نتایج جستجو برای: biometric encryption

تعداد نتایج: 36436  

2016
Koray Karabina Angela Robinson

Visual cryptography is an increasingly popular cryptographic technique which allows for secret sharing and encryption of sensitive data. This method has been extended and applied to secure biometric data in various protocols. Recently, Karabina and Robinson proposed a general framework to help assess the security of these extended biometric visual cryptographic schemes (e-BVC), and formalized t...

2018
Giulia Droandi Mauro Barni Riccardo Lazzeretti Tommaso Pignata

Biometrics security is a dynamic research area spurred by the need to protect personal traits from threats like theft, non-authorised distribution, reuse and so on. A widely investigated solution to such threats consists in processing the biometric signals under encryption, to avoid any leakage of information towards non-authorised parties. In this paper, we propose to leverage on the superior ...

2012
Iman Qays Abduljaleel

In today world of advancement, it is mandatory task to share, distribute and exchange the information like image, speech, text files throw public wired/wireless networks. Therefore, security gains more and more importance especially in those organizations where information is more critical and more important. Instead of using the traditional encryption techniques, Biometrics like speech uniquel...

2014
Sonali Nimbhorkar

The System Security is important for secure communication. Biometric fingerprint authentication requires physical presence of human being; it can’t be traceable as well as forgeable. By using data compression method size of data can be reduced and requires less memory space. When data is transmitted through network secretly, there may be chance that secret data may lost or damaged. In order to ...

2013
D. Gayathri

For some applications it is necessary that the user has to get authenticated himself either by using his password or any biometric features. No doubt that this gives protection against unauthorized entry in to the application or system. Secret information needs security in a multi user environment. Any automatically measurable, robust and distinctive physical characteristics or personal trait t...

2013
George S. Eskander Robert Sabourin Eric Granger

Bio-Cryptographic systems enforce authenticity of cryptographic applications like data encryption and digital signatures. Instead of simple user passwords, biometrics, such as, fingerprint and handwritten signatures, are employed to access the cryptographic secret keys. The Fuzzy Vault scheme (FV) is massively employed to produce bio-cryptographic systems, as it absorbs variability in biometric...

Journal: :Electronics 2022

The pivotal need to identify people requires efficient and robust schemes guarantee high levels of personal information security. This paper introduces an encryption algorithm generate cancelable face templates based on quantum image Hilbert permutation. objective is provide sufficient distortion human facial biometrics be stored in a database for authentication requirements through encryption....

1999
Gerrit Bleumer

We are currently facing industrial societies turning rapidly into information societies. Computer systems that were previously separated and dedicated to specific tasks become a more and more integrated global information system. The driving force is competition of service providers of all kinds and perhaps the most visible indicator is the convergence of telephone, cell phone and satellite net...

Journal: :IEEE Access 2021

A new algorithm for biometric templates using a 6D-chaotic system, and 2D fractional discrete cosine transform (FrDCT) is proposed in this paper. In technique, the $k$ are represented into three groups. After representation, these gro...

Journal: :I. J. Network Security 2012
Miaomiao Tian Wei Yang Liusheng Huang

Biometric identity-based encryption (Bio-IBE) is a kind of fuzzy identity-based encryption (fuzzy IBE) where a ciphertext encrypted under an identity w′ can be decrypted using a secret key corresponding to the identity w which is close to w′ as measured by some metric. Recently, Yang et al. proposed a constant-size Bio-IBE scheme and proved that it is secure against adaptive chosen-ciphertext a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید