Rudrakshi et al., 2014 - Google Patents
A model for secure information storage and retrieval on cloud using multimodal biometric cryptosystemRudrakshi et al., 2014
- Document ID
- 16745354166756857140
- Author
- Rudrakshi P
- Hatture S
- Publication year
- Publication venue
- 2014 International Conference on Computer and Communication Technology (ICCCT)
External Links
Snippet
In networking society, advancement in the internet based electronic applications and cloud computing services need higher level of user authentication and information security. Ensuring security with shared secrets like passwords, smart cards is not reliable as they are …
- 210000000554 Iris 0 description 20
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
- G07C9/00071—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
- G07C9/00087—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9189612B2 (en) | Biometric verification with improved privacy and network performance in client-server networks | |
| Uludag et al. | Biometric cryptosystems: issues and challenges | |
| US7840034B2 (en) | Method, system and program for authenticating a user by biometric information | |
| US9152779B2 (en) | Protecting codes, keys and user credentials with identity and patterns | |
| Cavoukian et al. | Biometric encryption: The new breed of untraceable biometrics | |
| Maiorana et al. | User adaptive fuzzy commitment for signature template protection and renewability | |
| Belkhede et al. | Biometric mechanism for enhanced security of online transaction on Android system: A design approach | |
| Matyáš et al. | Security of biometric authentication systems | |
| Lone et al. | A novel OTP based tripartite authentication scheme | |
| Jain et al. | Security of biometric systems | |
| Rudrakshi et al. | A model for secure information storage and retrieval on cloud using multimodal biometric cryptosystem | |
| Conti et al. | Fingerprint traits and RSA algorithm fusion technique | |
| Chao | Biometric-based personal identity-authentication system and security analysis | |
| JP2006262333A (en) | Living body authentication system | |
| Natgunanathan et al. | An overview of protection of privacy in multibiometrics | |
| David | An Analytical Survey on Multi-Biometric Authentication System for Enhancing the Security Levels in Cloud Computing | |
| Hashem et al. | Literature survey: biometric cryptosystems based on fingerprint processing techniques | |
| Cimato et al. | Biometrics and privacy | |
| Nguyen et al. | An approach to protect private key using fingerprint biometric encryption key in BioPKI based security system | |
| Kumar et al. | Sustainable approach to data security: multi-key biometric encryption and cloud storage for SDG-focused businesses | |
| Akdoğan et al. | Secure key agreement using pure biometrics | |
| Bhargav-Spantzel et al. | Biometrics-based identifiers for digital identity management | |
| Giri et al. | Authentication method to secure cloud data centres using biometric technology | |
| Barkathunisha et al. | Secure transmission of medical information using IRIS recognition and steganography | |
| Pawle et al. | A Study of Different Biometric Authentication Techniques in Cloud Computing |