Biometric Template Security Triggered by Two Dimensional Logistic Sine Map
نویسندگان
چکیده
منابع مشابه
Biometric Template Security
Biometric recognition offers a reliable solution to the problem of user authentication in identity management systems. With the widespread deployment of biometric systems in various applications, there are increasing concerns about the security and privacy of biometric technology. Public acceptance of biometrics technology will depend on the ability of system designers to demonstrate that these...
متن کاملTemplate Security in Biometric Systems
Date iii Microfilm or other copies of this dissertation are obtainable from ACKNOWLEDGEMENT This dissertation is a testimonial to the people who helped me in some way to become the person who I am right now. It is my distinct pleasure to convey my gratitude to them all in this page. First and foremost I would like to thank to my mother, father and brother whose unconditional love and support ma...
متن کاملBiometric template transformation: a security analysis
One of the critical steps in designing a secure biometric system is protecting the templates of the users that are stored either in a central database or on smart cards. If a biometric template is compromised, it leads to serious security and privacy threats because unlike passwords, it is not possible for a legitimate user to revoke his biometric identifiers and switch to another set of uncomp...
متن کاملA Study on Biometric Template Security
The increasing popularity of biometrics and cryptography is driven by the widespread stipulation on information security. Abundant efforts have been made in developing successful methods in these areas in order to accomplish an enhanced level of information security. There are two dominant issues in information security enhancement. One is to defend the user ownership and control the access to ...
متن کاملImage encryption using the two-dimensional logistic chaotic map
Chaos maps and chaotic systems have been proved to be useful and effective for cryptography. In this paper, the two-dimensional logistic map with complicated basin structures and attractors are first used for image encryption. The proposed method adopts the classic framework of the permutation-substitution network in cryptography and thus ensures both confusion and diffusion properties for a se...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia Computer Science
سال: 2018
ISSN: 1877-0509
DOI: 10.1016/j.procs.2018.10.387