نتایج جستجو برای: biometric cryptosystem
تعداد نتایج: 14652 فیلتر نتایج به سال:
Cryptography provides the secure manner of information transmission over the insecure channel. It authenticates messages based on the key but not on the user. It requires a lengthy key to encrypt and decrypt the sending and receiving the messages, respectively. But these keys can be guessed or cracked. Moreover, Maintaining and sharing lengthy, random keys in enciphering and deciphering process...
Biometric information is regarded as highly sensitive information and therefore encryption techniques for biometric information are needed to address security and privacy requirements of biometric information. Most security analyses for these encryption techniques focus on the scenario of one user enrolled in a single biometric system. In practice, biometric systems are deployed at different pl...
– Securing the privacy of biometric data has become a critical issue. This paper gives a multi biometrics cryptosystem that combines features of fingerprint and palmprint to overcome several drawbacks of uni biometrics cryptosystem. Preprocessing is a soul of an image processing in which feature enhancement is first step, in this system feature enhancement of input image that is fingerprint and...
Multi-biometric systems are being increasingly deployed in many large biometric applications, because they have several advantages such as lower error rates. Multi-biometric systems require storage of multiple biometric templates (e.g., fingerprint, iris and face) for each user, which results in increased user privacy and system security. The features of fingerprint, iris and face are obtained....
In this paper we present a novel on-line signature based biometric recognition system, where cryptographic techniques are employed to provide protection and cancelability to function based signature templates. The performances of the proposed protected on-line signature recognition system are evaluated on the public MCYT signature database, and compared with the performances achievable using un...
We present the kernel implementation of a Mobile Certification Authority (MCA). Our MCA kernel is able to issue digital certificates fully-complying with the X.509v3 standard; it supports either RSA or ECDSA as a public key cryptosystem engine and; it can incorporate biometric-based user identification information (in the form of fingerprint recognition) to the digital certificate. The MCA appl...
This work deals with the security challenges in authentication protocols employing volatile biometric features, where the authentication is indeed a comparison between a fresh biometric template and that enrolled during the enrollment phase. We propose a security model for biometric-based authentication protocols by assuming that the biometric features to be public. Extra attention is paid to t...
This paper focuses on a biometric cryptosystem implementation and evaluation based on a number of fingerprint texture descriptors. The texture descriptors, namely, the Gabor filter-based FingerCode, a local binary pattern (LBP), and a local direction pattern (LDP), and their various combinations are considered. These fingerprint texture descriptors are binarized using a biometric discretization...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید