نتایج جستجو برای: fuzzy vault

تعداد نتایج: 92901  

Journal: :EURASIP J. Adv. Sig. Proc. 2009
Amioy Kumar Ajay Kumar

The combination of cryptology and biometrics has emerged as promising component of information security. Despite the current popularity of palmprint biometric, there has not been any attempt to investigate its usage for the fuzzy vault. This paper therefore investigates the possible usage of palmprint in fuzzy vault to develop a user friendly and reliable crypto system. We suggest the use of bo...

Journal: :Journal of the Korea Institute of Information Security and Cryptology 2016

2014
G. Radhamani G. R. Damodaran

Multimodal biometrics technology that uses more than two sorts of biometrics data has been universally applied for person certification and proof. Researchers have advised that the ear may have benefits over the face for biometric recognition. In this study, a technique for face and ear recognition has suggested. The face image and ear images are prearranged as input. From the pre-processed inp...

2007
Amioy Kumar Ajay Kumar

The combination of cryptology and biometrics has emerged as promising component of information security. Despite the current popularity of palmprint biometric, there has not been any attempt to investigate its usage for the fuzzy vault. This paper therefore investigates the possible usage of palmprints in fuzzy vault to develop a user friendly and reliable crypto system. We suggest the use of b...

Journal: :International Journal of Computer Applications 2010

Journal: :TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES 2017

Journal: :Eureka: Physics and Engineering 2021

Biometric systems gather information from the person's biometric attributes, used extensively to authorize individuals. Due obvious convenience of using specific individual traits such as face, fingerprints, palm veins, and irises, authentication is becoming more common. In particular, Iris are in high demand for high-assurance applications, because they contain a broad feature set remain stabl...

2017
D. Gifty Thomas

Fuzzy vault fingerprint Cryptosystem uses pair polar framework. In this framework the number of fake minutiae is added to the genuine minutiae to hide the original features to provide security to the template. The chaff points are placed at a distance to provide a frame work to hide the genuine features of the fingerprint template. The genuine and fake minutiae are distinguished. The implementa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید