نتایج جستجو برای: biometric encryption

تعداد نتایج: 36436  

2013
Reena Mary George

Protection of biometric data is of prime importance now a days. In this paper a new method is proposed for the protection of biometric facial data using visual cryptography and chaotic encryption. By using visual cryptography each private face image is decomposed into two public host images. The original image gets revealed only when both of these images are available simultaneously. By using c...

2011
K Hemanth Srinivasulu Asadi

Concerns on widespread use of biometric authentication systems are primarily centered around template security, revocability, and privacy. The use of cryptographic primitives to bolster the authentication process can alleviate some of these concerns as shown by biometric cryptosystems. In this paper, we propose a provably secure and blind biometric authentication protocol, which addresses the c...

2012
Divya James Mintu Philip

Protection of biometric data and templates is a crucial issue for the security of biometric systems This paper proposes new security architecture for protection of face templates using visual cryptography and chaotic image encryption. The use of visual cryptography is explored to preserve the privacy of biometric image by decomposing each private face image into two independent public host imag...

2009
Ileana Buhan Jeroen Breebaart Jorge Guajardo Koen de Groot Emile Kelkboom Anton H. M. Akkermans

Biometric information is regarded as highly sensitive information and therefore encryption techniques for biometric information are needed to address security and privacy requirements of biometric information. Most security analyses for these encryption techniques focus on the scenario of one user enrolled in a single biometric system. In practice, biometric systems are deployed at different pl...

2013
A. Poorani B. Vaishnavi

-Biometric authentication system are used prevalently for its template security, retract ability and privacy. The Authentication process is reinforced by biometric cryptosystem. We propose a demonstrable secure and blind biometric authentication protocol which discloses only identity and not any other information to both client and server. To reduce the computational cost and enhance security w...

2015
Renu S

The most important challenge faced by a public cloud is hacking or data intrusion. If an attacker hack the cloud they can manipulate the information or disable the services. We all know that a Biometric system can ensure that rendered services can only accessed by a registered user only. It can identify an authorized user by checking the physiological features of that person. Here I wish to pro...

2017
Smitha Jacob

Preserving the privacy of digital biometric data (e.g., fingerprint) stored in a central database has become of paramount importance. It demands high speed decryption/encryption process with restricted computational powers. This work explores the possibility of using visual cryptography with chaotic encryption suitable for imparting security to biometric data such as fingerprint images. By usin...

2011
R. Bremananth Ahmad Sharieh

Biometric based cryptography system provides an efficient and secure data transmission as compare to the traditional encryption system. However, it is a computationally challenge task to solve the issues to incorporate biometric and cryptography. In connection with our previous works, this paper reveals a robust cryptosystem using iris biometric pattern as a crypto-key to resolve the issues in ...

2016
Chengyang Xie Jiayong Liu Xu Yao Dianhua Tang

Biometric key technology is the organic combination of biometric encryption technology and traditional cryptography. Biometric key can directly encrypt data or encrypt key, with the character of portable use and not easily being stolen, forgotten and broken. This article provides an algorithm for generating key based on the fingerprint feature bit-strings, extracting fingerprint feature informa...

2007
Julien Bringer Hervé Chabanne Malika Izabachène David Pointcheval Qiang Tang Sébastien Zimmer

This work deals with the security challenges in authentication protocols employing volatile biometric features, where the authentication is indeed a comparison between a fresh biometric template and that enrolled during the enrollment phase. We propose a security model for biometric-based authentication protocols by assuming that the biometric features to be public. Extra attention is paid to t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید