نتایج جستجو برای: biometric encryption
تعداد نتایج: 36436 فیلتر نتایج به سال:
A new multiple biometrics based encryption technique using digital holographic security system has been proposed. In this method, a face image of an enrolled person can be spatially multiplexed by a phase mask. This phase mask has been generated by the fingerprint of the enrolled person. In order to overcome the problem of rotation and scaling of the fingerprint, the log polar transform of the ...
We report on an algorithm to compress and encrypt simultaneously multiple images (target images). This method, which is based upon a specific spectral multiplexing (fusion without overlapping) of the multiple images, aims to achieve a single encrypted image, at the output plane of our system, that contains all information needed to reconstruct the target images. For that purpose, we divide the ...
Computationally efficient, accurate, and privacy-preserving data storage retrieval are among the key challenges faced by practical deployments of biometric identification systems worldwide. In this work, a method protected indexing is presented. By utilising feature-level fusion intelligently paired templates, multi-stage search structure created. During retrieval, list potential candidate iden...
this paper mainly focused on implementation of aes encryption and decryption standard aes-128. all the transformations of both encryption and decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. this method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theaes inversesub bytes module and...
the aim of this study was to reveal biometric peculiarities of new zealand white rabbit antebrachium (radius and ulna) by means of three-dimensional (3d) reconstruction of multidetector computed tomography (mdct) images. under general anesthesia, the antebrachiums of a total of sixteen rabbits of both sexes were scanned with a general diagnostic mdct. biometric measurements of the reconstructed...
For many years, cryptanalysis has been considered as an attractive topic in jeopardizing the security and resistance of an encryption algorithm. The SDES encryption algorithm is a symmetric cryptography algorithm that performs a cryptographic operation using a crypt key. In the world of encryption, there are many search algorithms to cryptanalysis. In these researches, brute force attack algori...
Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...
Abstract In this paper, a digital personal safe system was proposed with Fast ID Online (FIDO) transaction authentication and multiple decentralized (DID) authentications based on home gateway. This individual custody model of will be linked to the assets stored in storage space gateway by DID smart devices FIDO server for public platform that excludes asset (cryptocurrency [e.g., Bitcoin] or N...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید