نتایج جستجو برای: biometric cryptosystem

تعداد نتایج: 14652  

In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...

2010
Abhishek Nagar Shantanu Rane Anthony Vetro

Security of biometric templates stored in a system is important because a stolen template can compromise system security as well as user privacy. Therefore, a number of secure biometrics schemes have been proposed that facilitate matching of feature templates without the need for a stored biometric sample. However, most of these schemes suffer from poor matching performance owing to the difficu...

2009
Gevorg Margarov Maha Tolba

In this paper a method for the biometric based secret sharing problem using the fuzzy vault construct is described. The secret is protected using the biometric data of the sharing parties, revealing a secret when a predetermined number of the sharing parties collaborate. The distinction between biometric cryptosystems is discussed. The basic idea of the fuzzy vault scheme is discussed. Finally ...

Journal: :EURASIP J. Adv. Sig. Proc. 2015
Cagatay Karabat Mehmet Sabir Kiraz Hakan Erdogan Erkay Savas

In this paper, we propose a new biometric verification and template protection system which we call the THRIVE system. The system includes novel enrollment and authentication protocols based on threshold homomorphic cryptosystem where the private key is shared between a user and the verifier. In the THRIVE system, only encrypted binary biometric templates are stored in the database and verifica...

2017
D. Gifty Thomas

Fuzzy vault fingerprint Cryptosystem uses pair polar framework. In this framework the number of fake minutiae is added to the genuine minutiae to hide the original features to provide security to the template. The chaff points are placed at a distance to provide a frame work to hide the genuine features of the fingerprint template. The genuine and fake minutiae are distinguished. The implementa...

2006
Berry Schoenmakers Pim Tuyls

We consider the framework of secure n-party computation based on threshold homomorphic cryptosystems as put forth by Cramer, Damg̊ard, and Nielsen at Eurocrypt 2001. When used with Paillier’s cryptosystem, this framework allows for efficient secure evaluation of any arithmetic circuit defined over ZN , where N is the RSA modulus of the underlying Paillier cryptosystem. In this paper, we extend t...

Journal: :International journal of applied engineering and management letters 2022

Purpose: Biometric trends are used in many systems because of security aspects. The cryptosystem is such an example which uses a biometric. But due to stored biometric data for the authentication, this can be dangerous issue. Therefore, comparison conventional system, voice system provides efficient safety, and unique identity. Among various speech recognition or processing methods, there one c...

2007
Amioy Kumar Ajay Kumar

The combination of cryptology and biometrics has emerged as promising component of information security. Despite the current popularity of palmprint biometric, there has not been any attempt to investigate its usage for the fuzzy vault. This paper therefore investigates the possible usage of palmprints in fuzzy vault to develop a user friendly and reliable crypto system. We suggest the use of b...

2014
G.Mary Amirtha Sagayee

In recent times, generating cryptographic key from biometrics has gained huge attractiveness in research community due to its superior performance in security system. Objective of this research work is to generate tough and nonrepeating cryptographic keys. In this paper, we have proposed non –repeating and irrevocable cryptographic key from biometric images. The proposed cryptographic method en...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید