نتایج جستجو برای: biometric encryption

تعداد نتایج: 36436  

Journal: :Applied sciences 2021

Biometric keys are widely used in the digital identity system due to inherent uniqueness of biometrics. However, existing biometric key generation methods may expose data, which will cause users’ traits be permanently unavailable secure authentication system. To enhance its security and privacy, we propose a method based on deep learning this paper. Firstly, prevent information leakage utilize ...

Journal: :Security and Communication Networks 2022

Biometric identification is a convenient and reliable method in identity authentication. The widespread adoption of biometric requires strong privacy protection against possible theft or loss data. Existing techniques for privacy-preserving mainly rely on traditional cryptographic technology such as oblivious transfer homomorphic encryption, which will incur huge expenses to the system cannot b...

2012
Amir Rahmati Mastooreh Salajegheh Daniel E. Holcomb Jacob Sorber Wayne P. Burleson Kevin Fu

Lack of a locally trustworthy clock makes security protocols challenging to implement on batteryless embedded devices such as contact smartcards, contactless smartcards, and RFID tags. A device that knows how much time has elapsed between queries from an untrusted reader could better protect against attacks that depend on the existence of a rate-unlimited encryption oracle. The TARDIS (Time and...

عنبریان, مهرداد, محمودخانی, محمد رضا, نقیبی, سید احسان,

Objective: The aim of this study was to comparing the athletic performance and biometric features in elite karate players teenagers with a specific talent identification pattern of  karate in a professional gyms in Iran. Methods: Subjects available for sampling were divided into two groups teenagers karate athletes elite (n=19) and members developmental center and the Club Championship (n...

The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...

2011
Tanmay Bhattacharya Sirshendu Hore Ayan Mukherjee S. R. Bhadra Chaudhuri

In Fingerprint based Biometric authentication image of the fingerprint can be scanned and can be used later on for the purpose of authentication. So this process does not provide very high security. This paper proposes another level of security by using the concept of combined key. The key is obtained by crossing over of the Session key generated from the password given by the legitimate user a...

2014
Jean-Christophe Fondeur

Acknowledgements The authors would like to express their gratitude to Jean-Christophe Fondeur for helpful discussions and for continuous support of this work.

Journal: :Security and Communication Networks 2011
Jiankun Hu B. V. K. Vijaya Kumar Mohammed Bennamoun Kar-Ann Toh

Data and computing resource security has become an integral element in the fabric of information systems. Cryptography has formed a foundation for conventional security theoretical frameworks and applications.However, cryptography is based on either knowledge (i.e., what you know) or possession (i.e., what you have). This is a built-in weakness in traditional authentication approaches, as the t...

2014
John Kingsley Arthur Kofi Sarpong Adu-Manu

One of the key areas of concentration in achieving harmonious democracy is transparency in the electoral processes. Some countries like Ghana, Sierra Leone, Liberia and Kenya have recently had issues of doubt and mistrust of the administration and the management of their Electoral Commission and hence a suspicion of election fraud which has prone threats of violence, economic declination and on...

This paper presents a new method for encryption of color images based on a combination of chaotic systems, which makes the image encryption more efficient and robust. The proposed algorithm generated three series of data, ranged between 0 and 255, using a chaotic Chen system. Another Chen system was then started with different initial values, which were converted to three series of numbers from...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید