Seo et al., 2019 - Google Patents
Fuzzy vector signature and its application to privacy-preserving authenticationSeo et al., 2019
View PDF- Document ID
- 11401584897972518385
- Author
- Seo M
- Hwang J
- Lee D
- Kim S
- Kim S
- Park J
- Publication year
- Publication venue
- IEEE Access
External Links
Snippet
Fuzzy authentication uses non-deterministic or noisy data, like biometrics, as an authentication factor. Although the data is extracted from the same individual or source, it can be different for each measurement. As a result, one of the main issues in fuzzy …
- 238000005259 measurement 0 abstract description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/62—Methods or arrangements for recognition using electronic means
- G06K9/6217—Design or setup of recognition systems and techniques; Extraction of features in feature space; Clustering techniques; Blind source separation
- G06K9/6232—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods
- G06K9/6247—Extracting features by transforming the feature space, e.g. multidimensional scaling; Mappings, e.g. subspace methods based on an approximation criterion, e.g. principal component analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00067—Preprocessing; Feature extraction (minutiae)
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00268—Feature extraction; Face representation
- G06K9/00281—Local features and components; Facial parts ; Occluding parts, e.g. glasses; Geometrical relationships
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00288—Classification, e.g. identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00268—Feature extraction; Face representation
- G06K9/00275—Holistic features and representations, i.e. based on the facial image taken as a whole
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Amin et al. | A secure three-factor user authentication and key agreement protocol for tmis with user anonymity | |
CN103124269B (en) | Based on the Bidirectional identity authentication method of dynamic password and biological characteristic under cloud environment | |
Amin et al. | Design and analysis of bilinear pairing based mutual authentication and key agreement protocol usable in multi-server environment | |
Morampudi et al. | Privacy-preserving iris authentication using fully homomorphic encryption | |
US7961915B2 (en) | System and method for authenticated and privacy preserving biometric identification systems | |
Islam | Provably secure dynamic identity-based three-factor password authentication scheme using extended chaotic maps | |
CN110969431B (en) | Secure hosting method, device and system for private key of blockchain digital coin | |
Šeděnka et al. | Secure outsourced biometric authentication with performance evaluation on smartphones | |
JP7259868B2 (en) | system and client | |
JP2012521109A (en) | Identification method and shared key generation method | |
Pan et al. | An enhanced secure smart card-based password authentication scheme. | |
Odelu et al. | A secure and efficient ECC‐based user anonymity preserving single sign‐on scheme for distributed computer networks | |
Lee et al. | Instant privacy-preserving biometric authentication for hamming distance | |
Giri et al. | A novel and efficient session spanning biometric and password based three-factor authentication protocol for consumer USB mass storage devices | |
Barman et al. | A novel secure key-exchange protocol using biometrics of the sender and receiver | |
Penn et al. | Customisation of paillier homomorphic encryption for efficient binary biometric feature vector matching | |
Hossain et al. | ICAS: Two-factor identity-concealed authentication scheme for remote-servers | |
Wu et al. | Privacy-preserving cancelable biometric authentication based on RDM and ECC | |
Al‐Saggaf | Key binding biometrics‐based remote user authentication scheme using smart cards | |
Yang et al. | Efficient and privacy-preserving online face recognition over encrypted outsourced data | |
Braeken | PUF‐Based Authentication and Key Exchange for Internet of Things | |
Islam et al. | Design of a provably secure identity‐based digital multi‐signature scheme using biometrics and fuzzy extractor | |
Sarkar et al. | A multi-instance cancelable fingerprint biometric based secure session key agreement protocol employing elliptic curve cryptography and a double hash function | |
Seo et al. | Fuzzy vector signature and its application to privacy-preserving authentication | |
Guo et al. | A More Robust Authentication Scheme for Roaming Service in Global Mobility Networks Using ECC. |