نتایج جستجو برای: biometric cryptosystem

تعداد نتایج: 14652  

Journal: :Security and Communication Networks 2023

At the moment, digital documents are just as important paper documents. As a result, authenticity is essential, especially in legal situations and forensics. technology advances, these signature algorithms become weaker, necessitating development of authentication schemes capable withstanding current security threats. This study proposed scheme based on an asymmetric key cryptosystem user’s bio...

Journal: :EURASIP J. Adv. Sig. Proc. 2009
Amioy Kumar Ajay Kumar

The combination of cryptology and biometrics has emerged as promising component of information security. Despite the current popularity of palmprint biometric, there has not been any attempt to investigate its usage for the fuzzy vault. This paper therefore investigates the possible usage of palmprint in fuzzy vault to develop a user friendly and reliable crypto system. We suggest the use of bo...

2012
K. Seetharaman R. Ragupathy

We use Low Density Parity Check (LDPC) error correction code to solve fuzziness i.e., the variability and noise in iris code generated from Iris Recognition System (IRS) and Secure Hash Algorithm (SHA-512) to transform unique iris code into hash string to make them as a Cancellable Biometric. SHA-512 hash string is used as a key for 512 bits Advanced Encryption Standard (AES) encryption process...

Journal: :I. J. Network Security 2006
Dimitrios L. Delivasilis Sokratis K. Katsikas

Side channel analysis is a technique that enables the adversary to benefit from information leakages occurring due to the implementation of encryption algorithms on hardware. Since its introduction, side channel analysis has been extensively used in cryptology, more precisely in cryptanalysis. In this paper we describe a novel method, according to which side channel analysis is applied to biome...

2015
Christina-Angeliki Toli Bart Preneel

The exponential growth of immigration crisis and the recent terrorism cases revealed the increase of fraud occurrences, cloning and identity theft with numerous social, economic and political consequences. The trustworthiness of biometrics during verification processes has been compromised by spoofing attackers sprang up to exploit the security gaps. Additionally, the cryptography’s role in the...

2013
N. Geethanjali K. Thamaraiselvi

Biometrics based authentication provides various advantages over other authentication methods, it has replaced the password based authentication and token based authentication. Biometrics plays a major role in Automated Teller Machine (ATM) system, E-Commerce, Online banking, Passports. The growth in electronic transactions has been increased tremendously; there is a greater demand for fast and...

2005
Martin Drahanský

This dissertation describes certain special art of biometric systems. General biometric systems are well known in public and systems based on the fingerprint recognition belong, without question, to the most familiar ones. Fingerprints have been used for identification and authentication for a long time because their uniqueness and reliability have been proven in everyday life. Nowadays, there ...

Journal: :Computers & Security 2022

Biometric technologies, especially face recognition, have become an essential part of identity management systems worldwide. In deployments biometrics, secure storage biometric information is necessary in order to protect the users’ privacy. this context, cryptosystems are designed meet key requirements protection enabling a privacy-preserving and comparison data, e.g. feature vectors extracted...

Journal: :I. J. Network Security 2010
Sunil V. K. Gaddam Manohar Lal

This paper puts forth a fresh methodology for the secure storage of fingerprint template by generating Secured Feature Matrix and keys for cryptographic techniques applied for data Encryption or Decryption with the aid of cancellable biometric features. Conventional techniques depend on biometric features like face, fingerprint, hand geometry, iris, signature, keystroke, voice and the like for ...

Journal: :CoRR 2004
Manoj Kumar

RSA Cryptosystem ElGamal Cryptosystem Messey Omura Cryptosystem Knapsack Cryptosystem Construction of Knapsack Cryptosystem Quadratic Residue Cryptosystem Hybrid Cryptosystem: Diffie Hellman’s key Exchange Digital Signatures A Classification of Digital Signature Schemes Digital Signature Schemes with Appendix Digital Signature Schemes with Message Recovery RSA Signature Scheme Feige– Fiat – Sha...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید