Facial Recognition with Biometric Encryption in Match-on-Card Architecture for Gaming and Other Computer Applications

Acknowledgements The authors would like to express their gratitude to Jean-Christophe Fondeur for helpful discussions and for continuous support of this work.

[1]  David Pointcheval,et al.  An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication , 2008, IWSEC.

[2]  Ann Cavoukian,et al.  Advances in Biometric Encryption: Taking Privacy by Design from Academic Research to Deployment , 2012 .

[3]  Anil K. Jain,et al.  Biometric Template Security , 2008, EURASIP J. Adv. Signal Process..

[4]  Andreas Dresen An Authentication Protocol with encrypted Biometric Data , 2010 .

[5]  Konstantinos N. Plataniotis,et al.  Biometric Encryption: Creating a Privacy-Preserving 'Watch-List' Facial Recognition System , 2013, Security and Privacy in Biometrics.

[6]  Qiang Tang,et al.  An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication , 2007, ACISP.

[7]  A. Cavoukian,et al.  Privacy-Protective Facial Recognition: Biometric Encryption Proof of Concept , 2010 .

[8]  Nalini K. Ratha,et al.  Enhancing security and privacy in biometrics-based authentication systems , 2001, IBM Syst. J..

[9]  Julien Bringer,et al.  Two Efficient Architectures for Handling Biometric Data While Taking Care of Their Privacy , 2013, Security and Privacy in Biometrics.

[10]  A. Stoianov Cryptographically secure biometrics , 2010, Defense + Commercial Sensing.

[11]  Konstantinos N. Plataniotis,et al.  Biometric Encryption: The New Breed of Untraceable Biometrics , 2010 .

[12]  Stefan Katzenbeisser,et al.  Privacy-Preserving Face Recognition , 2009, Privacy Enhancing Technologies.

[13]  Andreas Uhl,et al.  A survey on biometric cryptosystems and cancelable biometrics , 2011, EURASIP J. Inf. Secur..