Huber et al., 2011 - Google Patents
Two-factor biometric recognition with integrated tamper-protection watermarkingHuber et al., 2011
View PDF- Document ID
- 9691431390505935886
- Author
- Huber R
- Stögner H
- Uhl A
- Publication year
- Publication venue
- IFIP International Conference on Communications and Multimedia Security
External Links
Snippet
Two-factor authentication with biometrics and smart-cards enabled by semi-fragile watermarking is proposed. Several advantages of the scheme as compared to earlier approaches are discussed and experiments for an iris-based recognition system …
- 210000000554 Iris 0 abstract description 27
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00087—Matching; Classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00013—Image acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00288—Classification, e.g. identification
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
- G07C9/00071—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
- G07C9/00087—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00885—Biometric patterns not provided for under G06K9/00006, G06K9/00154, G06K9/00335, G06K9/00362, G06K9/00597; Biometric specific functions not specific to the kind of biometric
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Jain et al. | Hiding biometric data | |
| Jain et al. | Biometric template security: Challenges and solutions | |
| Lee et al. | Biometric key binding: Fuzzy vault based on iris images | |
| Jain et al. | Hiding fingerprint minutiae in images | |
| US8058972B2 (en) | Methods and devices for enrollment and verification of biometric information in identification documents | |
| Haddada et al. | A combined watermarking approach for securing biometric data | |
| Kim et al. | Multimodal biometric image watermarking using two-stage integrity verification | |
| Hämmerle-Uhl et al. | Watermarking as a means to enhance biometric systems: A critical survey | |
| Ma et al. | Secure multimodal biometric authentication with wavelet quantization based fingerprint watermarking | |
| Adler | Biometric system security | |
| Uludag | Secure biometric systems | |
| Taha et al. | Information hiding: a tools for securing biometric information | |
| Maltoni et al. | Securing fingerprint systems | |
| Kant et al. | Biometrics security using steganography | |
| Huber et al. | Two-factor biometric recognition with integrated tamper-protection watermarking | |
| Hämmerle-Uhl et al. | Robust watermarking in iris recognition: application scenarios and impact on recognition performance | |
| Latha et al. | A study on attacks and security against fingerprint template database | |
| Kim et al. | Secure remote fingerprint verification using dual watermarks | |
| Hämmerle-Uhl et al. | Attack against robust watermarking-based multimodal biometric recognition systems | |
| Huber et al. | Semi-fragile watermarking in biometric systems: template self-embedding | |
| Bayly et al. | Fractional biometrics: safeguarding privacy in biometric applications | |
| Yang et al. | Non-invertible geometrical transformation for fingerprint minutiae template protection | |
| Chopra et al. | Biometric system security issues and challenges | |
| Cimato et al. | Biometrics and privacy | |
| Han et al. | M-identity and its authentication protocol for secure mobile commerce applications |