![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Secure Remote Fingerprint Verification Using Dual Watermarks
As user authentication by using biometric information such as fingerprint has been widely accepted, there has been a growing interest in protecting the biometric information itself against external attackers. ...
-
Chapter and Conference Paper
Workload Dispatch Planning for Real-Time Fingerprint Authentication on a Sensor-Client-Server Model
In this paper, we analyzed the collective performance of the task assignment of the fingerprint authentication on the sensor-client-server model. We first estimated the performance of primitive operations on t...
-
Chapter and Conference Paper
Automatic Alignment of Fingerprint Features for Fuzzy Fingerprint Vault
Biometrics-based user authentication has several advantages over traditional password-based systems for standalone authentication applications. This is also true for new authentication architectures known as cryp...
-
Chapter and Conference Paper
A Secure Fingerprint Authentication System on an Untrusted Computing Environment
In this paper, we propose a secure and scalable solution for user authentication by using fingerprint verification on the sensor-client-server model, even with the client that is not necessarily trusted by the...