[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Moon et al., 2006 - Google Patents

An efficient selective encryption of fingerprint images for embedded processors

Moon et al., 2006

View PDF
Document ID
9099503335541488403
Author
Moon D
Chung Y
Pan S
Moon K
Chung K
Publication year
Publication venue
ETRI journal

External Links

Snippet

Biometric‐based authentication can provide a strong security guarantee of the identity of users. However, the security of biometric data is particularly important as any compromise of the biometric data will be permanent. In this paper, we propose a secure and efficient …
Continue reading at onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Similar Documents

Publication Publication Date Title
Campisi Security and privacy in biometrics: towards a holistic approach
Patel et al. Cancelable biometrics: A review
Lee et al. Biometric key binding: Fuzzy vault based on iris images
Uludag et al. Biometric cryptosystems: issues and challenges
Kaur et al. Biometric template protection using cancelable biometrics and visual cryptography techniques
Moon et al. An efficient selective encryption of fingerprint images for embedded processors
Cavoukian et al. Biometric encryption: The new breed of untraceable biometrics
Kumar et al. Development of a new cryptographic construct using palmprint-based fuzzy vault
Rajeswari et al. Multi-fingerprint unimodel-based biometric authentication supporting cloud computing
Sadhya et al. Review of key‐binding‐based biometric data protection schemes
Ajish et al. Secure mobile internet voting system using biometric authentication and wavelet based AES
Chandra et al. Cancelable biometric template generation and protection schemes: A review
Nguyen et al. A new biometric template protection using random orthonormal projection and fuzzy commitment
Luo et al. Anonymous biometric access control based on homomorphic encryption
Chitra et al. Security analysis of prealigned fingerprint template using fuzzy vault scheme
Al-Assam et al. Combining steganography and biometric cryptosystems for secure mutual authentication and key exchange
Kumar et al. A palmprint-based cryptosystem using double encryption
Suruthikeerthana et al. An Extended Visual Cryptography With Dynamically Authenticated Error Avoidance Scheme For Bank Applications
Nandini et al. Efficient cryptographic key generation from fingerprint using symmetric hash functions
Sapkal et al. Biometric template protection with fuzzy vault and fuzzy commitment
Dutta et al. Network security using biometric and cryptography
Kaur et al. Remote multimodal biometric authentication using visual cryptography
Barman et al. Approach to cryptographic key generation from fingerprint biometrics
Jegede et al. State of the art in biometric key binding and key generation schemes
Al-Saidi et al. Biometric identification using local iterated function