Nothing Special   »   [go: up one dir, main page]

Adamovic et al., 2017 - Google Patents

Fuzzy commitment scheme for generation of cryptographic keys based on iris biometrics

Adamovic et al., 2017

View PDF @Full View
Document ID
293210315868105951
Author
Adamovic S
Milosavljevic M
Veinovic M
Sarac M
Jevremovic A
Publication year
Publication venue
IET Biometrics

External Links

Snippet

This work presents a method based on information‐theoretic analysis of iris biometric that aims to extract homogeneous regions of high entropy. Successful extraction of these regions facilitates the development of effective systems for generation of cryptographic keys of …
Continue reading at ietresearch.onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00067Preprocessing; Feature extraction (minutiae)
    • G06K9/00073Extracting features related to minutiae and pores
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor

Similar Documents

Publication Publication Date Title
Adamovic et al. Fuzzy commitment scheme for generation of cryptographic keys based on iris biometrics
Sandhya et al. Generating cancellable fingerprint templates based on Delaunay triangle feature set construction
Natgunanathan et al. Protection of privacy in biometric data
Sandhya et al. Securing fingerprint templates using fused structures
Dang et al. Cancellable fuzzy vault with periodic transformation for biometric template protection
Ali et al. Robust technique for fingerprint template protection
Yang et al. Biometrics Based Privacy‐Preserving Authentication and Mobile Template Protection
Liu et al. A secure data backup scheme using multi‐factor authentication
Billeb et al. Biometric template protection for speaker recognition based on universal background models
Yeh et al. Robust elliptic curve cryptography‐based three factor user authentication providing privacy of biometric data
Zhao et al. Iris template protection based on local ranking
Mahesh Kumar et al. BMIAE: blockchain‐based multi‐instance iris authentication using additive ElGamal homomorphic encryption
Tams Unlinkable minutiae‐based fuzzy vault for multiple fingerprints
Tarek et al. Robust cancellable biometrics scheme based on neural networks
Nguyen et al. Improved chaff point generation for vault scheme in bio‐cryptosystems
Chen et al. Face template protection using deep LDPC codes learning
Yang et al. ECB4CI: An enhanced cancelable biometric system for securing critical infrastructures
Sadhya et al. Review of key‐binding‐based biometric data protection schemes
Chiou Secure Method for Biometric‐Based Recognition with Integrated Cryptographic Functions
Nguyen et al. Performance and security‐enhanced fuzzy vault scheme based on ridge features for distorted fingerprints
Shukla et al. Securing fingerprint templates by enhanced minutiae‐based encoding scheme in Fuzzy Commitment
Nguyen et al. Privacy preserving biometric‐based remote authentication with secure processing unit on untrusted server
US11501580B1 (en) Methods and systems for implementing secure biometric recognition
Gao et al. Constructing cancellable template with synthetic minutiae
Chafia et al. A biometric crypto-system for authentication