نتایج جستجو برای: biometric encryption

تعداد نتایج: 36436  

Journal: :Mathematics 2023

Cybersecurity has been one of the interesting research fields that attract researchers to investigate new approaches. One recent trends in this field is cancelable biometric template generation, which depends on storage a cipher (cancelable) instead original template. This trend ensures confidential and secure biometrics certain individual. paper presents multi-biometric system based deep fusio...

2015
Changgeng Yu Liping Lai

Authentication methods based on biometric parameters are gaining importance over the years. But they require the storage and transmission security of fingerprint templates to perform this task. In this work an efficient method based on digital fingerprint random encryption IBC is introduced. The process works by user’s fingerprint feature and asymmetric authentication technology to security imp...

2012
K. Seetharaman R. Ragupathy

We use Low Density Parity Check (LDPC) error correction code to solve fuzziness i.e., the variability and noise in iris code generated from Iris Recognition System (IRS) and Secure Hash Algorithm (SHA-512) to transform unique iris code into hash string to make them as a Cancellable Biometric. SHA-512 hash string is used as a key for 512 bits Advanced Encryption Standard (AES) encryption process...

Journal: :IEEE Transactions on Industrial Informatics 2023

The efficiency of biometric systems, in particular efficient and accurate identification, is one the most challenging open problems biometrics today. Adding to that, data are sensitive deserving adequate protection. As a solution, this work proposes an privacy-preserving reduction computational workload identification systems using public-key encryption with keyword search (PEKS). For long-term...

2013
Dr. Chander Kant Raksha

Securing biometrics databases from being compromised is major challenge, it must be overcome in order to support widespread use of biometrics based authentication. In this paper we present a cryptographic technique for enhanced security of fingerprint information using RC4 enrichment algorithm approach. RC4 algorithm is already used for image encryption. This paper is about encryption and decry...

Journal: :IJESDF 2013
G. Mary Amirtha Sagayee S. Arumugam G. S. Anandha Mala

The greatest strength of biometrics is that it does not change over time. But at the same time while using it directly for enhancing the security in network system, if that data has been compromised, its compromised forever[1]. Therefore, cancellable biometrics will increase the privacy which means that the true biometrics are never stored or revealed to the authentication server. Biometrics, c...

2011
A. Drosou D. Tzovaras

Biometrics have long been used as means to recognize people, mainly in terms of their physiological characteristics, for various commercial applications ranging from surveillance and access control against potential impostors to smart interfaces (Qazi (2004)) (Xiao (2005)). These systems require reliable personal recognition schemes to either confirm or determine the identity of an individual r...

2008
Alisher Kholmatov

Privacy Protecting Biometric Authentication Systems As biometrics gains popularity and proliferates into the daily life, there is an increased concern over the loss of privacy and potential misuse of biometric data held in central repositories. The major concerns are about i) the use of biometrics to track people, ii) non-revocability of biometrics (eg. if a fingerprint is compromised it can no...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید