[go: up one dir, main page]

Armoogum et al., 2016 - Google Patents

A practical approach for secure biometric template storage for authentication

Armoogum et al., 2016

Document ID
8266301701782273672
Author
Armoogum S
Oozeer A
Publication year
Publication venue
2016 IEEE International Conference on Emerging Technologies and Innovative Business Practices for the Transformation of Societies (EmergiTech)

External Links

Snippet

Biometric is being increasingly used for authentication of user. During enrolment, an enrolment biometric template is generated from the user's raw biometric data. This template is typically stored in the authentication database and used for matching with the template …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • G07C9/00031Access-control involving the use of a pass in combination with an identity-check of the pass-holder
    • G07C9/00071Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
    • G07C9/00087Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Similar Documents

Publication Publication Date Title
Kholmatov et al. Realization of correlation attack against the fuzzy vault scheme
US6185316B1 (en) Self-authentication apparatus and method
EP2813961B1 (en) Biometric verification with improved privacy and network performance in client-server networks
Joshi et al. Security vulnerabilities against fingerprint biometric system
Singh et al. A taxonomy of biometric system vulnerabilities and defences
Bhattasali et al. A survey of security and privacy issues for biometrics based remote authentication in cloud
Matyáš et al. Security of biometric authentication systems
Uzun et al. Cryptographic key derivation from biometric inferences for remote authentication
Gao Biometric authentication in smart grid
Sharma et al. Multimodal biometric user authentication using improved decentralized fuzzy vault scheme based on blockchain network
Karimovich et al. Biometric cryptosystems: Open issues and challenges
Mehta et al. An efficient and lossless fingerprint encryption algorithm using Henon map & Arnold transformation
Morampudi et al. Reliable and privacy-preserving multi-instance iris verification using Paillier homomorphic encryption and one-digit checksum
Latha et al. A study on attacks and security against fingerprint template database
Scaria et al. Enhanced E-commerce application security using three-factor authentication
Ratha Privacy protection in high security biometrics applications
Balakumar et al. A survey on biometrics based cryptographic key generation schemes
Lalithamani et al. Dual encryption algorithm to improve security in hand vein and palm vein-based biometric recognition
Butt et al. Privacy protection of biometric templates
Armoogum et al. A practical approach for secure biometric template storage for authentication
Bayly et al. Fractional biometrics: safeguarding privacy in biometric applications
Cimato et al. Biometrics and privacy
Jegede et al. State of the art in biometric key binding and key generation schemes
Ashok et al. Secure authentication in multimodal biometric systems using cryptographic hash functions
Syta et al. Private eyes: Secure remote biometric authentication