نتایج جستجو برای: biometric cryptosystem
تعداد نتایج: 14652 فیلتر نتایج به سال:
In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...
Security of biometric templates stored in a system is important because a stolen template can compromise system security as well as user privacy. Therefore, a number of secure biometrics schemes have been proposed that facilitate matching of feature templates without the need for a stored biometric sample. However, most of these schemes suffer from poor matching performance owing to the difficu...
In this paper a method for the biometric based secret sharing problem using the fuzzy vault construct is described. The secret is protected using the biometric data of the sharing parties, revealing a secret when a predetermined number of the sharing parties collaborate. The distinction between biometric cryptosystems is discussed. The basic idea of the fuzzy vault scheme is discussed. Finally ...
In this paper, we propose a new biometric verification and template protection system which we call the THRIVE system. The system includes novel enrollment and authentication protocols based on threshold homomorphic cryptosystem where the private key is shared between a user and the verifier. In the THRIVE system, only encrypted binary biometric templates are stored in the database and verifica...
Fuzzy vault fingerprint Cryptosystem uses pair polar framework. In this framework the number of fake minutiae is added to the genuine minutiae to hide the original features to provide security to the template. The chaff points are placed at a distance to provide a frame work to hide the genuine features of the fingerprint template. The genuine and fake minutiae are distinguished. The implementa...
We consider the framework of secure n-party computation based on threshold homomorphic cryptosystems as put forth by Cramer, Damg̊ard, and Nielsen at Eurocrypt 2001. When used with Paillier’s cryptosystem, this framework allows for efficient secure evaluation of any arithmetic circuit defined over ZN , where N is the RSA modulus of the underlying Paillier cryptosystem. In this paper, we extend t...
Purpose: Biometric trends are used in many systems because of security aspects. The cryptosystem is such an example which uses a biometric. But due to stored biometric data for the authentication, this can be dangerous issue. Therefore, comparison conventional system, voice system provides efficient safety, and unique identity. Among various speech recognition or processing methods, there one c...
The combination of cryptology and biometrics has emerged as promising component of information security. Despite the current popularity of palmprint biometric, there has not been any attempt to investigate its usage for the fuzzy vault. This paper therefore investigates the possible usage of palmprints in fuzzy vault to develop a user friendly and reliable crypto system. We suggest the use of b...
In recent times, generating cryptographic key from biometrics has gained huge attractiveness in research community due to its superior performance in security system. Objective of this research work is to generate tough and nonrepeating cryptographic keys. In this paper, we have proposed non –repeating and irrevocable cryptographic key from biometric images. The proposed cryptographic method en...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید