Petrovska-Delacrétaz et al., 2010 - Google Patents
Can an Algorithmic Solution be Proposed That Helps the CNIL to Guarantee the Privacy of our Biometric Data?Petrovska-Delacrétaz et al., 2010
View PDF- Document ID
- 5635011399034794557
- Author
- Petrovska-Delacrétaz D
- KANADE S
- Belguechi R
- Rosenberger C
- Dorizzi B
- Publication year
- Publication venue
- WISG 2010: Workshop Interdisciplinaire sur la Sécurite Globale
External Links
Snippet
Biometrics is an emerging solution for identity verification of an individual for logical and physical access control applications. Even if this technology reveals itself as promising (strong relationship between the individual and his authenticator), two important problems …
- 102100007431 CNIH1 0 title description 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sarkar et al. | A review on performance, security and various biometric template protection schemes for biometric authentication systems | |
Lee et al. | Biometric key binding: Fuzzy vault based on iris images | |
Hao et al. | Combining crypto with biometrics effectively | |
Hao et al. | Combining cryptography with biometrics effectively | |
Cavoukian et al. | Biometric encryption: The new breed of untraceable biometrics | |
Sadhya et al. | Review of key‐binding‐based biometric data protection schemes | |
Selwal et al. | Low overhead octet indexed template security scheme for multi-modal biometric system | |
Mehmood et al. | Polynomial based fuzzy vault technique for template security in fingerprint biometrics. | |
Wang et al. | A novel template protection scheme for multibiometrics based on fuzzy commitment and chaotic system | |
Nandini et al. | Efficient cryptographic key generation from fingerprint using symmetric hash functions | |
Kaur | Multimodal based fuzzy vault using iris retina and fingervein | |
Sarkar et al. | A review on different biometric template protection methods | |
Sapkal et al. | Biometric template protection with fuzzy vault and fuzzy commitment | |
Pussewalage et al. | A survey: Error control methods used in bio-cryptography | |
Patel et al. | Hybrid feature level approach for multi-biometric cryptosystem | |
Jegede et al. | State of the art in biometric key binding and key generation schemes | |
Bayly et al. | Fractional biometrics: safeguarding privacy in biometric applications | |
Hashem et al. | Literature Survey: Biometric Cryptosystems Based on Fingerprint Processing Techniques | |
Ashok et al. | Secure authentication in multimodal biometric systems using cryptographic hash functions | |
Meenakshi et al. | Retina and Iris based multimodal biometric Fuzzy Vault | |
Cimato et al. | Biometrics and privacy | |
Petrovska-Delacrétaz et al. | Can an Algorithmic Solution be Proposed That Helps the CNIL to Guarantee the Privacy of our Biometric Data? | |
Champaneria et al. | A cancelable biometric authentication scheme based on geometric transformation | |
Argyropoulos et al. | Biometric template protection in multimodal authentication systems based on error correcting codes | |
Karunathilake et al. | A steganography-based fingerprint authentication mechanism to counter fake physical biometrics and trojan horse attacks |