Review Article

[Retracted] Biometric Authentication for Intelligent and Privacy-Preserving Healthcare Systems

Table 1

List of existing methods with their approaches and limitations.

SchemeYearApproachLimitations

[20]2012AsymmetricForgery attacks are possible
[21]2015Cryptographic hash functionVulnerable to impersonation attacks and insider attacks
[22]2012Symmetric encryptionUser tracking attacks are possible
[23]2016Cryptographic hash functionExperiencing issues with transmitting secrecy and revocability
[13]2018Fingerprint verificationFingerprints can also be stolen by capturing your prints without you knowing
[18]2015Hardware tokensMany people find it difficult to carry hardware tokens and may lose them sometimes
[24]2020Bloom filter and format-preserving encryptionThe primary downside is its probabilistic nature