Strategic Information Splitting Using Biometric Patterns

نویسندگان

  • Marek R. Ogiela
  • Lidia Ogiela
  • Urszula Ogiela
چکیده

In this paper will be proposed a new algorithm for secure strategic information sharing using biometric information. In classic cryptographic threshold schemes used for secret splitting and sharing there aren’t any connection between generated shares and particular participants of threshold protocol. In fact sometimes it may be useful to generate a special personalized shadows, which allow not only reveal the original secret information, but also to identify who is the owner of particular shares or information shadow.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Gait Recognition using Time-of-Flight Sensor

This paper develops a biometric gait recognition system based on 3D video acquired by a Time-of-Flight (ToF) sensor providing depth and intensity frames. A first step of the proposed gait analysis is the automatic extraction of the silhouette of the person via segmentation. The segmentation of the silhouette is performed on the depth frame which provide information which describes the distance ...

متن کامل

Coronavirus: Discover the Structure of Global Knowledge, Hidden Patterns & Emerging Events

Background & Objective:  The present study aimed at exploring the structure of global knowledge, hidden patterns, and emerging Coronavirus events using co-word techniques. Co-word analysis is one of the most efficient scientific methods to analyze the structure and dynamics of knowledge and the general state of research.  Materials & Methods:  This applied research performed using Co-word anal...

متن کامل

BSC: A Novel Scheme for Providing Security using Biometric Smart Card

Technology advances day by day and the new things are being developed. There are many new technologies being introduced and developed in any discipline. Data Security plays a vital role and Biometric security systems is one of the new trends to be developed, which has its advantages for controlling access, protecting sensitive data, tracking on-line systems, etc.,. Biometric technologies such a...

متن کامل

Advanced techniques for knowledge management and access to strategic information

This publication discusses advanced knowledge management techniques based on information splitting and sharing algorithms for secret, strategic information. Information splitting techniques will be dedicated to problems of secure information storage and managing sets of strategic data. The management of strategic corporate/organisational data will provide the illustration of the discussion of k...

متن کامل

Increasing the Reliability of Biometric Verification by using 3D Face Information and Palm Vein Patterns

Introduction In our research we present the idea of reliable multimodal biometric system that combines the analysis of 3D facial information and palm blood vessel pattern. The increasing verification of result reliability is based on multidimensionality and advanced acquisition of the biometric data. Multidimensionality includes the combination of two or more biometric parameters in one system ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • J. Internet Serv. Inf. Secur.

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2012