نتایج جستجو برای: biometric fingerprint

تعداد نتایج: 22183  

2012
Sandhya Tarar Ashish Kumar Ela Kumar

Digital watermarking of fingerprint images has been explored to solve the problems of security of data. Biometric data security concerns are receiving the widespread public acceptance of biometric technology. Since a number of security mechanism have been proposed, but due the trade-off between identification efficiency and security of stored template, practical applications have not benefited ...

2009
Hoi Le Duy Bui

National ID card, electronic commerce, and access to computer networks are some scenarios where reliable identification is a must. Existing authentication systems relying on knowledge-based approaches like passwords or token-based such as magnetic cards and passports contain serious security risks due to the vulnerability to engineering-social attacks and the easiness of sharing or compromising...

2015
Yongjian Hu Heung-Kyu Lee Huafei Zeng N. Krishnamurthy Yi Wang Jiankun Hu Fengling Han Manvjeet Kaur Mukhwinder Singh Akshay Girdhar Parvinder S. Sandhu S. S. Gornale Vikas T Humbe R. R. Manza

Fingerprint and Iris are significant biometric tools used for authentication. This paper proposes a novel methodology by which the biometric patterns can be visualized as a set of Bezier curves and hence represented by the corresponding Bezier points, resulting in considerable reduction in the file size. This scheme utilizes the Bezier curve representations for effective compression of all thos...

2004
F. A. Afsar M. Arif M. Hussain

Fingerprints are the most widely used biometric feature for person identification and verification in the field of biometric identification. Fingerprints possess two main types of features that are used for automatic fingerprint identification and verification: (i) global ridge and furrow structure that forms a special pattern in the central region of the fingerprint and (ii) Minutiae details a...

Journal: :CoRR 2010
A. Jagadeesan K. Duraiswamy

Human users have a tough time remembering long cryptographic keys. Hence, researchers, for so long, have been examining ways to utilize biometric features of the user instead of a memorable password or passphrase, in an effort to generate strong and repeatable cryptographic keys. Our objective is to incorporate the volatility of the user's biometric features into the generated key, so as to mak...

2016
Shancymol Sojan R. K. Kulkarni

Fingerprints are popular among the biometric – based systems due to ease of acquisition, uniqueness and availability. Fingerprint based biometric systems work by extracting and matching some features on the fingerprint. Due to errors in acquisition phase, it is possible that the scanned fingerprint image is not of a good quality and hence needs to be enhanced before being processed by the featu...

Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...

Journal: :International Journal of Computer and Electrical Engineering 2010

2016
Chengyang Xie Jiayong Liu Xu Yao Dianhua Tang

Biometric key technology is the organic combination of biometric encryption technology and traditional cryptography. Biometric key can directly encrypt data or encrypt key, with the character of portable use and not easily being stolen, forgotten and broken. This article provides an algorithm for generating key based on the fingerprint feature bit-strings, extracting fingerprint feature informa...

Journal: :I. J. Network Security 2010
Sunil V. K. Gaddam Manohar Lal

This paper puts forth a fresh methodology for the secure storage of fingerprint template by generating Secured Feature Matrix and keys for cryptographic techniques applied for data Encryption or Decryption with the aid of cancellable biometric features. Conventional techniques depend on biometric features like face, fingerprint, hand geometry, iris, signature, keystroke, voice and the like for ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید