Adamovic et al., 2017 - Google Patents
Fuzzy commitment scheme for generation of cryptographic keys based on iris biometricsAdamovic et al., 2017
View PDF- Document ID
- 293210315868105951
- Author
- Adamovic S
- Milosavljevic M
- Veinovic M
- Sarac M
- Jevremovic A
- Publication year
- Publication venue
- IET Biometrics
External Links
Snippet
This work presents a method based on information‐theoretic analysis of iris biometric that aims to extract homogeneous regions of high entropy. Successful extraction of these regions facilitates the development of effective systems for generation of cryptographic keys of …
- 210000000554 Iris 0 title abstract description 127
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00067—Preprocessing; Feature extraction (minutiae)
- G06K9/00073—Extracting features related to minutiae and pores
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Adamovic et al. | Fuzzy commitment scheme for generation of cryptographic keys based on iris biometrics | |
Sandhya et al. | Generating cancellable fingerprint templates based on Delaunay triangle feature set construction | |
Natgunanathan et al. | Protection of privacy in biometric data | |
Sandhya et al. | Securing fingerprint templates using fused structures | |
Dang et al. | Cancellable fuzzy vault with periodic transformation for biometric template protection | |
Ali et al. | Robust technique for fingerprint template protection | |
Yang et al. | Biometrics Based Privacy‐Preserving Authentication and Mobile Template Protection | |
Liu et al. | A secure data backup scheme using multi‐factor authentication | |
Billeb et al. | Biometric template protection for speaker recognition based on universal background models | |
Yeh et al. | Robust elliptic curve cryptography‐based three factor user authentication providing privacy of biometric data | |
Zhao et al. | Iris template protection based on local ranking | |
Mahesh Kumar et al. | BMIAE: blockchain‐based multi‐instance iris authentication using additive ElGamal homomorphic encryption | |
Tams | Unlinkable minutiae‐based fuzzy vault for multiple fingerprints | |
Tarek et al. | Robust cancellable biometrics scheme based on neural networks | |
Nguyen et al. | Improved chaff point generation for vault scheme in bio‐cryptosystems | |
Chen et al. | Face template protection using deep LDPC codes learning | |
Yang et al. | ECB4CI: An enhanced cancelable biometric system for securing critical infrastructures | |
Sadhya et al. | Review of key‐binding‐based biometric data protection schemes | |
Chiou | Secure Method for Biometric‐Based Recognition with Integrated Cryptographic Functions | |
Nguyen et al. | Performance and security‐enhanced fuzzy vault scheme based on ridge features for distorted fingerprints | |
Shukla et al. | Securing fingerprint templates by enhanced minutiae‐based encoding scheme in Fuzzy Commitment | |
Nguyen et al. | Privacy preserving biometric‐based remote authentication with secure processing unit on untrusted server | |
US11501580B1 (en) | Methods and systems for implementing secure biometric recognition | |
Gao et al. | Constructing cancellable template with synthetic minutiae | |
Chafia et al. | A biometric crypto-system for authentication |