Skip to main content

and
  1. No Access

    Article

    Privacy-preserving similarity evaluation and application to remote biometrics authentication

    In this paper, a new method for secure remote biometric authentication preventing the vulnerability of compromised biometrics is presented. The idea is based on a public-key cryptographical protocol, referred as

    Hiroaki Kikuchi, Kei Nagai, Wakaha Ogata, Masakatsu Nishigaki in Soft Computing (2010)