Proposed Method to Generated Strong Keys by Fuzzy Extractor And Biometric
نویسندگان
چکیده
منابع مشابه
Biometric Fuzzy Extractor Scheme for Iris Templates
Biometric recognition offers a reliable and natural solution to the problem of user authentication by means of her physical and behavioral traits. An iris template protection scheme which associates and retrieves a secret value with a high level of security, is proposed. The security is guaranteed thanks to the requirements of fuzzy extractors. The implementation of the scheme is done in Java a...
متن کاملFuzzy Topology Generated by Fuzzy Norm
In the current paper, consider the fuzzy normed linear space $(X,N)$ which is defined by Bag and Samanta. First, we construct a new fuzzy topology on this space and show that these spaces are Hausdorff locally convex fuzzy topological vector space. Some necessary and sufficient conditions are established to illustrate that the presented fuzzy topology is equivalent to two previously studied fuz...
متن کاملRecursive Learning Fuzzy Logic Model for Building Feature Extractor in Identification Biometric System
vii صخلم ھلامعتساب كلذو ،ةیرتمویبلا فرعتلا ةمظنأ يف يبابضلا قطنملا قیبطت وھ انیدیأ نیب يتلا ةركذملا هذھ نم فدھلا يرتمویب ماظن يأ يف ةمھم ةلحرم يھ يتلاو روصلا نم ةیصخشلا صئاصخلا جرختسم ءانب يف . جذومنلا رایتخا مت لاود لامعتساب كلذو ةیلمعلا هذھل بسانملا يبابضلا ةمیقلل ةیطقن ءامتنا لاود و روصلا لسكب تایثادحلا ةیصوغ ءامتنا لسكبلل ةیدامرلا . بیردت ةیلمعل عضخی جذومنلا اذھ ریخلأا يف ربتعُتل ةمدقملا صخش...
متن کاملSecurity Efficiency Analysis of a Biometric Fuzzy Extractor for Iris Templates
A Biometric fuzzy extractor scheme for iris templates was recently presented in [3]. This fuzzy extractor binds a cryptographic key with the iris template of a user, allowing to recover such cryptographic key by authenticating the user by means of a new iris template from her. In this work, an analysis of the security efficiency of this fuzzy extractor is carried out by means of a study about t...
متن کاملFuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
We provide formal definitions and efficient secure techniques for • turning noisy information into keys usable for any cryptographic application, and, in particular, • reliably and securely authenticating biometric data. Our techniques apply not just to biometric information, but to any keying material that, unlike traditional cryptographic keys, is (1) not reproducible precisely and (2) not di...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Engineering & Technology
سال: 2018
ISSN: 2227-524X
DOI: 10.14419/ijet.v7i3.27.17672