نتایج جستجو برای: biometric encryption

تعداد نتایج: 36436  

2015
Jenny Joseph Josy Elsa Varghese

A new biometric inspired chaotic image encryption technique is proposed. The idea behind the proposed technique is to capture the biometric image of the sender and then the image is pre-processed to estimate the initial seed of nonlinear chaotic map and feature vector. This feature vector is used to obtain the biometrically encoded bit stream. The original image is randomized using the random m...

2010
Marco Tranquillin Carlo Ferrari Michele Moro

This paper deals with the definition of a strong authentication model, coupling usual password/PIN based methods with a biometric matching, over a Multi Agent distributed infrastructure. When the user authentication procedure involves personal devices, the Multi Agent System model helps in the distribution of data and algorithms thanks to a better partitioning of roles and responsibilities, enh...

2002
Claus Vielhauer Ralf Steinmetz Astrid Mayerhöfer

This paper presents a new approach to generate biometric hash values based on statistical features in online signature signals. Whilst the output of typical online signature verification systems are threshold-based true-false decisions, based on a comparison between test sample signals and sets of reference signals, our system responds to a signature input with a biometric hash vector, which is...

2005
Mikhail J. Atallah Keith B. Frikken Michael T. Goodrich Roberto Tamassia

This paper presents computationally “lightweight” schemes for performing biometric authentication that carry out the comparison stage without revealing any information that can later be used to impersonate the user (or reveal personal biometric information). Unlike some previous computationally expensive schemes — which make use of slower cryptographic primitives — this paper presents methods t...

2010
Davrondzhon Gafurov Bian Yang Patrick Bours Christoph Busch

Often in the development of a biometric product the evaluator of the system is the same institution who developed the algorithm. Furthermore, usually the test data set is also collected by the same developer/evaluator and in most cases such database will not be public. Consequently, test results cannot be verified by independent institutions. Although this can be justifiable (e.g. in the optimi...

2016
Koray Karabina Angela Robinson

Visual cryptography is an increasingly popular cryptographic technique which allows for secret sharing and encryption of sensitive data. This method has been extended and applied to secure biometric data in various protocols. In this paper, we propose a general framework to help assess the security of these extended biometric visual cryptographic schemes (e-BVC). First, we formalize the notion ...

2009
Maqsood Mahmud Muhammad Khurram Khan Khaled Alghathbar

Generally, a stream cipher is a symmetric key cipher where plaintext bits are combined with a pseudorandom Keystream bits to achieve desired cipher text. In our paper, we are proposing a cryptosystem named Biometric-GaussianStream(BGS) cryptosystem. It is basically the combination of Gaussian noise and stream ciphers. In this system first, we pass an image through Gaussian noise function to add...

2013
Sougata Das Rahul Das Ayan Mukherjee

In this paper, we have employed “Face Recognition” technique with conventional session based authentication to provide a two layer security. Different features of a human face are used for authentication. Since this scheme uses biological characteristics, this is very difficult to forge. Additionally we will be using conventional session based authentication to provide a two layer security. Thi...

Journal: :Computers, materials & continua 2022

The cancellable biometric transformations are designed to be computationally difficult obtain the original data. This paper presents a multi-biometric identification scheme that includes four stages: data collection and processing, Arnold's Cat Map encryption, decimation process reduce size, final merging of biometrics in single generated template. First, 2D matrix size 128 × is created based o...

2013
R. Sinduja V. Vaithiyanathan

Iris is one of the most challenging biometric techniques. In many proposed biometric recognition technique, template’s are store in the database for comparison. But there exists a vital problem in storing the template in the database since it can be easily bootlegged. In order to overcome these issues a novel method for person identification by their Iris, through securely storing the template ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید