Natgunanathan et al., 2018 - Google Patents
An overview of protection of privacy in multibiometricsNatgunanathan et al., 2018
- Document ID
- 2810945123022543460
- Author
- Natgunanathan I
- Mehmood A
- Xiang Y
- Hua G
- Li G
- Bangay S
- Publication year
- Publication venue
- Multimedia Tools and Applications
External Links
Snippet
Biometric authentication systems (BASs) have various advantages over traditional authentication systems such as password based systems. In BASs, information related to individuals' physical and psychological characteristics is employed for authentication. The …
- 230000004927 fusion 0 description 45
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sarkar et al. | A review on performance, security and various biometric template protection schemes for biometric authentication systems | |
Dinca et al. | The fall of one, the rise of many: a survey on multi-biometric fusion methods | |
Kaur et al. | Biometric template protection using cancelable biometrics and visual cryptography techniques | |
Jain et al. | Biometric authentication: System security and user privacy. | |
Gumaei et al. | Anti-spoofing cloud-based multi-spectral biometric identification system for enterprise security and privacy-preservation | |
Joshi et al. | Security vulnerabilities against fingerprint biometric system | |
Singh et al. | A taxonomy of biometric system vulnerabilities and defences | |
US20220078020A1 (en) | Biometric acquisition system and method | |
Belguechi et al. | An overview on privacy preserving biometrics | |
Maiorana et al. | User adaptive fuzzy commitment for signature template protection and renewability | |
Belkhede et al. | Biometric mechanism for enhanced security of online transaction on Android system: A design approach | |
Adler | Biometric system security | |
Kaur et al. | Template and database security in Biometrics systems: A challenging task | |
Chandra et al. | Cancelable biometric template generation and protection schemes: A review | |
Natgunanathan et al. | An overview of protection of privacy in multibiometrics | |
Maltoni et al. | Securing fingerprint systems | |
Sharma et al. | A survey on biometric cryptosystems and their applications | |
Sujitha et al. | Highly secure palmprint based biometric template using fuzzy vault | |
Bhargav-Spantzel et al. | Biometrics-based identifiers for digital identity management | |
Butt et al. | Privacy protection of biometric templates | |
Jain et al. | Security of biometric systems | |
Selwal et al. | Performance analysis of template data security and protection in biometric systems | |
Sharma et al. | A novel transformation based security scheme for multi-instance fingerprint biometric system | |
Arora et al. | Biometrics for forensic identification in web applications and social platforms using deep learning | |
Bayly et al. | Fractional biometrics: safeguarding privacy in biometric applications |