Koptyra et al., 2019 - Google Patents
Multiply information coding and hiding using fuzzy vaultKoptyra et al., 2019
- Document ID
- 6632600201660253448
- Author
- Koptyra K
- Ogiela M
- Publication year
- Publication venue
- Soft Computing
External Links
Snippet
In this paper we show some new ideas of hiding several secrets with the use of fuzzy vault construction and, in addition, a few systems based on presented concept. The main assumption is that all pieces of information are put into single vault and each of the secrets is …
- 238000000034 method 0 abstract description 20
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Campisi | Security and privacy in biometrics: towards a holistic approach | |
JP4961214B2 (en) | Biometric authentication method and system | |
Tulyakov et al. | Symmetric hash functions for secure fingerprint biometric systems | |
Koptyra et al. | Multiply information coding and hiding using fuzzy vault | |
Castiglione et al. | Biometrics in the cloud: challenges and research opportunities | |
El-Hameed et al. | Cancelable biometric security system based on advanced chaotic maps | |
Bernal-Romero et al. | A review on protection and cancelable techniques in biometric systems | |
Maiorana et al. | User adaptive fuzzy commitment for signature template protection and renewability | |
Nguyen et al. | A new biometric template protection using random orthonormal projection and fuzzy commitment | |
Abdul et al. | Combining watermarking and hyper-chaotic map to enhance the security of stored biometric templates | |
Asthana et al. | A novel biometric crypto system based on cryptographic key binding with user biometrics | |
Sharma et al. | A survey on biometric cryptosystems and their applications | |
Bassit et al. | Hybrid biometric template protection: Resolving the agony of choice between bloom filters and homomorphic encryption | |
Yildiz et al. | Biometric layering with fingerprints: template security and privacy through multi-biometric template fusion | |
Ali et al. | A novel technique for fingerprint template security in biometric authentication systems | |
You et al. | A novel fuzzy vault scheme based on fingerprint and finger vein feature fusion | |
Natgunanathan et al. | An overview of protection of privacy in multibiometrics | |
Panwar et al. | Techniques for enhancing the security of fuzzy vault: a review | |
Nair et al. | Multibiometric cryptosystem based on decision level fusion for file uploading in cloud | |
Vielhauer et al. | Design aspects of secure biometric systems and biometrics in the encrypted domain | |
Al-Saidi et al. | Password authentication based on fractal coding scheme | |
Jegede et al. | State of the art in biometric key binding and key generation schemes | |
Maji et al. | A novel biometric template encryption scheme using sudoku puzzle | |
Sutcu et al. | Secure sketches for protecting biometric templates | |
Ibjaoun et al. | Biometric template privacy using visual cryptography |