نتایج جستجو برای: biometric encryption

تعداد نتایج: 36436  

2010
ALOKA SINHA NIRMALA SAINI

A new multiple biometrics based encryption technique using digital holographic security system has been proposed. In this method, a face image of an enrolled person can be spatially multiplexed by a phase mask. This phase mask has been generated by the fingerprint of the enrolled person. In order to overcome the problem of rotation and scaling of the fingerprint, the log polar transform of the ...

Journal: :Optics letters 2010
A Alfalou C Brosseau

We report on an algorithm to compress and encrypt simultaneously multiple images (target images). This method, which is based upon a specific spectral multiplexing (fusion without overlapping) of the multiple images, aims to achieve a single encrypted image, at the output plane of our system, that contains all information needed to reconstruct the target images. For that purpose, we divide the ...

Journal: :IEEE Access 2021

Computationally efficient, accurate, and privacy-preserving data storage retrieval are among the key challenges faced by practical deployments of biometric identification systems worldwide. In this work, a method protected indexing is presented. By utilising feature-level fusion intelligently paired templates, multi-stage search structure created. During retrieval, list potential candidate iden...

Journal: :journal of artificial intelligence in electrical engineering 2014
shahin shafei

this paper mainly focused on implementation of aes encryption and decryption standard aes-128. all the transformations of both encryption and decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. this method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theaes inversesub bytes module and...

Journal: :iranian journal of veterinary research 2015
s. özkadif e. eken k. beşoluk m. o. dayan

the aim of this study was to reveal biometric peculiarities of new zealand white rabbit antebrachium (radius and ulna) by means of three-dimensional (3d) reconstruction of multidetector computed tomography (mdct) images. under general anesthesia, the antebrachiums of a total of sixteen rabbits of both sexes were scanned with a general diagnostic mdct. biometric measurements of the reconstructed...

For many years, cryptanalysis has been considered as an attractive topic in jeopardizing the security and resistance of an encryption algorithm. The SDES encryption algorithm is a symmetric cryptography algorithm that performs a cryptographic operation using a crypt key. In the world of encryption, there are many search algorithms to cryptanalysis. In these researches, brute force attack algori...

Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...

Journal: :International Journal on Smart Sensing and Intelligent Systems 2023

Abstract In this paper, a digital personal safe system was proposed with Fast ID Online (FIDO) transaction authentication and multiple decentralized (DID) authentications based on home gateway. This individual custody model of will be linked to the assets stored in storage space gateway by DID smart devices FIDO server for public platform that excludes asset (cryptocurrency [e.g., Bitcoin] or N...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید