نتایج جستجو برای: biometric attributes

تعداد نتایج: 76224  

2009
Marina Blanton William M. P. Hudelson

This work explores the problem of using biometric data to achieve non-transferability of anonymous credentials; that is, sharing of anonymous credentials, which allow one to anonymously authenticate, can be severely limited if their use requires possession of the credential owner’s biometric. We target to provide strong security guarantees using minimal trust assumptions, namely that a fresh re...

2011
Dirk Scheuermann Bastian Wolfgruber Olaf Henniger

This paper investigates the extraction of a reproducible bit string referred to as biometric key from biometric data. This is difficult due to the natural variability of biometric data. If the biometric-key generation process were sufficiently resistant against attacks, a biometric key may be used e.g. as basis for the generation of application-specific user passwords. Handwritten signatures or...

Journal: :Electronic Commerce Research and Applications 2011
Jeroen Breebaart Ileana Buhan Koen de Groot Emile Kelkboom

Biometric authentication has a great potential to improve the security, reduce cost, and enhance the customer convenience of payment systems. Despite these benefits, biometric authentication has not yet been adopted by large-scale point-of-sale and automated teller machine systems. This paper aims at providing a better understanding of the benefits and limitations associated with the integratio...

Journal: :I. J. Network Security 2010
Sunil V. K. Gaddam Manohar Lal

This paper puts forth a fresh methodology for the secure storage of fingerprint template by generating Secured Feature Matrix and keys for cryptographic techniques applied for data Encryption or Decryption with the aid of cancellable biometric features. Conventional techniques depend on biometric features like face, fingerprint, hand geometry, iris, signature, keystroke, voice and the like for ...

Journal: :JDIM 2008
Qi Han Zhifang Wang Xiamu Niu

In recent literature, the issue of biometric template protection was raised. Some schemes were proposed to solve the contradiction between the fuzzy biometric information and accurate cryptography functions to achieve the protection of biometric template via cryptography method. In this paper, a novel methodology to achieve the security of the biometric templates in biometric systems is propose...

2014
Rohit M. Thanki Komal R. Borisagar

Biometric authentication system is having several security issues. Two security issues are template protection at system database and at communication channel between system database and matcher subsystem of biometric system. In this paper, two level watermarking technique based on CS Theory framework in wavelet domain is proposed for security and authentication of biometric template at these t...

2006
Sung-Hyuk Cha Charles C. Tappert

The task of establishing the distinctiveness of biometric data is important in many types of biometric applications. Earlier work had identified the concept of distance statistics as central to our approach to the individuality of a biometric, and the inferential statistical aspects had been considered crucial in evaluating the individuality of certain biometric data. Here we consider the geome...

2001

Here we provide a primer on biometric technology.1 In particular, this chapter introduces the technical terminology and the major concepts related to biometric applications. We first define the terms, “biometrics” and “biometric authentication.” Next, we discuss three universal components present in the operation of all biometric technologies, including the difference between applications that ...

2010
ChunLei Li Bin Ma Yunhong Wang Zhaoxiang Zhang

In this paper, we propose a novel scheme for protecting biometric templates using salient region-based authentication watermarking. Firstly, a novel multi-level authentication watermarking scheme is proposed, which is used to verify the integrity of biometric image. Secondly, the PCA features of these biometric images is used as information watermarks to recover the tampered image. Authenticati...

2015

In line with attempts to find superior performance using multimodal biometric systems, different methods of fusing individual biometric data have been attempted. As noted from previous chapters, the performance of individual biometric systems has been improved by refinements in feature extraction methods. In order to achieve the maximum possible accuracy out of authentication process, scores fr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید