views
8 Pages

14 December 2019

We propose a new encryption system based on a nonlinear joint transform correlator (JTC) using the information of two biometrics (one digital fingerprint for each user) as security keys of the encryption system. In order to perform the decryption and...

  • Article
  • Open Access
9 Citations
2,960 Views
20 Pages

Efficient Generation of Cancelable Face Templates Based on Quantum Image Hilbert Permutation

  • Hesham Alhumyani,
  • Ghada M. El-Banby,
  • Hala S. El-Sayed,
  • Fathi E. Abd El-Samie and
  • Osama S. Faragallah

The pivotal need to identify people requires efficient and robust schemes to guarantee high levels of personal information security. This paper introduces an encryption algorithm to generate cancelable face templates based on quantum image Hilbert pe...

  • Article
  • Open Access
4 Citations
2,032 Views
23 Pages

26 June 2023

In this paper, a framework for authorization and personal image protection that applies user accounts, passwords, and personal I-vectors as the keys for ciphering the image content was developed and connected. There were two main systems in this fram...

  • Article
  • Open Access
4,790 Views
17 Pages

27 September 2018

Today, we are witnessing increased demand for more speed and capacity in the Internet, and more processing power and storage in every end user device. Demand for greater performance is present in every system. Electronic devices and their hosted appl...

  • Review
  • Open Access
27 Citations
12,287 Views
22 Pages

Integration of Biometrics and Steganography: A Comprehensive Review

  • Ian McAteer,
  • Ahmed Ibrahim,
  • Guanglou Zheng,
  • Wencheng Yang and
  • Craig Valli

The use of an individual’s biometric characteristics to advance authentication and verification technology beyond the current dependence on passwords has been the subject of extensive research for some time. Since such physical characteristics cannot...

  • Article
  • Open Access
10 Citations
8,961 Views
21 Pages

21 February 2017

Biometric data can be used as input for PKI key pair generation. The concept of not saving the private key is very appealing, but the implementation of such a system shouldn’t be rushed because it might prove less secure then current PKI infrastructu...

  • Article
  • Open Access
4 Citations
2,557 Views
18 Pages

Dual Hashing Index Cancellable Finger Vein Template Based on Gaussian Random Mapping

  • Xueyou Hu,
  • Liping Zhang,
  • Huabin Wang,
  • Jian Zhou and
  • Liang Tao

28 January 2022

In the existing cancellable finger vein template protection schemes, the original biometric features cannot be well protected, which results in poor security. In addition, the performance of matching recognition performances after generating a cancel...

  • Article
  • Open Access
16 Citations
3,377 Views
26 Pages

Efficient Multi-Biometric Secure-Storage Scheme Based on Deep Learning and Crypto-Mapping Techniques

  • Ahmed Sedik,
  • Ahmed A. Abd El-Latif,
  • Mudasir Ahmad Wani,
  • Fathi E. Abd El-Samie,
  • Nariman Abdel-Salam Bauomy and
  • Fatma G. Hashad

30 January 2023

Cybersecurity has been one of the interesting research fields that attract researchers to investigate new approaches. One of the recent research trends in this field is cancelable biometric template generation, which depends on the storage of a ciphe...

  • Article
  • Open Access
5 Citations
4,426 Views
31 Pages

The Emerging Challenges of Wearable Biometric Cryptosystems

  • Khalid Al Ajlan,
  • Tariq Alsboui,
  • Omar Alshaikh,
  • Isa Inuwa-Dute,
  • Saad Khan and
  • Simon Parkinson

Cryptographic key generation and data encryption and decryption using wearable biometric technologies is an emerging research area with significant potential for authentication and communication security. The research area is rapidly developing, and...

  • Article
  • Open Access
21 Citations
4,681 Views
20 Pages

WGAN-E: A Generative Adversarial Networks for Facial Feature Security

  • Chunxue Wu,
  • Bobo Ju,
  • Yan Wu,
  • Neal N. Xiong and
  • Sheng Zhang

Artificial intelligence technology plays an increasingly important role in human life. For example, distinguishing different people is an essential capability of many intelligent systems. To achieve this, one possible technical means is to perceive a...

  • Article
  • Open Access
374 Views
23 Pages

2 December 2025

The vulnerability of transmitted digital images has become a pressing concern due to recent advancements in multimedia technology. Conventional encryption methods often fail to meet the requirements of large-scale real-time multimedia security. In or...

  • Article
  • Open Access
2 Citations
2,632 Views
13 Pages

Efficient Cancelable Template Generation Based on Signcryption and Bio Hash Function

  • Vani Rajasekar,
  • Muzafer Saračević,
  • Darjan Karabašević,
  • Dragiša Stanujkić,
  • Eldin Dobardžić and
  • Sathya Krishnamoorthi

29 November 2022

Cancelable biometrics is a demanding area of research in which a cancelable template conforming to a biometric is produced without degrading the efficiency. There are numerous approaches described in the literature that can be used to generate these...

  • Article
  • Open Access
11 Citations
5,449 Views
10 Pages

Today, the significance of biometrics is more pronounced than ever in accurately allowing access to valuable resources, from personal devices to highly sensitive buildings, as well as classified information. Researchers are pushing forward toward dev...

  • Article
  • Open Access
17 Citations
4,186 Views
13 Pages

22 February 2022

Background: Information and communication technology development provides services to various fields. In particular, the development of mobile technology has made ubiquitous services possible. However, as technology advances, security is being emphas...

  • Article
  • Open Access
1 Citations
987 Views
13 Pages

25 August 2025

Volumetric video streaming holds transformative potential for telemedicine, enabling immersive remote consultations, surgical training, and real-time collaborative diagnostics. However, transmitting sensitive patient data (e.g., 3D medical scans, sur...

  • Article
  • Open Access
16 Citations
6,947 Views
17 Pages

A biometric recognition system is one of the leading candidates for the current and the next generation of smart visual systems. The visual system is the engine of the surveillance cameras that have great importance for intelligence and security purp...

  • Article
  • Open Access
828 Views
28 Pages

3 December 2025

Advanced sensors in connected automated vehicles (CAVs) increasingly collect facial biometric information for environmental perception, posing serious privacy leakage risks. However, existing privacy protection methods for automotive data primarily f...

  • Article
  • Open Access
3 Citations
4,102 Views
30 Pages

8 September 2020

Security objectives are the triad of confidentiality, integrity, and authentication, which may be extended with availability, utility, and control. In order to achieve these goals, cryptobiometrics is essential. It is desirable that a number of chara...

  • Article
  • Open Access
791 Views
14 Pages

Quantum-Enhanced Facial Biometrics: A Hybrid Framework with Post-Quantum Security

  • Satinder Singh,
  • Avnish Thakur,
  • Moin Hasan and
  • Guneet Singh Bhatia

15 December 2025

Face recognition systems are widely used for biometric authentication but face two major problems. First, processing high-resolution images and large databases requires extensive computational time. Second, emerging quantum computers threaten to brea...

  • Article
  • Open Access
4 Citations
2,389 Views
17 Pages

A Hybrid Protection Scheme for the Gait Analysis in Early Dementia Recognition

  • Francesco Castro,
  • Donato Impedovo and
  • Giuseppe Pirlo

19 December 2023

Human activity recognition (HAR) through gait analysis is a very promising research area for early detection of neurodegenerative diseases because gait abnormalities are typical symptoms of some neurodegenerative diseases, such as early dementia. Whi...

  • Article
  • Open Access
1 Citations
1,639 Views
15 Pages

Pressure-Insensitive Epidermal Thickness of Fingertip Skin for Optical Image Encryption

  • Wangbiao Li,
  • Bo Zhang,
  • Xiaoman Zhang,
  • Bin Liu,
  • Hui Li,
  • Shulian Wu and
  • Zhifang Li

26 March 2024

In this study, an internal fingerprint-guided epidermal thickness of fingertip skin is proposed for optical image encryption based on optical coherence tomography (OCT) combined with U-Net architecture of a convolutional neural network (CNN). The epi...

of 2