نتایج جستجو برای: biometric cryptosystem
تعداد نتایج: 14652 فیلتر نتایج به سال:
personal authentication and identification as compared to the traditional authentication methods. Biometric templates are vulnerable to variety of attacks due to their inherent nature. When a person's biometric is compromised his identity is lost. In contrast to password, biometric is not revocable. Therefore, providing security to the stored biometric template is very crucial. Crypto biometric...
Biometric recognition refers to the process of matching an input biometric to stored biometric information. In particular, biometric verification refers to matching the live biometric input from an individual to the stored biometric template about that individual. Examples of biometrics include face images, fingerprint images, iris images, retinal scans, etc. Thus, image processing techniques p...
Any untoward incident occurs while transmitting data digitally may lead to threats whenever the is transmitted malicious destination unknowingly, there arises a question of integrity. In this scenario cryptography plays crucial role in ensuring users both confidentiality and integrity over various network platform, supporting with algorithms like AES, hashing etc., ensure end user safety. paper...
Biometric techniques are gaining importance for personal authentication and identification as compared to the traditional authentication methods. Biometric templates are vulnerable to variety of attacks due to their inherent nature. When a person’s biometric is compromised his identity is lost. In contrast to password, biometric is not revocable. Therefore, providing security to the stored biom...
In Eurocrypt 2003, Augot and Finiasz presented a novel Public-key Cryptosystem based on the Polynomial Reconstruction Problem. While there is no immediate way to use coding theoretic techniques to break their system, it has been subsequently broken by Coron who presented a ciphertext-only attack (based on a worst case analysis). In the present work we study the optimal parameter setting of thei...
For given N=pq with p and q different odd primes and natural m Banghe Li introduced the public key cryptosystem [1]. In the case m=1 the system is just the famous RSA public key cryptosystem [2]. The cryptosystem is more secure in general [2] than RSA system. But one has to solve a few problems connected with the introduced cryptosystem. The cryptosystem works with elements of the quotient ring...
Goldreich-Goldwasser-Halevi (GGH) public key cryptosystem is an instance of lattice-based cryptosystems whose security is based on the hardness of lattice problems. In fact, GGH cryptosystem is the lattice version of the first code-based cryptosystem, proposed by McEliece. However, it has a number of drawbacks such as; large public key length and low security level. On the other hand, Low Densi...
Biometric security systems that verify a person’s identity by scanning fingers, hands, eye or face are becoming more and more common. As a result biometrics is one of the fastest growing industries. Applications for biometrics range from homeland security (for example the European biometric passport), physical access to various facilities (banks, amusement parks, office buildings, computer term...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید