[go: up one dir, main page]

Lee et al., 2007 - Google Patents

Biometric key binding: Fuzzy vault based on iris images

Lee et al., 2007

Document ID
13691131421803539291
Author
Lee Y
Bae K
Lee S
Park K
Kim J
Publication year
Publication venue
International conference on biometrics

External Links

Snippet

Recently, crypto-biometric systems have been studied for solving the key management problem of cryptographic systems and protecting templates in biometric systems at the same time. The fuzzy vault system is a well-known crypto-biometric system. We propose a new …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
Lee et al. Biometric key binding: Fuzzy vault based on iris images
Lee et al. A new method for generating an invariant iris private key based on the fuzzy vault system
Uludag et al. Biometric cryptosystems: issues and challenges
Rathgeb et al. A survey on biometric cryptosystems and cancelable biometrics
Hao et al. Combining cryptography with biometrics effectively
US8412940B2 (en) Biometric authentication method and system
Van Der Veen et al. Face biometrics with renewable templates
Revenkar et al. Secure iris authentication using visual cryptography
Maiorana Biometric cryptosystem using function based on-line signature recognition
Sadhya et al. Review of key‐binding‐based biometric data protection schemes
Baghel et al. Generation of secure fingerprint template using DFT for consumer electronics devices
Ranjan et al. Improved and innovative key generation algorithms for biometric cryptosystems
Kumar et al. A palmprint-based cryptosystem using double encryption
Al-Assam et al. Combining steganography and biometric cryptosystems for secure mutual authentication and key exchange
Chandra et al. Cancelable biometric template generation and protection schemes: A review
Wu et al. A palmprint cryptosystem
Lacharme et al. PIN-based cancelable biometrics
Yang et al. Non-invertible geometrical transformation for fingerprint minutiae template protection
Jegede et al. State of the art in biometric key binding and key generation schemes
Maji et al. A novel biometric template encryption scheme using sudoku puzzle
Soltane et al. A review regarding the biometrics cryptography challenging design and strategies
Champaneria et al. A cancelable biometric authentication scheme based on geometric transformation
Barkathunisha et al. Secure transmission of medical information using IRIS recognition and steganography
Cimato et al. Biometrics and privacy
Fatima Securing the biometric template: a survey