Enhancing security and privacy in biometrics based authentication system using multiple secret sharing

S Patil, K Tajane, J Sirdeshpande - … Conference on Computing …, 2015 - ieeexplore.ieee.org
A biometric authentication system acquires biometric sample such as fingerprint from the
subject. The fingerprint signifies physiological features of an individual. This biometric …

Design and implementation of secure biometric based authentication system using rfid and secret sharing

S Patil, P Dhumal, S Lokhande… - 2017 2nd International …, 2017 - ieeexplore.ieee.org
Biometric data refers to metrics related to unique human characteristics like fingerprint, iris,
face recognition, voice, palm print, etc. Various security threats are raised while handling …

Secret sharing using biometric traits

A Kholmatov, B Yanikoglu, E Savas… - … Technology For Human …, 2006 - spiedigitallibrary.org
In biometric based authentication, biometric traits of a person are matched against his/her
stored biometric profile and access is granted if there is sufficient match. However, there are …

Biometric Extensions for Secret Sharing Protocols

L Ogiela, MR Ogiela - 2015 2nd International Conference on …, 2015 - ieeexplore.ieee.org
In this paper authors will present a new idea of application of selected biometric pattern for
creation cryptographic protocols, dedicated for secret sharing and data distribution. The …

A Robust Multimodal Biometric Security System Using the Polynomial Curve Technique within Shamir's Secret Sharing Algorithm

S Aldosary, G Howells - 2012 Third International Conference on …, 2012 - ieeexplore.ieee.org
This paper investigates the application of secret sharing technology to allow an encryption
key to be derived from multimodal biometric samples. Within the proposed scheme …

Double layer secure secret images sharing scheme for biometrics

E Gunasekaran, V Muthuraman - Distributed and Parallel Databases, 2022 - Springer
Biometric strategy is primarily followed for authentication which incorporates the distinct
recognition of the individual depending on their physical or behavioral features. Among all …

Secure group authentication using a non-perfect secret sharing scheme based on controlled mixing

K Karthik, D Hatzinakos - 2009 Annual IEEE India Conference, 2009 - ieeexplore.ieee.org
In perfect secret sharing schemes, invalid coalitions of shares do not reveal any information
regarding the secret. However, in secret sharing constructions which are non-perfect in …

[PDF][PDF] Secret Sharing Scheme for Securing Biometric Template

SO Asakpa, BK Alese, OS Adewale… - for National Safety & …, 2016 - researchgate.net
Identity theft is a growing concern in this age of digital technology and applications.
Traditional authentication methods such as passwords, passphrases, identity documents …

Secure Authentication in Online Voting System Using Multiple Image Secret Sharing

P Sanyasi Naidu, R Kharat - … , SSCC 2016, Jaipur, India, September 21-24 …, 2016 - Springer
In the democratic country, all eligible citizens of the country are involved in decision making
through voting. Right to vote allows voters to choose their candidate and government. In …

[引用][C] Secret sharing schemes for secure biometric authentication

S Patil, K Tajane, J Sirdeshpande - International Journal of Scientific & Engineering …, 2013