نتایج جستجو برای: fuzzy vault

تعداد نتایج: 92901  

2009
Emile Kelkboom Jeroen Breebaart Raymond N. J. Veldhuis Xuebing Zhou Christoph Busch

The widespread use of biometrics and its increased popularity introduces privacy risks. In order to mitigate these risks, solutions such as the helper-data system, fuzzy vault, fuzzy extractors, and cancelable biometrics were introduced, also known as the field of template protection. Besides these developments, fusion of multiple sources of biometric information have shown to improve the verif...

2014
M. Sindhu N. Radhakrishnan

Multi-biometric systems are being increasingly deployed in many large biometric applications, because they have several advantages such as lower error rates. Multi-biometric systems require storage of multiple biometric templates (e.g., fingerprint, iris and face) for each user, which results in increased user privacy and system security. The features of fingerprint, iris and face are obtained....

2013
Wencheng Yang Jiankun Hu Song Wang

Irrevocability is one major issue in existing bio-cryptosystems. In this paper, we proposed a cancellable bio-cryptosystem by taking the full advantage of cancellable and non-invertible properties of bio-hashing biometrics. Specifically, two transformed templates are generated by using the bio-hashing algorithm and applied into two different secure sketches, fuzzy commitment sketch and fuzzy va...

2010
V. S. Meenakshi G. Padmavathi

Biometric systems are subjected to a variety of attacks. Stored biometric template attack is very severe compared to all other attacks. Providing security to biometric templates is an important issue in building a reliable personal identification system. Multi biometric systems are more resistive towards spoof attacks compared to unibiometric counterpart. Soft biometric are ancillary informatio...

Journal: :IACR Cryptology ePrint Archive 2009
Masao Kasahara

In this paper, we revisit the Forgotten Secret Recovering Scheme for k users, referred to as FSRS(k) previously proposed by the present author. FSRS(k) takes advantage of the fact that Reed-Solomon code used in FSRS(k) is constructed in a form of systematic code. We show that a particular class of FSRS(k), FSRS(1), can be successfully applied to the various cryptoscheme including Fuzzy Vault Sc...

Journal: :International Journal of Computer and Communication Technology 2012

Journal: :Jurnal Nasional Teknik Elektro dan Teknologi Informasi (JNTETI) 2017

Journal: :iranian journal of medical sciences 0
pratiksha gupta department of gynecology and obstetrics, post graduate institute of medical sciences and research, esi hospital, basai darapur, new delhi, india

the result of transvaginal sacrospinous ligament fixation technique, as part of the vaginal repair procedure for massive uterovaginal (pelvic organ prolapse stage iii and stage iv and vault prolapse) is evaluated. a total of 32 women were included in the present case series. marked uterovaginal prolapse was present in 28 women and four had vault prolapse following hysterectomy. patients with va...

Journal: :CoRR 2010
V. S. Meenakshi G. Padmavathi

Personal identification and authentication is very crucial in the current scenario. Biometrics plays an important role in this area. Biometric based authentication has proved superior compared to traditional password based authentication. Anyhow biometrics is permanent feature of a person and cannot be reissued when compromised as passwords. To over come this problem, instead of storing the ori...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید