[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Petrovska-Delacrétaz et al., 2010 - Google Patents

Can an Algorithmic Solution be Proposed That Helps the CNIL to Guarantee the Privacy of our Biometric Data?

Petrovska-Delacrétaz et al., 2010

View PDF
Document ID
5635011399034794557
Author
Petrovska-Delacrétaz D
KANADE S
Belguechi R
Rosenberger C
Dorizzi B
Publication year
Publication venue
WISG 2010: Workshop Interdisciplinaire sur la Sécurite Globale

External Links

Snippet

Biometrics is an emerging solution for identity verification of an individual for logical and physical access control applications. Even if this technology reveals itself as promising (strong relationship between the individual and his authenticator), two important problems …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Similar Documents

Publication Publication Date Title
Sarkar et al. A review on performance, security and various biometric template protection schemes for biometric authentication systems
Lee et al. Biometric key binding: Fuzzy vault based on iris images
Hao et al. Combining crypto with biometrics effectively
Hao et al. Combining cryptography with biometrics effectively
Cavoukian et al. Biometric encryption: The new breed of untraceable biometrics
Sadhya et al. Review of key‐binding‐based biometric data protection schemes
Selwal et al. Low overhead octet indexed template security scheme for multi-modal biometric system
Mehmood et al. Polynomial based fuzzy vault technique for template security in fingerprint biometrics.
Wang et al. A novel template protection scheme for multibiometrics based on fuzzy commitment and chaotic system
Nandini et al. Efficient cryptographic key generation from fingerprint using symmetric hash functions
Kaur Multimodal based fuzzy vault using iris retina and fingervein
Sarkar et al. A review on different biometric template protection methods
Sapkal et al. Biometric template protection with fuzzy vault and fuzzy commitment
Pussewalage et al. A survey: Error control methods used in bio-cryptography
Patel et al. Hybrid feature level approach for multi-biometric cryptosystem
Jegede et al. State of the art in biometric key binding and key generation schemes
Bayly et al. Fractional biometrics: safeguarding privacy in biometric applications
Hashem et al. Literature Survey: Biometric Cryptosystems Based on Fingerprint Processing Techniques
Ashok et al. Secure authentication in multimodal biometric systems using cryptographic hash functions
Meenakshi et al. Retina and Iris based multimodal biometric Fuzzy Vault
Cimato et al. Biometrics and privacy
Petrovska-Delacrétaz et al. Can an Algorithmic Solution be Proposed That Helps the CNIL to Guarantee the Privacy of our Biometric Data?
Champaneria et al. A cancelable biometric authentication scheme based on geometric transformation
Argyropoulos et al. Biometric template protection in multimodal authentication systems based on error correcting codes
Karunathilake et al. A steganography-based fingerprint authentication mechanism to counter fake physical biometrics and trojan horse attacks