Key agreement protocols based on the center weighted jacket matrix as a symmetric co-cyclic matrix

C Choe, GY Hwang, SH Kim, HS Yoo… - … , Classification and Security …, 2006 - Springer
Abstract In [1], a key agreement protocol between two users, based on the co-cyclic Jacket
matrix, was proposed. We propose an improved version of that, based on the same center …

Enhancing information security and privacy by combining biometrics with cryptography

SG Kanade - 2010 - theses.hal.science
Securing information during its storage and transmission is an important and widely
addressed issue. Generally, cryptographic techniques are used for information security …

CADMON: Improving the CAD system human interface

H Eisenberg - 15th Design Automation Conference, 1978 - ieeexplore.ieee.org
CADMON: Improving the CAD System Human Interface Page 1 CADMON: IMPROVING THE CAD
SYSTEM HUMAN INTERFACE H. Eisenberg Hughes Aircraft Company Culver City, California …

Maximum entropy binary encoding for face template protection

RK Pandey, Y Zhou, BU Kota, V Govindaraju - arXiv preprint arXiv …, 2015 - arxiv.org
In this paper we present a framework for secure identification using deep neural networks,
and apply it to the task of template protection for face authentication. We use deep …

Non-user-specific multivariate biometric discretization with medoid-based segmentation

MH Lim, ABJ Teoh - … Recognition: 6th Chinese Conference, CCBR 2011 …, 2011 - Springer
Univariate discretization approach that transforms continuous attributes into discrete
elements/binary string based on discrete/binary feature extraction on a single dimensional …

Significant feature based representation for template protection

D Dayal Mohan, N Sankaran… - Proceedings of the …, 2019 - openaccess.thecvf.com
The security of biometric templates is of paramount importance. Leakage of biometric
information may result in loss of private data and can lead to the compromise of the …

An efficient privacy-preserving palmprint authentication scheme based on ElGamal

Y Ding, H Wang, Z Gao, Y Wang, K Fan… - Security and Privacy in …, 2019 - Springer
Biometric credentials have become a popular means of authentication. However, since
biometrics are unique and stable, one data breach might cause the user lose some of his …

Implementation of Discretionary Security Policy in the Distributed Systems Based on the Secret Sharing Scheme

SV Belim, SY Belim - 2019 International Multi-Conference on …, 2019 - ieeexplore.ieee.org
In this article the combination of secret sharing schemes and the requirement of
discretionary security policy is considered. Secret sharing schemes of Shamir and Blakley …

A variant of Biohashing based on the chaotic behavior of the Logistic Map

A Lahmidi, K Minaoui, M Rziza - … Big Data, Internet of Things & …, 2019 - ieeexplore.ieee.org
To meet the security threats related to biometric authentication such as fraudulent access,
biometric forgery and identity theft, a number of protection systems have in fact emerged …

통계적형상기반의얼굴인식을위한가변얼굴템플릿생성방법

이철한, 정민이, 김종선, 최정윤, 김재희 - 전자공학회논문지-SP, 2007 - dbpia.co.kr
가변생체인식 (Changeable Biometrics) 이란 생체정보의 도난이나 도용 시 개인의
프라이버시를 보호하기 위해 원 생체정보를 사용하지 않고, 생체정보를 변환하여 변환된 …