نتایج جستجو برای: fuzzy vault

تعداد نتایج: 92901  

2008
Hoi Ting Poon Ali Miri

The Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys. This leads to the possibility of enhancing the security in environments where these errors can be common, such as biometrics storage systems. Although several researchers have provided implementations, we find that the scheme is vulnerable to attacks when not properly used. This paper describes an attack on t...

2008
Alisher Kholmatov Berrin A. Yanikoglu

User privacy and template security are major concerns in the use of biometric systems. These are serious concerns based on the fact that once compromised, biometric traits can not be canceled or reissued. The Fuzzy Vault scheme has emerged as a promising method to alleviate the template security problem. The scheme is based on binding the biometric template with a secret key and scrambling it w...

2011
Christian Böhm Ines Färber Sergej Fries Ulrike Korte Johannes Merkle Annahita Oswald Thomas Seidl Bianca Wackersreuther Peter Wackersreuther

The authentication based on biometric information has several advantages compared to solely password-based systems, which has led to a growing interest of industry and of public authorities in biometric-based systems. To meet the high security standards concerning biometric data, template protection systems such as the fuzzy vault are indispensable to maintain the secrecy of the critical inform...

Journal: :CoRR 2010
Johannes Merkle Heinrich Ihmor Ulrike Korte Matthias Niesing Michael Schwaiger

The fuzzy vault is an error tolerant authentication method that ensures the privacy of the stored reference data. Several publications have proposed the application of the fuzzy vault to fingerprints, but the results of subsequent analyses indicate that a single finger does not contain sufficient information for a secure implementation. In this contribution, we present an implementation of a fu...

Journal: :IACR Cryptology ePrint Archive 2002
Ari Juels Madhu Sudan

We describe a simple and novel cryptographic construction that we refer to as a fuzzy vault. A player Alice may place a secret value κ in a fuzzy vault and “lock” it using a set A of elements from some public universe U . If Bob tries to “unlock” the vault using a set B of similar length, he obtains κ only if B is close to A, i.e., only if A and B overlap substantially. In constrast to previous...

2007
Sungju Lee Daesung Moon Yongwha Chung

Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems, and some implementations for fingerprint have been reported to protect the stored fingerprint template by hiding the fingerprint features, i.e., adding “chaff” minutiae into the original minutiae set. Also, solutions to the most challenging issue in applying the fuzzy vault to fingerprint(i....

2016
Moazzam Butt Johannes Merkle Ulrike Korte Christoph Busch

The fuzzy vault is one of the most popular biometric encryption schemes for protecting fingerprint data. However, its implementation faces two challenges: First, the fingerprints need to be aligned. Some publications have proposed the storage of auxiliary data to assist alignment, but these data may leak information about the biometric features. Secondly, the fuzzy vault is susceptible to attac...

2010
N. Radha

The major concern of almost all the verification system is user authentication and security. This necessitates the development of a mechanism that ensures user security and privacy. A lot of research has been carried on this developing field and numerous techniques have been proposed earlier in literature. These traditional methods use tokens and passwords to provide security to the users. Unce...

2005
Yongwha Chung Daesung Moon Sungju Lee Seunghwan Jung Taehae Kim Dosung Ahn

Biometrics-based user authentication has several advantages over traditional password-based systems for standalone authentication applications. This is also true for new authentication architectures known as crypto-biometric systems, where cryptography and biometrics are merged to achieve high security and user convenience at the same time. Recently, a cryptographic construct, called fuzzy vaul...

Journal: :CoRR 2012
Kyle Marshall Joachim Rosenthal Davide Schipani Anna-Lena Horlemann-Trautmann

A new fuzzy vault scheme based on subspace codes is proposed and analyzed.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید