نتایج جستجو برای: biometric encryption

تعداد نتایج: 36436  

2009
Fernando L. Podio Fred Herr

Common Biometric Exchange Formats Framework (CBEFF) provides a standardized set of definitions and procedures that support the interchange of biometric data in standard data structures called CBEFF biometric information records (BIRs). BIRs are well-defined data structures that consist of two or three parts: the standard biometric header (SBH), the biometric data block (BDB), and possibly the o...

2009
Michael Schwaiger

In this paper alternatives of tamper-proof and privacy-protected biometric identification systems are shown. One approach to secure such databases is to use cryptography. With its help it is possible to highly protect a system from any external attacker but an internal attacker still has direct access to all stored biometric data. This risk shall be avoided by using biometric encryption with an...

2013
Sayani Chandra Sayan Paul Sourish Mitra

Our modern day era faces an inevitable problem of securing our most integrated data and messages. The chief problem is to protect our data in a unique way that could only be worked upon by the sender and the recipient. Most of the traditional techniques probably in-use today, emphasizes on keys that are generated by generic function, algorithms or in random key generators. But question remains ...

2010
Neyire Deniz Sarier

In this paper, we present a novel framework for the generic construction of biometric Identity Based Encryption (IBE) schemes, which do not require bilinear pairings and result in more efficient schemes than existing fuzzy IBE systems implemented for biometric identities. Also, we analyze the security properties that are specific to biometric IBE namely anonymity and identity privacy. Consideri...

2016
Akanksha Aggarwal Manoj K Verma

Multimodal biometric system capture input from single or multiple sensors measuring two or more different modalities characteristics. Multimodal biometric make use of more than one biometric identifiers to compare the identification of a person. The most powerful reason to merge different modalities is to improve the recognition rate and reliability but problems like matching of templates and s...

Journal: :I. J. Network Security 2006
Dimitrios L. Delivasilis Sokratis K. Katsikas

Side channel analysis is a technique that enables the adversary to benefit from information leakages occurring due to the implementation of encryption algorithms on hardware. Since its introduction, side channel analysis has been extensively used in cryptology, more precisely in cryptanalysis. In this paper we describe a novel method, according to which side channel analysis is applied to biome...

The Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys. This leads to the possibility of enhancing the security in environments where these errors can be common, such as biometrics storage systems. Although several researchers have provided implementations, we find that the scheme is vulnerable to attacks when not properly used. This paper describes an attack on t...

2015
Vaibhav B. Joshi Dhruv Gupta Mehul S. Raval

In this work, authors propose a novel scheme with commutative encryption and reversible watermarking for a fingerprint image. Due to commutative property one can embed and extract watermark in either plain or encrypted fingerprint image, irrespective of order in which encryption or watermarking is applied. The encryption and the watermarking keys are shared using secret key sharing mechanism. T...

Journal: :I. J. Network Security 2011
Mingwu Zhang Bo Yang Wenzheng Zhang Tsuyoshi Takagi

Encryption and authentication schemes suffice for the security of information stored or exchanged by different parties, but secure key generation and distribution is a highly non-trivial matter in cryptography. Fuzzy extractor is a security primitive, which can be used to encrypt and authenticate a message using his biometric b to reproduce extraction of an almost uniformly key from non-uniform...

2013
Sudhir Sawarkar

With the increasing need for stringent security measures in recent times, biometric systems have assumed greater importance for information security systems. For biometric systems to offer reliable security, they themselves have to satisfy high security requirements to ensure invulnerability. This paper proposes two different approaches based on RSA and Elliptic curve cryptography for database ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید