[go: up one dir, main page]

Ratha, 2010 - Google Patents

Privacy protection in high security biometrics applications

Ratha, 2010

Document ID
4755781678914540453
Author
Ratha N
Publication year
Publication venue
International Conference on Ethics and Policy of Biometrics

External Links

Snippet

While biometrics is useful for secure and accurate identification of a person, it also has serious privacy implications in handling large databases of biometrics. Standard encryption techniques have limited use for handling biometrics templates and signals as intra-person …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00067Preprocessing; Feature extraction (minutiae)
    • G06K9/00073Extracting features related to minutiae and pores
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • G06K9/00087Matching; Classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00288Classification, e.g. identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00221Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
    • G06K9/00268Feature extraction; Face representation
    • G06K9/00281Local features and components; Facial parts ; Occluding parts, e.g. glasses; Geometrical relationships

Similar Documents

Publication Publication Date Title
Campisi Security and privacy in biometrics: towards a holistic approach
Joshi et al. Security vulnerabilities against fingerprint biometric system
Singh et al. A taxonomy of biometric system vulnerabilities and defences
Alaswad et al. Vulnerabilities of biometric authentication threats and countermeasures
Rajeswari et al. Multi-fingerprint unimodel-based biometric authentication supporting cloud computing
Shafique et al. Modern authentication techniques in smart phones: Security and usability perspective
Karimovich et al. Biometric cryptosystems: Open issues and challenges
Matyáš et al. Security of biometric authentication systems
Ratha Privacy protection in high security biometrics applications
Takahashi et al. Parameter management schemes for cancelable biometrics
Habibu et al. Assessment of vulnerabilities of the biometric template protection mechanism
Brindha Biometric template security using fuzzy vault
Ali et al. A novel technique for fingerprint template security in biometric authentication systems
Buchmann et al. Towards electronic identification and trusted services for biometric authenticated transactions in the Single Euro Payments Area
Ashish et al. Biometric Temp
Butt et al. Privacy protection of biometric templates
Patil et al. Design and implementation of secure biometric based authentication system using rfid and secret sharing
Bayly et al. Fractional biometrics: safeguarding privacy in biometric applications
Chizari et al. Security issues in ATM smart card technology
Nair et al. TOWARDS A ROBUST FINGERPRINT AUTHENTICATION SYSTEM PROTOCOL.
Cimato et al. Biometrics and privacy
Sarkar et al. A Review on Security Attacks in Biometric Authentication Systems
Armoogum et al. A practical approach for secure biometric template storage for authentication
Akanbi et al. Biocryptosystems for Template Protection: A Survey of Fuzzy Vault
Sukaitis Building a path towards responsible use of Biometrics