نتایج جستجو برای: biometric encryption
تعداد نتایج: 36436 فیلتر نتایج به سال:
Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...
The proliferation of online biometric authentication has necessitated security requirements of biometric templates. The existing secure biometric authentication schemes feature a server-centric model, where a service provider maintains a biometric database and is fully responsible for the security of the templates. The end-users have to fully trust the server in storing, processing and managing...
We propose a novel biometric sensing technique for personal authentication in which fingerprint images are captured using an optical encryption method. This method can reduce the risk of data theft or leakage of personal information captured by biometric sensing. This method, termed encrypted sensing, is implemented using digital holography with double random phase encoding. We demonstrate expe...
Steganography is the art of hiding the existence of data inanother transmission medium to achieve secret communication . Steganography method used in this paper is based on biometrics, ie biometric steganography. And the biometric feature used to implement steganography is skin tone region of images. Here secret data is embedded within skin region of image that will provide an excellent secure ...
A new biometric system is proposed which replaces the template match known from presently used biometric systems by a more powerful approach that uses error tolerant coding. This enables the system for new applications and enhances compatibility to non-biometric systems which are in use now.
Biometrics is a major class of approaches for user authentication. This project uses iris recognition as a demonstrating example to explore techniques for building secure biometrics systems. After segmenting and identifying the region of the iris, unique and robust features of each person's iris are extracted and used to match with iris patterns in a database. In order to provide privacy protec...
The transfer of data in a secure way can be implemented using Biometric technologiesto authenticate. Thanjavur, India. We identify and use invariant and unique biometric features to embed data. The mechanism consists of a two level encryption system using certain algorithms .The vein pattern of a user is obtained and his DNA sequence is retrieved from the database. The first level of encryption...
In respect to the issues on privacy, security and legal significance of a document, some sorts of security protections should be put on a document to ensure its genuineness and integrity. In this research, signatories’ encrypted digital biometric fingerprint in binary format will be embedded into a binary text document by Flipping – one of the methods in spatial domain. During the embedding pro...
In this paper, a Modular Fractional Chaotic Sine Map (MFC-SM) has been introduced to achieve high Lyapunov exponent values and completely chaotic behavior of the bifurcation diagram for level security. The proposed MFC-SM is compared with conventional non it an excellent analysis. addition, randomness test results indicate that shows better performance satisfy all tests. Due properties good ran...
Biometric identification has been incredibly useful in the law enforcement to authenticate an individual’s identity and/or to figure out who someone is, typically by scanning a database of records for a close enough match. In this work, we investigate the privacy-preserving biometric identification outsourcing problem, where the database owner outsources both the large-scale encrypted database ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید