نتایج جستجو برای: biometric encryption
تعداد نتایج: 36436 فیلتر نتایج به سال:
The emerging field of biometric authentication over the Internet requires both robust person authentication and secure computer network protocols. This paper presents investigations of vocal biometric person authentication over the Internet, both at the protocol and authentication robustness levels. As part of this study, an appropriate client-server architecture for biometrics on the Internet ...
-This paper presents a narrative key generation scheme using biometric methodology for providing high security over the internet applications such as VoIP technology. The present work deals with modern computing systems security issues, focusing on biometric based asymmetric key generation process. The term VoIP refers-“voice over internet protocol (IP)” in which the “voice” to be transmitted u...
A biometric authentication system operates by acquiring raw biometric data from a subject, extracting a feature set from the data and comparing the feature set against the templates stored in a database in order to identify a person or to verify a claimed identity. The template data in the database is generated during enrolment and is often stored along with the original raw data. This work exp...
Biometric security is a growing trend, as it supports the authentication of persons using confidential biometric data. Most transmitted data in multimedia systems are susceptible to attacks, which affect these systems. provide sufficient protection and privacy for users. The recently-introduced cancellable recognition have not been investigated presence different types attacks. In addition, the...
Biometric identification allows people to be identified by their unique physical characteristics. Among such schemes, fingerprinting is well-known for biometric identification. Many studies related fingerprint-based have been proposed; however, they are based purely on heavy cryptographic primitives as additively homomorphic encryption and oblivious transfer. Therefore, it difficult apply them ...
This chapter presents a general approach for handling secret biometric data in cryptographic applications. The generality manifests itself in two ways: we attempt to minimize the assumptions we make about the data, and to present techniques that are broadly applicable wherever biometric inputs are used. Because biometric data comes from a variety of sources that are mostly outside of anyone’s c...
This survey presents a general approach for handling secret biometric data in cryptographic applications. The generality manifests itself in two ways: we attempt to minimize the assumptions we make about the data, and to present techniques that are broadly applicable wherever biometric inputs are used. Because biometric data comes from a variety of sources that are mostly outside of anyone’s co...
Threshold attribute-based encryption (thABE) is a variant of identity-based encryption which views identities as sets of descriptive attributes. If a thABE ciphertext c is computed for a set ω of attributes, then, to decrypt c, a user must have keys associated with a sufficiently large subset of ω. One application of thABE is biometric-based access control (BBAC). Practical BBAC applications im...
In this article, we introduce a new cancelable biometric template generation layout depending on selective encryption technology and Dual-Tree Complex Wavelet Transform (DT-CWT) fusion. The input face is entered into the automatic face-segmentation (Viola-Jones) algorithm to detect object in short time. Viola-Jones can left eye, right nose, mouth of image. encoder choose or eye generate templat...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید