Ratha, 2010 - Google Patents
Privacy protection in high security biometrics applicationsRatha, 2010
- Document ID
- 4755781678914540453
- Author
- Ratha N
- Publication year
- Publication venue
- International Conference on Ethics and Policy of Biometrics
External Links
Snippet
While biometrics is useful for secure and accurate identification of a person, it also has serious privacy implications in handling large databases of biometrics. Standard encryption techniques have limited use for handling biometrics templates and signals as intra-person …
- 230000002708 enhancing 0 abstract description 10
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00067—Preprocessing; Feature extraction (minutiae)
- G06K9/00073—Extracting features related to minutiae and pores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00087—Matching; Classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00288—Classification, e.g. identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00268—Feature extraction; Face representation
- G06K9/00281—Local features and components; Facial parts ; Occluding parts, e.g. glasses; Geometrical relationships
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Campisi | Security and privacy in biometrics: towards a holistic approach | |
Joshi et al. | Security vulnerabilities against fingerprint biometric system | |
Singh et al. | A taxonomy of biometric system vulnerabilities and defences | |
Alaswad et al. | Vulnerabilities of biometric authentication threats and countermeasures | |
Rajeswari et al. | Multi-fingerprint unimodel-based biometric authentication supporting cloud computing | |
Shafique et al. | Modern authentication techniques in smart phones: Security and usability perspective | |
Karimovich et al. | Biometric cryptosystems: Open issues and challenges | |
Matyáš et al. | Security of biometric authentication systems | |
Ratha | Privacy protection in high security biometrics applications | |
Takahashi et al. | Parameter management schemes for cancelable biometrics | |
Habibu et al. | Assessment of vulnerabilities of the biometric template protection mechanism | |
Brindha | Biometric template security using fuzzy vault | |
Ali et al. | A novel technique for fingerprint template security in biometric authentication systems | |
Buchmann et al. | Towards electronic identification and trusted services for biometric authenticated transactions in the Single Euro Payments Area | |
Ashish et al. | Biometric Temp | |
Butt et al. | Privacy protection of biometric templates | |
Patil et al. | Design and implementation of secure biometric based authentication system using rfid and secret sharing | |
Bayly et al. | Fractional biometrics: safeguarding privacy in biometric applications | |
Chizari et al. | Security issues in ATM smart card technology | |
Nair et al. | TOWARDS A ROBUST FINGERPRINT AUTHENTICATION SYSTEM PROTOCOL. | |
Cimato et al. | Biometrics and privacy | |
Sarkar et al. | A Review on Security Attacks in Biometric Authentication Systems | |
Armoogum et al. | A practical approach for secure biometric template storage for authentication | |
Akanbi et al. | Biocryptosystems for Template Protection: A Survey of Fuzzy Vault | |
Sukaitis | Building a path towards responsible use of Biometrics |