نتایج جستجو برای: biometric encryption

تعداد نتایج: 36436  

2005
Emin Martinian Sergey Yekhanin Jonathan Yedidia Jonathan S. Yedidia

We consider the secure biometric storage problem and develop a solution using syndrome codes. Specifically, biometrics such as fingerprints, irises, and faces are often used for authentication, access control, and encryption instead of passwords. While it is well known that passwords should never be stored in the clear, current systems often store biometrics in the clear and are easily compromi...

2007
Stark Draper Ashish Khisti Emin Martinian Anthony Vetro Jonathan Yedidia Stark C. Draper Jonathan S. Yedidia

We describe a method to encode fingerprint biometrics securely for use, e.g., in encryption or access control. The system is secure because the stored data suffices to validate a probe fingerprint but not to recreate the original fingerprint biometric. Therefore, a breach in database security does not lead to the loss of biometric data. We present a model for a secure biometric system for which...

Journal: :IACR Cryptology ePrint Archive 2016
Jung Hee Cheon HeeWon Chung Myungsun Kim Kang-Won Lee

Biometric authentication methods are gaining popularity due to their convenience. For an authentication without relying on trusted hardwares, biometrics or their hashed values should be stored in the server. Storing biometrics in the clear or in an encrypted form, however, raises a grave concern about biometric theft through hacking or man-in-the middle attack. Unlike ID and password, once lost...

2014
Santosh Kumar Mishra

Cryptography is used for security and authentication of data. Therefore it is used in biometrics system for keeping it safe and away from frauds. When we are using biometrics we ensure that, it is specially used for authentication and verification for the person’s template. This template can be misused if it is stolen by any nonauthenticate person. Focusing on biometric template security is the...

Journal: :CoRR 2016
Joep Peeters Andreas Peter Raymond N. J. Veldhuis

As applications of biometric verification proliferate, users become more vulnerable to privacy infringement. Biometric data is very privacy sensitive as it may contain information as sex, ethnicity and health conditions which should not be shared with third parties during the verification process. Moreover, biometric data that has fallen into the wrong hands often leads to identity theft. Secur...

2017
M. Suganya Dr. S. Suganya

---------------------------------------------------------------------***--------------------------------------------------------------------Abstract-Biometric authentication systems are gaining widespread popularity in recent years due to the advances in sensor technologies as well as improvements in the matching algorithms. Preserving the privacy of digital biometric data stored in a central d...

Journal: :EAI Endorsed Transactions on Pervasive Health and Technology 2020

Journal: :Applied sciences 2023

Homomorphic encryption is a powerful mechanism that allows sensitive data, such as biometric to be compared in protected way, revealing only the comparison result when private key known. This very useful for non-device-centric authentication architectures with clients provide data and external servers authenticate them. While many reported solutions do not follow standards are resistant quantum...

2015
Constantinos Patsakis Jeroen van Rest Michal Choras Mélanie Bouroche

The continuous dependence on electronic media has radically changed our interactions, many of which are now performed online. In many occasions users need to authenticate to remote machines, but the hostile environment of the Internet may severely expose users and service providers. To counter these shortcomings, strong authentication is pushed forward. As a means to authenticate individuals, b...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید