<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Achieving Enhanced Security in Biometric Authentication: A Rigorous Analysis of Code-Based Fuzzy Extractor</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Oleksandr Kuznetsov</string-name>
          <email>kuznetsov@karazin.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Emanuele Frontoni</string-name>
          <email>emanuele.frontoni@unimc.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yelyzaveta Kuznetsova</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksii Smirnov</string-name>
          <email>dr.SmirnovOA@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff4">4</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ancona</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Italy</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Kropyvnytskyi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ukraine</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Workshop</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff5">5</xref>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>Biometric Authentication, Fuzzy Extractors, Cryptographic Security, Facial Recognition, Post-</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Crescimbeni</institution>
          ,
          <addr-line>30/32, 62100 Macerata</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Information Engineering, Marche Polytechnic University</institution>
          ,
          <addr-line>Via Brecce Bianche 12, 60131</addr-line>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Department of Information and Communication Systems Security, School of Computer Sciences</institution>
          ,
          <addr-line>V. N. Karazin</addr-line>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Department of Political Sciences, Communication and International Relations, University of Macerata</institution>
          ,
          <addr-line>Via</addr-line>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>Department of cyber security and software, Central Ukrainian National Technical University</institution>
          ,
          <addr-line>8</addr-line>
          ,
          <institution>University Ave</institution>
        </aff>
        <aff id="aff5">
          <label>5</label>
          <institution>Kharkiv National University</institution>
          ,
          <addr-line>4 Svobody Sq., 61022 Kharkiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff6">
          <label>6</label>
          <institution>Military Institute of Telecommunications and Information Technologies</institution>
          ,
          <addr-line>Kiev, Moskovska str., 45/1, 01015</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2023</year>
      </pub-date>
      <fpage>20</fpage>
      <lpage>21</lpage>
      <abstract>
        <p>In the contemporary digital era, the intersectionality between biometric authentication and cryptographic security has emerged as a pivotal research domain, particularly in the context of facial recognition. This study embarks on a meticulous exploration of code-based fuzzy extractors, delving into their theoretical underpinnings and practical applications within biometric authentication systems. Through a comprehensive examination of False Rejection Rate (FRR) and False Acceptance Rate (FAR) metrics, the research illuminates the delicate balance and trade-offs inherent in optimizing security Proceedings</p>
      </abstract>
      <kwd-group>
        <kwd>1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>while
ensuring
user-friendly
interactions. The study juxtaposes theoretical predictions with empirical findings, revealing
notable disparities and highlighting the complexities and unpredictabilities embedded within
real-world biometric data. Furthermore, the research navigates through the Receiver Operating
Characteristic (ROC) curves, providing a nuanced understanding of the interplay between FRR
and FAR, and its implications on system performance and reliability. While the findings offer
a foundational framework and insights into the potentialities and challenges of implementing
fuzzy extractors in biometric authentication, they also underscore the necessity for continuous
exploration and development, especially in the context of post-quantum cryptographic
resilience and real-world applicability. The study, while providing a stepping stone, invites
further research and development to navigate the evolving challenges and potentials that
permeate the dynamic landscape of biometric authentication and cryptographic systems.</p>
    </sec>
    <sec id="sec-2">
      <title>1. Introduction</title>
      <p>
        In the contemporary digital epoch, the confluence of biometric authentication and cryptographic
security has emerged as a pivotal nexus, orchestrating a symphony of secure, user-friendly, and
privacypreserving systems [
        <xref ref-type="bibr" rid="ref1 ref2">1,2</xref>
        ]. The quintessence of biometric authentication lies in its ability to intertwine
the intrinsic, unique attributes of an individual with access control mechanisms, thereby offering a
      </p>
      <p>2023 Copyright for this paper by its authors.
CEUR</p>
      <p>
        ceur-ws.org
personalized, secure, and ostensibly irreplicable mode of authentication [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. However, beneath the
surface of this technological marvel, lies a myriad of complexities, challenges, and ethical conundrums
that necessitate meticulous exploration, evaluation, and innovation.
      </p>
      <p>
        Biometric systems, while epitomizing the pinnacle of personalized security, are not impervious to
vulnerabilities and threats. The storage and utilization of raw biometric data present a formidable
challenge, intertwining the assurance of robust security with the imperative to safeguard the privacy
and ethical considerations inherent in handling such sensitive, unique data [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. The compromise of
biometric data, unlike passwords or keys, unveils a Pandora’s box of irreversible consequences, given
the immutable nature of biometric attributes. Enter the realm of Fuzzy Extractors – cryptographic
constructs that navigate through the uncertainties and variabilities inherent in biometric data, enabling
the secure derivation of cryptographic keys, without necessitating the storage of the raw biometric data
[
        <xref ref-type="bibr" rid="ref4 ref5">4,5</xref>
        ]. Fuzzy Extractors, particularly those grounded in error-correcting codes, offer a promising avenue
towards enhancing the security and privacy of biometric systems, thereby mitigating the risks associated
with the compromise of biometric templates [
        <xref ref-type="bibr" rid="ref6 ref7">6,7</xref>
        ].
      </p>
      <p>
        In the looming shadow of quantum computing, the cryptographic landscape is propelled into
uncharted territories, where traditional cryptographic schemes crumble beneath the prowess of quantum
algorithms [
        <xref ref-type="bibr" rid="ref8 ref9">8,9</xref>
        ]. The advent of post-quantum cryptography heralds a new era, where cryptographic
security is envisioned through the lens of quantum resilience [
        <xref ref-type="bibr" rid="ref10 ref11">10,11</xref>
        ]. Code-based cryptosystems,
particularly the McEliece cryptosystem, emerge as a beacon of hope in the post-quantum cryptographic
landscape, offering robust security against the potential threats posed by quantum computing [
        <xref ref-type="bibr" rid="ref12 ref13">12,13</xref>
        ].
      </p>
      <p>This paper embarks on a meticulous journey through the intricate landscape of biometric
authentication, Fuzzy Extractors, and post-quantum cryptography, weaving through the theoretical
constructs, practical implementations, and ethical considerations that permeate this domain. Through a
lens focused on security, privacy, and ethical utilization of biometric data, this exploration unveils
insights, challenges, and prospective directions in the development and implementation of biometric
authentication systems that are not only secure and user-friendly but also resilient in the face of quantum
advancements.
1.1.</p>
    </sec>
    <sec id="sec-3">
      <title>Research Gaps and Problem Statement</title>
      <p>Despite the burgeoning advancements in biometric authentication and cryptographic security, a
conspicuous gap permeates the research landscape, particularly in the context of ensuring robust,
quantum-resistant security without compromising the ethical and privacy considerations inherent in
biometric systems. The compromise of biometric templates unveils a cascade of irreversible
consequences, propelling the imperative to develop systems that not only ensure robust security but
also safeguard the intrinsic privacy and ethical considerations associated with biometric data.
Furthermore, the advent of quantum computing propels the cryptographic landscape into uncharted
territories, necessitating the exploration and implementation of post-quantum cryptographic schemes
within biometric systems. The problem, therefore, coalesces into a multifaceted challenge: How to
navigate through the complexities and variabilities inherent in biometric data to develop authentication
systems that are not only secure and user-friendly but also resilient against quantum threats, all while
safeguarding the privacy and ethical considerations intrinsic to biometric data?
1.2.</p>
    </sec>
    <sec id="sec-4">
      <title>Objective of the Study</title>
      <p>This paper, therefore, embarks on a journey to navigate through this multifaceted challenge, with
the objective to explore, evaluate, and illuminate the path towards developing biometric authentication
systems that harmonize the triad of robust security, user-friendly experience, and ethical considerations,
particularly in the context of the emerging era of quantum computing.
1.3.</p>
      <p>Structure of the Paper
 Background and Literature Review: An exploration of the current landscape of biometric
authentication, cryptographic security, and the challenges and considerations inherent in the domain.
 Theoretical Framework: A meticulous exploration of Fuzzy Extractors, particularly those
grounded in error-correcting codes, and the McEliece cryptosystem, elucidating the mechanisms,
security attributes, and potential applications within biometric authentication systems.</p>
      <p> Methodology: An exposition of the experimental design, methodologies, and ethical
considerations employed in the exploration and evaluation of Fuzzy Extractors within biometric
authentication systems.</p>
      <p> Experimental Results: A detailed presentation and analysis of the experimental findings,
juxtaposed with theoretical predictions, illuminating the complexities, challenges, and insights gleaned
through practical implementation.</p>
      <p> Discussion: A critical analysis and discussion of the findings, exploring the implications,
limitations, and potential avenues for future research and development.</p>
      <p> Conclusion: A synthesis of the findings, insights, and discussions, weaving together the threads
of exploration, analysis, and future directions.</p>
      <p>Through this exploration, the paper endeavors to contribute to the discourse on biometric
authentication, cryptographic security, and ethical considerations, illuminating the path towards the
development and implementation of robust, secure, and ethically sound biometric authentication
systems in the imminent era of quantum computing.</p>
    </sec>
    <sec id="sec-5">
      <title>2. Background and Literature Review</title>
      <p>
        The intersection of biometric authentication and cryptographic security has burgeoned into a vibrant
research domain, intertwining the physical uniqueness of biological and behavioral attributes with the
mathematical rigor of cryptographic algorithms. The allure of biometrics resides in its inherent
association with an individual, offering a seemingly robust mechanism for authentication and
identification [
        <xref ref-type="bibr" rid="ref1 ref2">1,2</xref>
        ]. However, the susceptibility of biometric systems to various attacks, especially
spoofing and data breaches, has been a persistent concern, necessitating the incorporation of
cryptographic paradigms to bolster security [
        <xref ref-type="bibr" rid="ref6 ref7">6,7</xref>
        ].
      </p>
      <p>
        Despite the robustness offered by biometric systems, the vulnerabilities inherent in the storage and
transmission of biometric templates have been a focal point of research and development. The
compromise of biometric data unveils a cascade of irreversible consequences, given the immutable
nature of biometric attributes [
        <xref ref-type="bibr" rid="ref1 ref2">1,2</xref>
        ]. Thus, the paradigm of securing biometric data, both at rest and in
transit, has propelled research into exploring cryptographic mechanisms that can safeguard against
potential compromises.
      </p>
      <p>
        In the quest to amalgamate biometric authentication with cryptographic security, Fuzzy Extractors
have emerged as a pivotal mechanism, enabling the generation of stable cryptographic keys from
biometric data, which is inherently noisy and variable [
        <xref ref-type="bibr" rid="ref4 ref5">4,5</xref>
        ]. Fuzzy Extractors, by reconciling the
variability in biometric data, facilitate the secure generation and regeneration of cryptographic keys,
thereby enabling the secure storage and transmission of biometric templates [
        <xref ref-type="bibr" rid="ref14 ref15">14,15</xref>
        ].
      </p>
      <p>
        The advent of quantum computing has cast a shadow over the cryptographic landscape, rendering
traditional cryptographic algorithms vulnerable to quantum attacks [
        <xref ref-type="bibr" rid="ref8 ref9">8,9</xref>
        ]. Post-quantum cryptography,
particularly lattice-based cryptography and code-based cryptography, has been explored as a viable
pathway towards ensuring quantum-resistant security in biometric systems [
        <xref ref-type="bibr" rid="ref11 ref16">11,16</xref>
        ]. The McEliece
cryptosystem, a code-based cryptographic scheme, has been particularly noted for its resilience against
quantum attacks, thereby offering a potential mechanism for securing biometric systems in the
imminent era of quantum computing [
        <xref ref-type="bibr" rid="ref12 ref17">12,17</xref>
        ].
      </p>
      <p>
        The intertwining of biometrics and cryptography also unveils a myriad of ethical and privacy
considerations. The storage, transmission, and processing of biometric data necessitate meticulous
consideration of privacy, consent, and data protection, particularly in the context of global data
protection regulations and ethical considerations [
        <xref ref-type="bibr" rid="ref18 ref3">3,18</xref>
        ]. Thus, the development and implementation of
biometric systems must navigate through the complex landscape of ensuring robust security while
safeguarding ethical and privacy considerations.
      </p>
      <p>
        The trajectory of research and development in biometric authentication and cryptographic security
is navigating through uncharted territories, exploring novel algorithms [
        <xref ref-type="bibr" rid="ref19 ref20">19,20</xref>
        ], mechanisms, and
paradigms that can ensure robust, secure, and ethically sound biometric systems. The exploration of
novel Fuzzy Extractors, particularly those grounded in post-quantum cryptographic schemes, is
emerging as a vibrant research domain, offering potential pathways towards developing biometric
systems that are not only secure and user-friendly but also resilient against quantum threats.
      </p>
    </sec>
    <sec id="sec-6">
      <title>3. Theoretical Framework</title>
    </sec>
    <sec id="sec-7">
      <title>3.1. Fuzzy Extractors and Error Correction</title>
      <p>
        Fuzzy Extractors, pivotal in biometric authentication, are instrumental in generating reproducible,
uniform random numbers from noisy data, which is quintessential in biometric systems due to the
inherent variability in biometric readings. The general architecture of a Fuzzy Extractor comprises two
primary algorithms [
        <xref ref-type="bibr" rid="ref4 ref5">4,5</xref>
        ]:
 Gen: A probabilistic algorithm that takes an input w and produces a public string P and a
secret key R . Mathematically, (R, P)  Gen(w) .

      </p>
      <p>Rep: A deterministic algorithm that takes an input w ' and a public string P , and reproduces
the secret R if w ' is sufficiently close to w . Mathematically, R  Rep(w, P) .</p>
      <p>The "closeness" of w and w ' is typically measured using a metric, often the Hamming distance,
defined as the number of positions at which the corresponding symbols are different.</p>
      <p>If dH (w, w)  t , where t is a threshold, the Rep algorithm should output R .
3.2.</p>
    </sec>
    <sec id="sec-8">
      <title>McEliece Cryptosystem and Fuzzy Extractors</title>
      <p>
        The McEliece cryptosystem, a seminal code-based cryptographic scheme, is renowned for its
resistance against quantum attacks [
        <xref ref-type="bibr" rid="ref12 ref13">12,13</xref>
        ]. The system employs a public/secret key pair, where the
public key is a generator matrix G of a linear [n, k] code C , and the secret key is an efficient decoding
algorithm for C (McEliece, 1978 [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]). The encryption and decryption processes are defined as:
 Encryption: A message m is encrypted by computing the ciphertext c  mG  e , where e
is a random error vector of weight t .
 Decryption: The decryption algorithm decodes c to recover the message m by correcting
the errors introduced by e .
      </p>
      <p>
        In the context of Fuzzy Extractors, the McEliece cryptosystem can be employed to secure the
transmission of biometric templates, where the error correction capability of the code C can be utilized
to correct the variations in biometric readings [
        <xref ref-type="bibr" rid="ref19 ref20">19,20</xref>
        ].
      </p>
      <p>3.3.</p>
    </sec>
    <sec id="sec-9">
      <title>Analyzing FRR and FAR in Biometric Authentication</title>
      <p>FRR 
,</p>
      <p>FAR </p>
      <p>
        False Rejection Rate (FRR) and False Acceptance Rate (FAR) are pivotal metrics in evaluating the
performance of biometric authentication systems. FRR is defined as the probability of a genuine user
being incorrectly rejected, while FAR is the probability of an imposter being incorrectly accepted.
Mathematically, they are expressed as [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]:
      </p>
      <p>FN FP</p>
      <p>FN  TP FP  TN
where FN, FP, TP, and TN represent false negatives, false positives, true positives, and true negatives,
respectively.</p>
    </sec>
    <sec id="sec-10">
      <title>Receiver Operating Characteristic (ROC) Curve</title>
      <p>
        The ROC curve, a graphical representation of the trade-off between FRR and FAR, is instrumental
in evaluating the performance of biometric systems [
        <xref ref-type="bibr" rid="ref2 ref3">2,3</xref>
        ]. The curve is plotted with FRR on the Y-axis
and 1  FAR (True Positive Rate, TPR) on the X-axis. The Area Under the Curve (AUC) provides a
scalar measure of the system’s performance
      </p>
      <p>TPR  1 FAR .</p>
      <p>The theoretical framework elucidated herein provides a mathematical foundation for the subsequent
experimental evaluations and discussions, enabling a rigorous analysis of the proposed Fuzzy Extractor
mechanisms within the context of biometric authentication and cryptographic security.</p>
    </sec>
    <sec id="sec-11">
      <title>4. Methodology</title>
      <p>This research is underpinned by a quantitative research paradigm, utilizing both experimental and
computational methods to derive insights into the performance and security of the proposed biometric
authentication system.</p>
      <p>4.1.</p>
    </sec>
    <sec id="sec-12">
      <title>Biometric Data Acquisition and Preprocessing</title>
      <p>
        Biometric data, specifically facial images, were procured from open-source databases, ensuring
adherence to ethical guidelines and data protection regulations. The images selected were of high
quality, with optimal lighting conditions to facilitate accurate biometric data extraction and analysis.
The face_recognition library, accessible at GitHub Repository [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ], was employed for facial feature
extraction and encoding. The preprocessing stage involved normalization, transformation, and encoding
of facial features to generate biometric data vectors suitable for the fuzzy extractor [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ].
4.2.
      </p>
    </sec>
    <sec id="sec-13">
      <title>Implementation</title>
    </sec>
    <sec id="sec-14">
      <title>Extractor</title>
      <p>of the</p>
    </sec>
    <sec id="sec-15">
      <title>McEliece Cryptosystem-Based Fuzzy</title>
      <p>
        The fuzzy extractor, grounded in the McEliece cryptosystem, was implemented by adhering to the
theoretical framework delineated in the [
        <xref ref-type="bibr" rid="ref19 ref20">19,20</xref>
        ]. The McEliece cryptosystem, renowned for its
resistance against quantum attacks, was integrated with error correction codes to formulate the fuzzy
extractor. The biometric data vectors, post preprocessing, were subjected to the extractor to generate
secure templates and recovery keys. The implementation was executed in a controlled computational
environment, ensuring consistency and reliability in the experimental results.
      </p>
      <p>4.3.</p>
    </sec>
    <sec id="sec-16">
      <title>Experimental Design</title>
      <p>The experiments were meticulously designed to evaluate the performance and security of the
proposed fuzzy extractor. Two primary metrics, FRR and FAR, were the focal points of the
experimental evaluation. A dataset comprising 100 images of an individual was utilized to compute
FRR, while FAR was calculated using 100 images of a different individual, ensuring a robust evaluation
of the system’s authentication capabilities.</p>
      <p>4.4.</p>
    </sec>
    <sec id="sec-17">
      <title>Analytical and Computational Analysis</title>
      <p>The experimental results were subjected to rigorous analytical and computational analysis. The FRR
and FAR values, obtained both experimentally and theoretically, were juxtaposed to discern the efficacy
and reliability of the fuzzy extractor. The ROC curve was plotted using the TPR and FRR to visualize
the performance of the biometric authentication system under varying thresholds.</p>
    </sec>
    <sec id="sec-18">
      <title>5. Experimental Results</title>
      <p>
        The experimental phase of this research was meticulously designed to probe the efficacy and
robustness of the fuzzy extractor, which is fundamentally grounded in the McEliece cryptosystem, in
the realm of biometric authentication. The experiments were conducted under controlled conditions,
utilizing a dataset of facial images, and were aimed at evaluating the system’s performance in terms of
two pivotal metrics: FRR and FAR. The dataset, comprising 100 images each of an authentic user and
an imposter, was subjected to a preprocessing stage involving normalization, transformation, and
encoding of facial features using the [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ]. The images, sourced from open-access databases, were of
high quality, ensuring clarity and accuracy in biometric data extraction and analysis.
5.1.
      </p>
    </sec>
    <sec id="sec-19">
      <title>Analysis of the FRR and FAR</title>
      <p>In the realm of biometric authentication, the FRR and FAR serve as pivotal metrics, providing a
quantifiable measure of the system’s performance in distinguishing genuine users from imposters. The
ensuing analysis meticulously dissects the experimental and theoretical values of FRR and FAR,
offering a comprehensive exploration of the system’s authentication capabilities under varying error
rates. Table 1 presents the experimental and theoretical values of FRR and FAR under different error
rates t .
the fuzzy extractor in biometric authentication. The findings underscore the necessity of a nuanced
understanding of the discrepancies between theoretical predictions and practical outcomes, and pave
the way for further research and optimization aimed at enhancing the reliability, accuracy, and security
of biometric authentication systems.</p>
      <p>5.2.</p>
    </sec>
    <sec id="sec-20">
      <title>Analysis of the Receiver Operating Characteristic (ROC) Curve</title>
      <p>The ROC curve, a fundamental tool in the field of biometric authentication, provides a
comprehensive, visual representation of a system's capability to distinguish between genuine and
imposter distributions. The ROC curve plots the TPR against the False Positive Rate (FPR), where (FPR
= 1 - FRR). The area under the ROC curve (AUC) serves as a quantitative measure, where a value closer
to 1 indicates superior system performance. The ROC curve is shown in Fig. 1:</p>
      <p> FRR Comparison: Both experimental and theoretical FRR values align closely, underscoring the
reliability of the experimental setup and the theoretical model’s accuracy in predicting system behavior.</p>
      <p> TPR Comparison: The TPR values, while exhibiting similar trends, diverge in terms of the rate
of decline, indicating potential disparities between theoretical assumptions and practical
implementations.</p>
      <p> AUC Analysis: The AUC for both experimental and theoretical ROC curves would provide a
succinct performance summary. A higher AUC in the theoretical curve might suggest optimistic
assumptions, while the experimental curve might offer a more pragmatic system evaluation.</p>
      <p>In conclusion, the ROC curve analysis elucidates the inherent trade-offs in biometric authentication
systems, providing a foundation upon which to build more secure, user-friendly systems. The insights
gleaned from this analysis pave the way for future research endeavors aimed at optimizing and
validating biometric authentication systems in real-world applications.</p>
    </sec>
    <sec id="sec-21">
      <title>6. Discussion</title>
      <p>The exploration into the realm of fuzzy extractors, particularly those grounded in code-based
cryptosystems, unveils a complex tapestry of cryptographic robustness, practicality, and the perpetual
pursuit of enhancing biometric security. The findings from our experiments and theoretical calculations,
as delineated in the preceding sections, pave the way for a nuanced discussion on the implications,
limitations, and prospective future directions in this domain.</p>
      <p>6.1.</p>
    </sec>
    <sec id="sec-22">
      <title>Implications of the Findings</title>
      <p>The experimental and theoretical results, especially those pertaining to FRR and FAR, underscore
the intricate balance that must be struck between security and usability in biometric authentication
systems. The proximity of experimental and theoretical values in our findings indicates a semblance of
predictive accuracy in the theoretical models, yet the disparities, albeit minimal, signal towards the
inherent unpredictabilities and potential anomalies in real-world applications.</p>
      <p>The ROC curve analysis, which plots the TPR against the FRR, further elucidates the trade-offs
between security and convenience. The curve, often utilized as a metric to evaluate the performance of
biometric systems, reveals that enhancing security (by minimizing FAR) invariably escalates the FRR,
thereby potentially hindering user experience by erroneously denying access to legitimate users.
6.1.</p>
    </sec>
    <sec id="sec-23">
      <title>Limitations and Challenges</title>
      <p>While the findings provide valuable insights, it is imperative to acknowledge the limitations inherent
in our study. Firstly, the utilization of professional, clear photographs under optimal lighting conditions
does not mirror the often imperfect, variable conditions under which real-world biometric systems
operate. This raises questions regarding the generalizability of our findings to more pragmatic scenarios,
where lighting, angles, and facial expressions might significantly impact the biometric data.</p>
      <p>Secondly, the assumption that bit errors in the biometric data occur independently and randomly
may not always hold true in practical applications, where errors might be systematically biased due to
various factors like sensor quality, environmental conditions, or user behavior.</p>
    </sec>
    <sec id="sec-24">
      <title>Future Research and Development Avenues</title>
      <p>The findings and limitations from our study illuminate several potential avenues for future research
and development in the field of fuzzy extractors and biometric security:</p>
      <p> Enhancing Real-World Applicability: Future research could delve into developing models and
fuzzy extractors that are more attuned to the myriad of variables and imperfections encountered in
realworld scenarios, such as varying environmental conditions, diverse user behaviors, and different types
of biometric sensors.</p>
      <p> Adaptive Fuzzy Extractors: Exploring adaptive fuzzy extractors that can dynamically adjust their
error correction capabilities based on the quality and reliability of the input biometric data could be a
promising direction, potentially mitigating the trade-off between security and usability.</p>
      <p> Post-Quantum Cryptography: Given the advent and gradual maturation of quantum computing,
investigating the integration of post-quantum cryptographic principles into fuzzy extractors to safeguard
against potential quantum attacks is paramount.</p>
      <p> Ethical and Privacy Considerations: As biometric data is inherently sensitive and personal, future
developments should also encompass robust ethical frameworks and mechanisms to ensure user
privacy, data protection, and compliance with global data protection regulations.</p>
      <p>In conclusion, while our study sheds light on the performance and intricacies of code-based fuzzy
extractors, it also underscores the necessity for continuous, iterative research and development to
navigate the evolving challenges and potentials in the domain of biometric security. The journey
towards constructing fuzzy extractors that seamlessly amalgamate cryptographic robustness with
practical usability in the face of real-world imperfections and challenges remains an ongoing, dynamic
endeavor.</p>
    </sec>
    <sec id="sec-25">
      <title>7. Conclusion</title>
      <p>The intricate interplay between biometric authentication, fuzzy extractors, and cryptographic
systems has been the focal point of our exploration, revealing not only the potentialities but also the
challenges that permeate this multifaceted domain. Through a meticulous examination of theoretical
frameworks, coupled with an empirical lens, our study has endeavored to traverse the nuanced pathways
of utilizing fuzzy extractors in biometric authentication, particularly within the context of facial
recognition.</p>
      <p>Our journey through experimental and theoretical analyses, especially concerning the FRR and FAR,
has illuminated the delicate equilibrium that must be maintained between ensuring robust security and
providing a seamless user experience. The findings, while providing a foundation, also unveil the
disparities between theoretical predictions and experimental outcomes, highlighting the inherent
complexities and unpredictable nature of real-world biometric data and authentication systems.</p>
      <p>The exploration of ROC curves further underscored the pivotal role of understanding and navigating
the trade-offs intrinsic to biometric authentication systems. The nuanced understanding of how
enhancing security invariably impacts usability, and vice versa, is paramount in advancing the
development and implementation of these systems in a manner that is both secure and user-friendly.</p>
      <p>While our study provides a scaffold, it is imperative to acknowledge the limitations and challenges
that were encountered, particularly concerning the generalizability of findings derived from optimal,
controlled conditions to the more variable and imperfect real-world scenarios. The assumptions
underpinning the theoretical models, especially regarding the random and independent occurrence of
bit errors, may not always align with the practicalities and anomalies of real-world applications.</p>
      <p>Looking forward, the horizon is replete with avenues for further exploration and development. The
integration of post-quantum cryptographic principles, the development of adaptive fuzzy extractors,
and a deeper dive into ensuring ethical compliance and user privacy protection stand out as pivotal
domains warranting further exploration and research.</p>
      <p>In the grand tapestry of biometric authentication and cryptographic systems, our study represents a
single thread, weaving through the complex, multifaceted landscape. The path forward, while
illuminated with the insights gleaned, remains an unfolding journey, demanding continuous
exploration, development, and critical examination to navigate the evolving challenges and potentials
that lie ahead.</p>
      <p>In closing, the pursuit of enhancing the robustness, security, and usability of biometric authentication
systems, especially within the burgeoning realm of fuzzy extractors and cryptographic systems, remains
an ongoing, dynamic endeavor. The insights and findings from our study, we hope, provide a stepping
stone, inspiring and informing future research, development, and practical implementations in the
vibrant, ever-evolving domain of biometric security and cryptography.</p>
    </sec>
    <sec id="sec-26">
      <title>8. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A.</given-names>
            <surname>Pane</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.M.</given-names>
            <surname>Chen</surname>
          </string-name>
          , E. Nepomuceno, Biometric Cryptography, in: K. Daimi,
          <string-name>
            <given-names>G.</given-names>
            <surname>Francia</surname>
          </string-name>
          <string-name>
            <surname>III</surname>
          </string-name>
          , L.H. Encinas (Eds.),
          <source>Breakthroughs in Digital Biometrics and Forensics</source>
          , Springer International Publishing, Cham,
          <year>2022</year>
          : pp.
          <fpage>3</fpage>
          -
          <lpage>28</lpage>
          . https://doi.org/10.1007/978-3-
          <fpage>031</fpage>
          -10706-
          <issue>1</issue>
          _
          <fpage>1</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>R.</given-names>
            <surname>Amin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Gaber</surname>
          </string-name>
          , G. ElTaweel,
          <string-name>
            <given-names>A.E.</given-names>
            <surname>Hassanien</surname>
          </string-name>
          ,
          <article-title>Biometric and Traditional Mobile Authentication Techniques: Overviews and Open Issues</article-title>
          , in: A.E. Hassanien,
          <string-name>
            <given-names>T.-H.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Kacprzyk</surname>
          </string-name>
          ,
          <string-name>
            <surname>A.I.</surname>
          </string-name>
          Awad (Eds.),
          <source>Bio-Inspiring Cyber Security and Cloud Services: Trends and Innovations</source>
          , Springer, Berlin, Heidelberg,
          <year>2014</year>
          : pp.
          <fpage>423</fpage>
          -
          <lpage>446</lpage>
          . https://doi.org/10.1007/978-3-
          <fpage>662</fpage>
          - 43616-5_
          <fpage>16</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>T.V.</given-names>
            <surname>hamme</surname>
          </string-name>
          , G. Garofalo,
          <string-name>
            <given-names>S.</given-names>
            <surname>Joos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Preuveneers</surname>
          </string-name>
          , W. Joosen,
          <article-title>AI for Biometric Authentication Systems</article-title>
          , in: L.
          <string-name>
            <surname>Batina</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          <string-name>
            <surname>Bäck</surname>
          </string-name>
          , I. Buhan, S. Picek (Eds.),
          <source>Security and Artificial Intelligence: A Crossdisciplinary Approach</source>
          , Springer International Publishing, Cham,
          <year>2022</year>
          : pp.
          <fpage>156</fpage>
          -
          <lpage>180</lpage>
          . https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -98795-
          <issue>4</issue>
          _
          <fpage>8</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Dodis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Reyzin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Smith</surname>
          </string-name>
          , Fuzzy Extractors, in: 2007: pp.
          <fpage>79</fpage>
          -
          <lpage>99</lpage>
          . https://doi.org/10.1007/978-1-
          <fpage>84628</fpage>
          -984-
          <issue>2</issue>
          _
          <fpage>5</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Dodis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Ostrovsky</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Reyzin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Smith</surname>
          </string-name>
          , Fuzzy Extractors:
          <article-title>How to Generate Strong Keys from Biometrics and Other Noisy Data</article-title>
          ,
          <string-name>
            <given-names>SIAM J.</given-names>
            <surname>Comput</surname>
          </string-name>
          .
          <volume>38</volume>
          (
          <year>2008</year>
          )
          <fpage>97</fpage>
          -
          <lpage>139</lpage>
          . https://doi.org/10.1137/060651380.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>B.</given-names>
            <surname>Fuller</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Reyzin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Smith</surname>
          </string-name>
          , When Are Fuzzy Extractors Possible?,
          <source>IEEE Transactions on Information Theory</source>
          .
          <volume>66</volume>
          (
          <year>2020</year>
          )
          <fpage>5282</fpage>
          -
          <lpage>5298</lpage>
          . https://doi.org/10.1109/TIT.
          <year>2020</year>
          .
          <volume>2984751</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A.</given-names>
            <surname>Jana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.K.</given-names>
            <surname>Sarker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ebrahimi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Hitzler</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.T.</given-names>
            <surname>Amariucai</surname>
          </string-name>
          ,
          <article-title>Neural Fuzzy Extractors: A Secure Way to Use Artificial Neural Networks for Biometric User Authentication</article-title>
          , arXiv:
          <year>2003</year>
          .08433 [Cs]. (
          <year>2020</year>
          ). http://arxiv.org/abs/
          <year>2003</year>
          .08433 (
          <issue>accessed December 4</issue>
          ,
          <year>2021</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>E. National Academies</surname>
          </string-name>
          <source>of Sciences, Quantum Computing: Progress and Prospects</source>
          ,
          <year>2018</year>
          . https://doi.org/10.17226/25196.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>J.</given-names>
            <surname>Preskill</surname>
          </string-name>
          ,
          <article-title>Quantum Computing in the NISQ era and beyond</article-title>
          ,
          <source>Quantum</source>
          .
          <volume>2</volume>
          (
          <year>2018</year>
          )
          <article-title>79</article-title>
          . https://doi.org/10.22331/q-2018
          <source>-08-06-79.</source>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>T.</given-names>
            <surname>Takagi</surname>
          </string-name>
          , ed.,
          <string-name>
            <surname>Post-Quantum</surname>
            <given-names>Cryptography</given-names>
          </string-name>
          , Springer International Publishing, Cham,
          <year>2016</year>
          . https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -29360-8.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>D.J.</given-names>
            <surname>Bernstein</surname>
          </string-name>
          ,
          <string-name>
            <surname>Post-Quantum</surname>
            <given-names>Cryptography</given-names>
          </string-name>
          , in: H.
          <string-name>
            <surname>C.A. van Tilborg</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          Jajodia (Eds.),
          <source>Encyclopedia of Cryptography and Security</source>
          ,
          <string-name>
            <surname>Springer</surname>
            <given-names>US</given-names>
          </string-name>
          , Boston, MA,
          <year>2011</year>
          : pp.
          <fpage>949</fpage>
          -
          <lpage>950</lpage>
          . https://doi.org/10.1007/978-1-
          <fpage>4419</fpage>
          -5906-5_
          <fpage>386</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>R.</given-names>
            <surname>Overbeck</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Sendrier</surname>
          </string-name>
          ,
          <article-title>Code-based cryptography</article-title>
          , in: D.J.
          <string-name>
            <surname>Bernstein</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Buchmann</surname>
          </string-name>
          , E. Dahmen (Eds.),
          <string-name>
            <surname>Post-Quantum</surname>
            <given-names>Cryptography</given-names>
          </string-name>
          , Springer, Berlin, Heidelberg,
          <year>2009</year>
          : pp.
          <fpage>95</fpage>
          -
          <lpage>145</lpage>
          . https://doi.org/10.1007/978-3-
          <fpage>540</fpage>
          -88702-
          <issue>7</issue>
          _
          <fpage>4</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>J.H.</given-names>
            <surname>Cheon</surname>
          </string-name>
          , T. Johansson, eds.,
          <string-name>
            <surname>Post-Quantum Cryptography</surname>
            : 13th International Workshop, PQCrypto 2022,
            <given-names>Virtual</given-names>
          </string-name>
          <string-name>
            <surname>Event</surname>
          </string-name>
          ,
          <source>September 28-30</source>
          ,
          <year>2022</year>
          , Proceedings, Springer International Publishing, Cham,
          <year>2022</year>
          . https://doi.org/10.1007/978-3-
          <fpage>031</fpage>
          -17234-2.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>N.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Guo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Mu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Susilo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Nepal</surname>
          </string-name>
          ,
          <article-title>Fuzzy Extractors for Biometric Identification</article-title>
          ,
          <source>in: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)</source>
          ,
          <year>2017</year>
          : pp.
          <fpage>667</fpage>
          -
          <lpage>677</lpage>
          . https://doi.org/10.1109/ICDCS.
          <year>2017</year>
          .
          <volume>107</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>J.M. Kirss</surname>
          </string-name>
          ,
          <article-title>Biometrics in SplitKey using fuzzy extraction</article-title>
          , Information Security Research Institute, Cybernetica AS Mäealuse 2/1 12618
          <string-name>
            <given-names>Tallinn</given-names>
            <surname>Estonia</surname>
          </string-name>
          ,
          <year>2022</year>
          . https://cyber.ee/uploads/Tech_Report_Biometrics_and_Fuzzy_Extraction_d9a6053ba0.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>D.J.</given-names>
            <surname>Bernstein</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Buchmann</surname>
          </string-name>
          , E. Dahmen, eds.,
          <string-name>
            <surname>Post-Quantum</surname>
            <given-names>Cryptography</given-names>
          </string-name>
          , Springer Berlin Heidelberg, Berlin, Heidelberg,
          <year>2009</year>
          . https://doi.org/10.1007/978-3-
          <fpage>540</fpage>
          -88702-7.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>R.J. McEliece</surname>
          </string-name>
          ,
          <source>A Public-Key Cryptosystem Based On Algebraic Coding Theory, Deep Space Network Progress Report</source>
          .
          <volume>44</volume>
          (
          <year>1978</year>
          )
          <fpage>114</fpage>
          -
          <lpage>116</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>I.</given-names>
            <surname>Chingovska</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Erdogmus</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Anjos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Marcel</surname>
          </string-name>
          ,
          <article-title>Face Recognition Systems Under Spoofing Attacks</article-title>
          , in: T. Bourlai (Ed.),
          <source>Face Recognition Across the Imaging Spectrum</source>
          , Springer International Publishing, Cham,
          <year>2016</year>
          : pp.
          <fpage>165</fpage>
          -
          <lpage>194</lpage>
          . https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -28501-
          <issue>6</issue>
          _
          <fpage>8</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Kiyan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Uvarova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Serhiienko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Smirnov</surname>
          </string-name>
          ,
          <article-title>New Code Based Fuzzy Extractor for Biometric Cryptography</article-title>
          , in: 2018 International Scientific-Practical Conference Problems of Infocommunications. Science and
          <string-name>
            <surname>Technology (PIC S T)</surname>
          </string-name>
          ,
          <year>2018</year>
          : pp.
          <fpage>119</fpage>
          -
          <lpage>124</lpage>
          . https://doi.org/10.1109/INFOCOMMST.
          <year>2018</year>
          .
          <volume>8632040</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Zakharov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Frontoni</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Romeo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Rosati</surname>
          </string-name>
          ,
          <article-title>Deep Learning Based Fuzzy Extractor for Generating Strong Keys from Biometric Face Images</article-title>
          ,
          <source>in: 2022 IEEE 9th International Conference on Problems of Infocommunications, Science and Technology (PIC S&amp;T)</source>
          ,
          <year>2022</year>
          : pp.
          <fpage>421</fpage>
          -
          <lpage>426</lpage>
          . https://doi.org/10.1109/PICST57299.
          <year>2022</year>
          .
          <volume>10238643</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>A.</given-names>
            <surname>Geitgey</surname>
          </string-name>
          ,
          <string-name>
            <surname>Face</surname>
            <given-names>Recognition</given-names>
          </string-name>
          , (
          <year>2022</year>
          ). https://github.com/ageitgey/face_recognition (
          <issue>accessed February 10</issue>
          ,
          <year>2022</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>G.</given-names>
            <surname>Hua</surname>
          </string-name>
          , Facial Recognition Technologies, in: L.A.
          <string-name>
            <surname>Schintler</surname>
          </string-name>
          , C.L.
          <string-name>
            <surname>McNeely</surname>
          </string-name>
          (Eds.),
          <source>Encyclopedia of Big Data</source>
          , Springer International Publishing, Cham,
          <year>2022</year>
          : pp.
          <fpage>475</fpage>
          -
          <lpage>479</lpage>
          . https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -32010-6_
          <fpage>93</fpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>