نتایج جستجو برای: biometric encryption

تعداد نتایج: 36436  

Journal: :Optics express 2011
A Alfalou C Brosseau N Abdallah M Jridi

We report a new spectral multiple image fusion analysis based on the discrete cosine transform (DCT) and a specific spectral filtering method. In order to decrease the size of the multiplexed file, we suggest a procedure of compression which is based on an adapted spectral quantization. Each frequency is encoded with an optimized number of bits according its importance and its position in the D...

2017

Expressions of face are an important factor in the modern human interacting systems that find the difference between the human expressive states at different times. Scrambling or encryption of data in a captured image gives a solution to an enhanced system. Consider the Internet of Things (IoT) directed distribution of image/video, the encryption of face is considered as a major part for protec...

2015
Manasi G. Vaidya

This paper discusses the methods of biometrics recognition technology and applications that used as personal identifying factors. Biometric recognition refers to an automatic recognition of individuals based on a feature vector(s) derived from their physiological and/or behavioral characteristic. Technologies are being developed to verify or identify individuals on the basis of measurement of f...

2016
Aysajan Abidin

Biometric authentication is becoming increasingly popular as a convenient authentication method. However, the privacy and security issues associated with biometric authentication are very serious. Privacy-preserving biometric authentication addresses privacy concerns associated with the use of biometrics and offers a secure solution for user authentication. Given the tremendous expansion of wir...

Journal: :JCP 2013
Ming Luo Donghua Huang Jun Hu

Biometric signcryption, which enables a user using his biometric information as the identity to fulfills both the functions of encryption and digital signature simultaneously, and it provides better overall security and performance. However, almost all biometric signcryption schemes that have been proposed in the literature do not satisfy forward secrecy, known session-specific temporary inform...

Journal: :EURASIP J. Information Security 2009
Shuiming Ye Ying Luo Jian Zhao Sen-Ching S. Cheung

Access control systems using the latest biometric technologies can offer a higher level of security than conventional passwordbased systems. Their widespread deployments, however, can severely undermine individuals’ rights of privacy. Biometric signals are immutable and can be exploited to associate individuals’ identities to sensitive personal records across disparate databases. In this paper,...

Journal: :Security and Communication Networks 2011
Neyire Deniz Sarier

Recently, Sarier [1] proposed an efficient biometric Identity Based Encryption (IBE) scheme called BIO-IBE using the Sakai Kasahara Key Construction and prove its security in the random oracle model based on the well-exploited k-BDHI computational problem. Despite its efficiency compared to other fuzzy IBE systems implemented for biometric identities, BIO-IBE is not secure against a new type of...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید