Moon et al., 2006 - Google Patents
An efficient selective encryption of fingerprint images for embedded processorsMoon et al., 2006
View PDF- Document ID
- 9099503335541488403
- Author
- Moon D
- Chung Y
- Pan S
- Moon K
- Chung K
- Publication year
- Publication venue
- ETRI journal
External Links
Snippet
Biometric‐based authentication can provide a strong security guarantee of the identity of users. However, the security of biometric data is particularly important as any compromise of the biometric data will be permanent. In this paper, we propose a secure and efficient …
- 238000011160 research 0 description 14
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Campisi | Security and privacy in biometrics: towards a holistic approach | |
Patel et al. | Cancelable biometrics: A review | |
Lee et al. | Biometric key binding: Fuzzy vault based on iris images | |
Uludag et al. | Biometric cryptosystems: issues and challenges | |
Kaur et al. | Biometric template protection using cancelable biometrics and visual cryptography techniques | |
Moon et al. | An efficient selective encryption of fingerprint images for embedded processors | |
Cavoukian et al. | Biometric encryption: The new breed of untraceable biometrics | |
Kumar et al. | Development of a new cryptographic construct using palmprint-based fuzzy vault | |
Rajeswari et al. | Multi-fingerprint unimodel-based biometric authentication supporting cloud computing | |
Sadhya et al. | Review of key‐binding‐based biometric data protection schemes | |
Ajish et al. | Secure mobile internet voting system using biometric authentication and wavelet based AES | |
Chandra et al. | Cancelable biometric template generation and protection schemes: A review | |
Nguyen et al. | A new biometric template protection using random orthonormal projection and fuzzy commitment | |
Luo et al. | Anonymous biometric access control based on homomorphic encryption | |
Chitra et al. | Security analysis of prealigned fingerprint template using fuzzy vault scheme | |
Al-Assam et al. | Combining steganography and biometric cryptosystems for secure mutual authentication and key exchange | |
Kumar et al. | A palmprint-based cryptosystem using double encryption | |
Suruthikeerthana et al. | An Extended Visual Cryptography With Dynamically Authenticated Error Avoidance Scheme For Bank Applications | |
Nandini et al. | Efficient cryptographic key generation from fingerprint using symmetric hash functions | |
Sapkal et al. | Biometric template protection with fuzzy vault and fuzzy commitment | |
Dutta et al. | Network security using biometric and cryptography | |
Kaur et al. | Remote multimodal biometric authentication using visual cryptography | |
Barman et al. | Approach to cryptographic key generation from fingerprint biometrics | |
Jegede et al. | State of the art in biometric key binding and key generation schemes | |
Al-Saidi et al. | Biometric identification using local iterated function |