Secure Biometric Cryptosystem for Distributed System
نویسندگان
چکیده
منابع مشابه
Ear Biometric Cryptosystem
587 ISSN: 2278 – 7798 All Rights Reserved © 2014 IJSETR Abstract— Biometrics play a important role for user authentication in distributed environment .But security is main issue so Biocryptography is an art of science which provide security and privacy by using biometric templates. Bio-Cryptography is a progressive technology that combines biometrics with cryptography. It is a method using bi...
متن کاملBiometric Cryptosystem Using Online Signatures
Biometric cryptosystems combine cryptography and biometrics to benefit from the strengths of both fields. In such systems, while cryptography provides high and adjustable security levels, biometrics brings in non-repudiation and eliminates the need to remember passwords or to carry tokens etc. In this work we present a biometric cryptosystems which uses online signatures, based on the Fuzzy Vau...
متن کاملBASE: a Proposed Secure Biometric Authentication System
The use of biometrics as a secure remote authentication mechanism is hindered by a series of issues. In the case of fingerprints, an attacker can make physical copies of fingerprints by ‘lifting’ latent fingerprints off a non-porous surface. These lifted fingerprints can be used to illegitimately gain access to an authentication system. Password authentication systems only accept passwords that...
متن کاملSecure Sketch for Biometric Templates
There have been active discussions on how to derive a consistent cryptographic key from noisy data such as biometric templates, with the help of some extra information called a sketch. It is desirable that the sketch reveals little information about the biometric templates even in the worst case (i.e., the entropy loss should be low). The main difficulty is that many biometric templates are rep...
متن کاملSecure Biometric Authentication System Architecture using Error Correcting Codes and Distributed Cryptography
The most emerging technology for people identification and authentication is biometrics. In contrast with traditional recognition approaches, biometric authentication relies on who a person is or what a person does, being based on strictly personal traits, much more difficult to be forgotten, lost, stolen, copied or forged than traditional data. In this paper, we focus on two vulnerable points ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Communication Networks and Security
سال: 2011
ISSN: 2231-1882
DOI: 10.47893/ijcns.2011.1016