نتایج جستجو برای: biometric encryption
تعداد نتایج: 36436 فیلتر نتایج به سال:
Visual cryptography is an increasingly popular cryptographic technique which allows for secret sharing and encryption of sensitive data. This method has been extended and applied to secure biometric data in various protocols. Recently, Karabina and Robinson proposed a general framework to help assess the security of these extended biometric visual cryptographic schemes (e-BVC), and formalized t...
Biometrics security is a dynamic research area spurred by the need to protect personal traits from threats like theft, non-authorised distribution, reuse and so on. A widely investigated solution to such threats consists in processing the biometric signals under encryption, to avoid any leakage of information towards non-authorised parties. In this paper, we propose to leverage on the superior ...
In today world of advancement, it is mandatory task to share, distribute and exchange the information like image, speech, text files throw public wired/wireless networks. Therefore, security gains more and more importance especially in those organizations where information is more critical and more important. Instead of using the traditional encryption techniques, Biometrics like speech uniquel...
The System Security is important for secure communication. Biometric fingerprint authentication requires physical presence of human being; it can’t be traceable as well as forgeable. By using data compression method size of data can be reduced and requires less memory space. When data is transmitted through network secretly, there may be chance that secret data may lost or damaged. In order to ...
For some applications it is necessary that the user has to get authenticated himself either by using his password or any biometric features. No doubt that this gives protection against unauthorized entry in to the application or system. Secret information needs security in a multi user environment. Any automatically measurable, robust and distinctive physical characteristics or personal trait t...
Bio-Cryptographic systems enforce authenticity of cryptographic applications like data encryption and digital signatures. Instead of simple user passwords, biometrics, such as, fingerprint and handwritten signatures, are employed to access the cryptographic secret keys. The Fuzzy Vault scheme (FV) is massively employed to produce bio-cryptographic systems, as it absorbs variability in biometric...
The pivotal need to identify people requires efficient and robust schemes guarantee high levels of personal information security. This paper introduces an encryption algorithm generate cancelable face templates based on quantum image Hilbert permutation. objective is provide sufficient distortion human facial biometrics be stored in a database for authentication requirements through encryption....
We are currently facing industrial societies turning rapidly into information societies. Computer systems that were previously separated and dedicated to specific tasks become a more and more integrated global information system. The driving force is competition of service providers of all kinds and perhaps the most visible indicator is the convergence of telephone, cell phone and satellite net...
A new algorithm for biometric templates using a 6D-chaotic system, and 2D fractional discrete cosine transform (FrDCT) is proposed in this paper. In technique, the $k$ are represented into three groups. After representation, these gro...
Biometric identity-based encryption (Bio-IBE) is a kind of fuzzy identity-based encryption (fuzzy IBE) where a ciphertext encrypted under an identity w′ can be decrypted using a secret key corresponding to the identity w which is close to w′ as measured by some metric. Recently, Yang et al. proposed a constant-size Bio-IBE scheme and proved that it is secure against adaptive chosen-ciphertext a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید