Optical cryptography with biometrics for multi-depth objects
نویسندگان
چکیده
منابع مشابه
Combining cryptography with biometrics effectively
We propose the first practical and secure way to integrate the iris biometric into cryptographic applications. A repeatable binary string, which we call a biometric key, is generated reliably from genuine iris codes. A well-known difficulty has been how to cope with the 10 to 20% of error bits within an iris code and derive an errorfree key. To solve this problem, we carefully studied the error...
متن کاملBiometrics for Computer Security and Cryptography
In the last decade of computer security, using biometrics for various types of security problems becomes more and more popular. The uniqueness of biometrics for any specific humanbeing makes the identification system more secure. Biometrics are widely used in person identification and verification. But using biometrics by means of cryptography is a new research area and there is less work in li...
متن کاملQuantum cryptography for multi - user passive optical networks
Quantum cryptography has been shown to be an effective technique for the secure distribution of cryptographic keys on point-to-point communication links. Here, we describe adaptations of the existing quantum cryptography protocols and equipment configurations that allow secure key distribution to be performed on a variety of multiuser passive optical network (PON) architectures. These adaptatio...
متن کاملEnhancing Information Security and Privacy by Combining Biometrics with Cryptography
Enhancing Information Security and Privacy by Combining Biometrics with
متن کاملShadow Penumbras for Complex Objects by Depth-Dependent Filtering of Multi-Layer Depth Images
This paper presents an efficient algorithm for filtering multi-layer depth images (MDIs) in order to produce approximate penumbras. The filtering is performed on a MDI that represents the view from the light source. The algorithm is based upon both ray tracing and the z-buffer shadow algorithm, and is closely related to convolution methods. The method’s effectiveness is demonstrated on especial...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Scientific Reports
سال: 2017
ISSN: 2045-2322
DOI: 10.1038/s41598-017-12946-8