Identification and Key Distribution Based on Biometric Information

نویسنده

  • Valery Korzhik
چکیده

Alice y(password) ? f(.) – one way function Important remark: With the use of one-way function it is assumed that " y " is distributed trully randomly. Otherwise – nothing is taken for granted. Defects of this approach: • Good password can be forgotten by Alice, • Storing of password in memory increases the risk of its theft, • Short password can be easy memorized but it can be easy found by adversary Access control x=f(y) x

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Development of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals

Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...

متن کامل

Wavelet Based Fingerprint Authentication System: a Review

Biometric recognition refers to the use of biological characteristics for identification and verification of individuals. Use of biometric is increasing nowadays because biometric characteristics are difficult to replicate and lifelong. Applications which require only the authorized persons to access the resources are information systems, National id systems, voter and driver registrations, doc...

متن کامل

LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...

متن کامل

Privacy Protection Schemes for Fingerprint Recognition Systems

The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechan...

متن کامل

Robust Iris Recognition in Unconstrained Environments

A biometric system provides automatic identification of an individual based on a unique feature or characteristic possessed by him/her. Iris recognition (IR) is known to be the most reliable and accurate biometric identification system. The iris recognition system (IRS) consists of an automatic segmentation mechanism which is based on the Hough transform (HT). This paper presents a robust IRS i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008