نتایج جستجو برای: biometric encryption

تعداد نتایج: 36436  

2012
Ying Luo Sen-ching S. Cheung Shuiming Ye

The widespread deployment of surveillance cameras has raised serious privacy concerns and many privacy-enhancing schemes have been recently proposed to automatically redact images of selected individuals in the surveillance video for protection. To identify these individuals for protection, the most reliable approach is to use biometric signals such as iris scans as they are immutable and highl...

Journal: :CoRR 2010
P. S. Revenkar Anisa Anjum W. Z. Gandhare

Biometrics deal with automated methods of identifying a person or verifying the identity of a person based on physiological or behavioral characteristics. Visual cryptography is a secret sharing scheme where a secret image is encrypted into the shares which independently disclose no information about the original secret image. As biometric template are stored in the centralized database, due to...

Journal: :Adv. Internet of Things 2011
Kalaichelvi Visvalingam R. M. Chandrasekaran

This paper proposes a new secure e-voting protocol. This new scheme does not require a special voting channel and communication can occur entirely over the existing Internet. This method integrates Internet convenience and cryptology. In the existing protocols either the tallier has to wait for the decryption key from voter till the voting process is over or the verification process has to wait...

Journal: :International Journal of Scientific Research in Science, Engineering and Technology 2018

Journal: :Indonesian Journal of Electrical Engineering and Computer Science 2021

<p><span>The researchers have been exploring methods to use biometric characteristics of the user as a replacement for using unforgettable pass-word, in an attempt build robust cryptographic keys, because, human users detect difficulties call up long keys. Biometric recognition provides authentic solution authentication problem identity administration systems. With extensive utiliza...

2012
Julien Bringer Hervé Chabanne Alain Patey

We introduce two new schemes for securely computing Hamming distance in the two-party setting. Our first scheme is a very efficient protocol, based solely on 1-out-of-2 Oblivious Transfer, that achieves full security in the semi-honest setting and one-sided security in the malicious setting. Moreover we show that this protocol is significantly more efficient than the previous proposals, that ar...

2016
Moazzam Butt Johannes Merkle Ulrike Korte Christoph Busch

The fuzzy vault is one of the most popular biometric encryption schemes for protecting fingerprint data. However, its implementation faces two challenges: First, the fingerprints need to be aligned. Some publications have proposed the storage of auxiliary data to assist alignment, but these data may leak information about the biometric features. Secondly, the fuzzy vault is susceptible to attac...

2016
P. Revathi

In wireless communications, significant information are getting exchanged frequently. Inorder to avoid the illegal access of that sensitive information remote authentication is being done extensively. Remote authentication involves the submission of encrypted information, along with visual and audio cues. Incase of remote examination or interviewing, Trojan Horse and other attacks can cause sev...

2012
Shrinivasrao B. Kulkarni Ravindra S. Hegadi Umakant P. Kulkarni

A biometric system provides automatic identification of an individual based on a unique feature or characteristic possessed by the individual. Iris recognition is one of such biometric systems and is regarded as the most reliable and accurate identification systems available. It is the process of recognizing a person by analyzing the random pattern of the iris [8]. It combines computer vision, ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید