نتایج جستجو برای: fuzzy vault

تعداد نتایج: 92901  

2010
Cengiz ÖRENCİK Thomas B. PEDERSEN Erkay SAVAŞ Mehmet KESKİNÖZ

The fuzzy vault scheme is a well-known technique to mitigate privacy, security, and usability related problems in biometric identification applications. The basic idea is to hide biometric data along with secret information amongst randomly selected chaff points during the enrollment process. Only the owner of the biometric data who presents correct biometrics can recover the secret and identif...

2006
Alisher Kholmatov Berrin A. Yanikoglu

Biometric cryptosystems combine cryptography and biometrics to benefit from the strengths of both fields. In such systems, while cryptography provides high and adjustable security levels, biometrics brings in non-repudiation and eliminates the need to remember passwords or to carry tokens etc. In this work we present a biometric cryptosystems which uses online signatures, based on the Fuzzy Vau...

2007
Daesung Moon Sungju Lee Seunghwan Jung Yongwha Chung Miae Park Okyeon Yi

Biometric-based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as the compromise of the data will be permanent. To protect the biometric data, we need to store it in a non–invertible transformed version. Thus, even if the transformed version is compromised, the actual biometric data remains safe. In...

Journal: :IET Biometrics 2016
Benjamin Tams

The fuzzy vault scheme is a cryptographic primitive being considered for storing fingerprint minutiae protected. A well-known problem of the fuzzy vault scheme is its vulnerability against correlation attack -based cross-matching thereby conflicting with the unlinkability requirement and irreversibility requirement of effective biometric information protection. Yet, it has been demonstrated tha...

Journal: :JCM 2011
Lifang Wu Peng Xiao Songlong Yuan Siyuan Jiang Chang Wen Chen

The fuzzy vault scheme has recently become popular approaches to biometric template protection. Since the original scheme has been designed to work with unordered biometric features, such a scheme cannot effectively utilize order information. We present in this paper a new fuzzy vault scheme that can effectively utilize the ordered characteristics of biometric features. In this scheme, we devel...

Journal: :Journal of Discrete Mathematical Sciences and Cryptography 2021

Authentication has become a necessity these days because the use in most of life applications from accounts to devices, especially with rapid development technology versus traditional methods such as password and PIN, that is, infeasible for methods. New have emerged, including biometric systems. In this paper we will explore possibility combining cryptography biometrics order achieve authentic...

Journal: :Computers & Security 2022

Biometric technologies, especially face recognition, have become an essential part of identity management systems worldwide. In deployments biometrics, secure storage biometric information is necessary in order to protect the users’ privacy. this context, cryptosystems are designed meet key requirements protection enabling a privacy-preserving and comparison data, e.g. feature vectors extracted...

Journal: :IACR Cryptology ePrint Archive 2017
Charles Herder Benjamin Fuller Marten van Dijk Srinivas Devadas

Passwords bootstrap symmetric and asymmetric cryptography, tying keys to an individual user. Biometrics are intended to strengthen this tie. Unfortunately, biometrics exhibit noise between repeated readings. Fuzzy extractors (Dodis et al., Eurocrypt 2004) derive stable symmetric keys from noisy sources. We ask if it is also possible for noisy sources to directly replace private keys in asymmetr...

2008
Alisher Kholmatov

Privacy Protecting Biometric Authentication Systems As biometrics gains popularity and proliferates into the daily life, there is an increased concern over the loss of privacy and potential misuse of biometric data held in central repositories. The major concerns are about i) the use of biometrics to track people, ii) non-revocability of biometrics (eg. if a fingerprint is compromised it can no...

Journal: :EURASIP Journal on Information Security 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید