Nothing Special   »   [go: up one dir, main page]

Kaur et al., 2017 - Google Patents

Cryptographic key generation from multimodal template using fuzzy extractor

Kaur et al., 2017

Document ID
3577177385057951147
Author
Kaur T
Kaur M
Publication year
Publication venue
2017 Tenth International Conference on Contemporary Computing (IC3)

External Links

Snippet

The encryption techniques, biometrics and cryptography integrate to form biometric cryptosystems. These are designed either to bind a cryptographic key or to generate cryptographic key using biometric features. The deployment of bio-cryptosystem technique …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00067Preprocessing; Feature extraction (minutiae)
    • G06K9/00073Extracting features related to minutiae and pores
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour

Similar Documents

Publication Publication Date Title
Nagar et al. A hybrid biometric cryptosystem for securing fingerprint minutiae templates
Nagar et al. Securing fingerprint template: Fuzzy vault with minutiae descriptors
Nagar et al. Multibiometric cryptosystems based on feature-level fusion
Cimato et al. Privacy-aware biometrics: Design and implementation of a multimodal verification system
Lee et al. Cancelable fingerprint templates using minutiae-based bit-strings
Bringer et al. The best of both worlds: Applying secure sketches to cancelable biometrics
Kaur et al. Cryptographic key generation from multimodal template using fuzzy extractor
Lim et al. Biometric feature-type transformation: Making templates compatible for secret protection
Wu et al. Transforming a pattern identifier into biometric key generators
Ao et al. Near infrared face based biometric key binding
Billeb et al. Biometric template protection for speaker recognition based on universal background models
Lutsenko et al. Biometric cryptosystems: overview, state-of-the-art and perspective directions
Benhammadi et al. Password hardened fuzzy vault for fingerprint authentication system
Chafia et al. A biometric crypto-system for authentication
Tran et al. A multi-filter fingerprint matching framework for cancelable template design
Sandhya et al. Cancelable fingerprint cryptosystem using multiple spiral curves and fuzzy commitment scheme
Maiorana et al. User adaptive fuzzy commitment for signature template protection and renewability
Dong et al. Secure chaff-less fuzzy vault for face identification systems
Kelkboom et al. “3D face”: biometric template protection for 3D face recognition
CN116010917A (en) Privacy-protected image processing method, identity registration method and identity authentication method
Yuan Multimodal cryptosystem based on fuzzy commitment
Baghel et al. An enhanced fuzzy vault to secure the fingerprint templates
Kumar et al. A cell-array-based multibiometric cryptosystem
Roh et al. Learning based biometric key generation method using CNN and RNN
Sandhya et al. A bio-cryptosystem for fingerprints using Delaunay neighbor structures (dns) and fuzzy commitment scheme