Identification and Key Distribution Based on Biometric Information
نویسنده
چکیده
Alice y(password) ? f(.) – one way function Important remark: With the use of one-way function it is assumed that " y " is distributed trully randomly. Otherwise – nothing is taken for granted. Defects of this approach: • Good password can be forgotten by Alice, • Storing of password in memory increases the risk of its theft, • Short password can be easy memorized but it can be easy found by adversary Access control x=f(y) x
منابع مشابه
Development of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals
Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...
متن کاملWavelet Based Fingerprint Authentication System: a Review
Biometric recognition refers to the use of biological characteristics for identification and verification of individuals. Use of biometric is increasing nowadays because biometric characteristics are difficult to replicate and lifelong. Applications which require only the authorized persons to access the resources are information systems, National id systems, voter and driver registrations, doc...
متن کاملLPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring
Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...
متن کاملPrivacy Protection Schemes for Fingerprint Recognition Systems
The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechan...
متن کاملRobust Iris Recognition in Unconstrained Environments
A biometric system provides automatic identification of an individual based on a unique feature or characteristic possessed by him/her. Iris recognition (IR) is known to be the most reliable and accurate biometric identification system. The iris recognition system (IRS) consists of an automatic segmentation mechanism which is based on the Hough transform (HT). This paper presents a robust IRS i...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008