نتایج جستجو برای: biometric encryption

تعداد نتایج: 36436  

2013
Pawandeep Singh Harneet Arora

This authentication technique uses a best approach for secure web transaction. It uses a Biometric property of user for authentication and SMS (Short Message Service) to enforce an extra security level along with the traditional Login/password system. Biometric properties are needed when a user wants a transaction then the user gives their fingerprint information. In this technique uses a encry...

2013
Mohammed Tajuddin

Crypto Biometrics system is recently emerging as an effective process to generate a cryptographic key. Conventional cryptographic key generation is using password which can be guessed or cracked. Further, the large size of strong key results in delay while encryption / decryption. Biometric field has however emerged in the recent days to reduce process delay and enhances the level of accuracy. ...

2000
John Daugman

This report investigates the “decision landscapes” that characterize several forms of biometric decision making. The issues discussed include: (i) Estimating the degrees-of-freedom associated with different biometrics, as a way of measuring the randomness and complexity (and therefore the uniqueness) of their templates. (ii) The consequences of combining more than one biometric test to arrive a...

Journal: :I. J. Network Security 2010
Sunil V. K. Gaddam Manohar Lal

This paper puts forth a fresh methodology for the secure storage of fingerprint template by generating Secured Feature Matrix and keys for cryptographic techniques applied for data Encryption or Decryption with the aid of cancellable biometric features. Conventional techniques depend on biometric features like face, fingerprint, hand geometry, iris, signature, keystroke, voice and the like for ...

Journal: :International Journal of Computer and Electrical Engineering 2012

Journal: :International Journal on Cryptography and Information Security 2016

Journal: :CoRR 2011
Raju Singh A. K. Vatsa

The security of bio-metric information – finger print, retina mapping, DNA mapping and some other chemical and biological modified genes related information transfer through low bandwidth and unreliable or covert channel is challenging task. Therefore, Security of biometric information is essential requirement in this fast developing communication world. Thus, in this paper, we propose efficien...

Journal: :IACR Cryptology ePrint Archive 2008
Manuel Barbosa Thierry Brouard Stéphane Cauchie Simão Melo de Sousa

We propose a new hybrid protocol for cryptographically secure biometric authentication. The main advantages of the proposed protocol over previous solutions can be summarised as follows: (1) potential for much better accuracy using different types of biometric signals, including behavioural ones; and (2) improved user privacy, since user identities are not transmitted at any point in the protoc...

2010
Shkodran Gerguri Václav Matyás Zdenek Ríha Ludek Smolík

Current research often focuses on the design of new methods that extend the well-established role of biometrics in authentication and identification into key management and cryptography. Methods have been proposed that involve biometric-governed access to cryptographic keys, as well as methods that utilize biometric samples to derive keys for specialized encryption algorithms. The aim of this p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید