Lee et al., 2007 - Google Patents
Biometric key binding: Fuzzy vault based on iris imagesLee et al., 2007
- Document ID
- 13691131421803539291
- Author
- Lee Y
- Bae K
- Lee S
- Park K
- Kim J
- Publication year
- Publication venue
- International conference on biometrics
External Links
Snippet
Recently, crypto-biometric systems have been studied for solving the key management problem of cryptographic systems and protecting templates in biometric systems at the same time. The fuzzy vault system is a well-known crypto-biometric system. We propose a new …
- 210000000554 Iris 0 title abstract description 63
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Lee et al. | Biometric key binding: Fuzzy vault based on iris images | |
| Lee et al. | A new method for generating an invariant iris private key based on the fuzzy vault system | |
| Uludag et al. | Biometric cryptosystems: issues and challenges | |
| Rathgeb et al. | A survey on biometric cryptosystems and cancelable biometrics | |
| Hao et al. | Combining cryptography with biometrics effectively | |
| US8412940B2 (en) | Biometric authentication method and system | |
| Van Der Veen et al. | Face biometrics with renewable templates | |
| Revenkar et al. | Secure iris authentication using visual cryptography | |
| Maiorana | Biometric cryptosystem using function based on-line signature recognition | |
| Sadhya et al. | Review of key‐binding‐based biometric data protection schemes | |
| Baghel et al. | Generation of secure fingerprint template using DFT for consumer electronics devices | |
| Ranjan et al. | Improved and innovative key generation algorithms for biometric cryptosystems | |
| Kumar et al. | A palmprint-based cryptosystem using double encryption | |
| Al-Assam et al. | Combining steganography and biometric cryptosystems for secure mutual authentication and key exchange | |
| Chandra et al. | Cancelable biometric template generation and protection schemes: A review | |
| Wu et al. | A palmprint cryptosystem | |
| Lacharme et al. | PIN-based cancelable biometrics | |
| Yang et al. | Non-invertible geometrical transformation for fingerprint minutiae template protection | |
| Jegede et al. | State of the art in biometric key binding and key generation schemes | |
| Maji et al. | A novel biometric template encryption scheme using sudoku puzzle | |
| Soltane et al. | A review regarding the biometrics cryptography challenging design and strategies | |
| Champaneria et al. | A cancelable biometric authentication scheme based on geometric transformation | |
| Barkathunisha et al. | Secure transmission of medical information using IRIS recognition and steganography | |
| Cimato et al. | Biometrics and privacy | |
| Fatima | Securing the biometric template: a survey |