Cimato et al., 2008 - Google Patents
Privacy-aware biometrics: Design and implementation of a multimodal verification systemCimato et al., 2008
View PDF- Document ID
- 8577820941771894674
- Author
- Cimato S
- Gamassi M
- Piuri V
- Sassi R
- Scotti F
- Publication year
- Publication venue
- 2008 Annual computer security applications conference (ACSAC)
External Links
Snippet
A serious concern in the design and use of biometric authentication systems is the privacy protection of the information derived from human biometric traits, especially since such traits cannot be replaced. Combining cryptography and biometrics, several recent works …
- 238000000034 method 0 abstract description 30
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00221—Acquiring or recognising human faces, facial parts, facial sketches, facial expressions
- G06K9/00288—Classification, e.g. identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
- G06K9/00067—Preprocessing; Feature extraction (minutiae)
- G06K9/00073—Extracting features related to minutiae and pores
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Cimato et al. | Privacy-aware biometrics: Design and implementation of a multimodal verification system | |
| Hao et al. | Combining crypto with biometrics effectively | |
| Hao et al. | Combining cryptography with biometrics effectively | |
| Lee et al. | Biometric key binding: Fuzzy vault based on iris images | |
| Nagar et al. | Securing fingerprint template: Fuzzy vault with minutiae descriptors | |
| Uludag et al. | Securing fingerprint template: Fuzzy vault with helper data | |
| Chen et al. | Biometric based cryptographic key generation from faces | |
| Bringer et al. | The best of both worlds: Applying secure sketches to cancelable biometrics | |
| Maiorana et al. | User adaptive fuzzy commitment for signature template protection and renewability | |
| Dong et al. | Secure chaff-less fuzzy vault for face identification systems | |
| Kaur et al. | Cryptographic key generation from multimodal template using fuzzy extractor | |
| Kelkboom et al. | “3D face”: biometric template protection for 3D face recognition | |
| Yang et al. | A Delaunay triangle group based fuzzy vault with cancellability | |
| Chandra et al. | Cancelable biometric template generation and protection schemes: A review | |
| Wang et al. | A novel template protection scheme for multibiometrics based on fuzzy commitment and chaotic system | |
| Kanade et al. | Application of biometrics to obtain high entropy cryptographic keys | |
| Kumar et al. | A cell-array-based multibiometric cryptosystem | |
| Cimato et al. | A multi-biometric verification system for the privacy protection of iris templates | |
| CN108429614A (en) | A Fuzzy Vault Realization Method Based on the Fusion of Fingerprint and Face Feature Level | |
| Sapkal et al. | Biometric template protection with fuzzy vault and fuzzy commitment | |
| Chafia et al. | A biometric crypto-system for authentication | |
| Sandhya et al. | A bio-cryptosystem for fingerprints using Delaunay neighbor structures (dns) and fuzzy commitment scheme | |
| Liu et al. | Palmprint based multidimensional fuzzy vault scheme | |
| Pussewalage et al. | A survey: Error control methods used in bio-cryptography | |
| Soltane et al. | A review regarding the biometrics cryptography challenging design and strategies |