نتایج جستجو برای: biometric encryption

تعداد نتایج: 36436  

Journal: :EURASIP J. Adv. Sig. Proc. 2004
Laurent Besacier Aladdin M. Ariyaeeinia John S. D. Mason Jean-François Bonastre Pedro Mayorga Corinne Fredouille Sylvain Meignier Johann Siau Nicholas W. D. Evans Roland Auckenthaler Robert P. Stapert

The emerging field of biometric authentication over the Internet requires both robust person authentication and secure computer network protocols. This paper presents investigations of vocal biometric person authentication over the Internet, both at the protocol and authentication robustness levels. As part of this study, an appropriate client-server architecture for biometrics on the Internet ...

2014
Mrs. R. Sridevi S. Karthika

-This paper presents a narrative key generation scheme using biometric methodology for providing high security over the internet applications such as VoIP technology. The present work deals with modern computing systems security issues, focusing on biometric based asymmetric key generation process. The term VoIP refers-“voice over internet protocol (IP)” in which the “voice” to be transmitted u...

2013
K. Nandakumar D. Prabakar Dr. S. Karthik

A biometric authentication system operates by acquiring raw biometric data from a subject, extracting a feature set from the data and comparing the feature set against the templates stored in a database in order to identify a person or to verify a claimed identity. The template data in the database is generated during enrolment and is often stored along with the original raw data. This work exp...

Journal: :Intelligent Automation and Soft Computing 2023

Biometric security is a growing trend, as it supports the authentication of persons using confidential biometric data. Most transmitted data in multimedia systems are susceptible to attacks, which affect these systems. provide sufficient protection and privacy for users. The recently-introduced cancellable recognition have not been investigated presence different types attacks. In addition, the...

Journal: :IEEE Access 2021

Biometric identification allows people to be identified by their unique physical characteristics. Among such schemes, fingerprinting is well-known for biometric identification. Many studies related fingerprint-based have been proposed; however, they are based purely on heavy cryptographic primitives as additively homomorphic encryption and oblivious transfer. Therefore, it difficult apply them ...

2007
Yevgeniy Dodis Leonid Reyzin Adam Smith

This chapter presents a general approach for handling secret biometric data in cryptographic applications. The generality manifests itself in two ways: we attempt to minimize the assumptions we make about the data, and to present techniques that are broadly applicable wherever biometric inputs are used. Because biometric data comes from a variety of sources that are mostly outside of anyone’s c...

2008
Yevgeniy Dodis Leonid Reyzin Adam Smith

This survey presents a general approach for handling secret biometric data in cryptographic applications. The generality manifests itself in two ways: we attempt to minimize the assumptions we make about the data, and to present techniques that are broadly applicable wherever biometric inputs are used. Because biometric data comes from a variety of sources that are mostly outside of anyone’s co...

Journal: :I. J. Network Security 2005
Deholo Nali Carlisle M. Adams Ali Miri

Threshold attribute-based encryption (thABE) is a variant of identity-based encryption which views identities as sets of descriptive attributes. If a thABE ciphertext c is computed for a set ω of attributes, then, to decrypt c, a user must have keys associated with a sufficiently large subset of ω. One application of thABE is biometric-based access control (BBAC). Practical BBAC applications im...

Journal: :Intelligent Automation and Soft Computing 2022

In this article, we introduce a new cancelable biometric template generation layout depending on selective encryption technology and Dual-Tree Complex Wavelet Transform (DT-CWT) fusion. The input face is entered into the automatic face-segmentation (Viola-Jones) algorithm to detect object in short time. Viola-Jones can left eye, right nose, mouth of image. encoder choose or eye generate templat...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید