Review Article
[Retracted] Biometric Authentication for Intelligent and Privacy-Preserving Healthcare Systems
Table 1
List of existing methods with their approaches and limitations.
| Scheme | Year | Approach | Limitations |
| [20] | 2012 | Asymmetric | Forgery attacks are possible | [21] | 2015 | Cryptographic hash function | Vulnerable to impersonation attacks and insider attacks | [22] | 2012 | Symmetric encryption | User tracking attacks are possible | [23] | 2016 | Cryptographic hash function | Experiencing issues with transmitting secrecy and revocability | [13] | 2018 | Fingerprint verification | Fingerprints can also be stolen by capturing your prints without you knowing | [18] | 2015 | Hardware tokens | Many people find it difficult to carry hardware tokens and may lose them sometimes | [24] | 2020 | Bloom filter and format-preserving encryption | The primary downside is its probabilistic nature |
|
|