Secured cryptographic key generation from multimodal biometrics: feature level fusion of fingerprint and iris

A Jagadeesan, K Duraiswamy - arXiv preprint arXiv:1003.1458, 2010 - arxiv.org
Human users have a tough time remembering long cryptographic keys. Hence, researchers,
for so long, have been examining ways to utilize biometric features of the user instead of a …

[PDF][PDF] Cryptographic key generation from multiple biometric modalities: Fusing minutiae with iris feature

A Jagadeesan, T Thillaikkarasi… - International Journal of …, 2010 - Citeseer
Human users find difficult to remember long cryptographic keys. Therefore, researchers, for
a long time period, have been investigating ways to use biometric features of the user rather …

Bioencoding: A reliable tokenless cancelable biometrics scheme for protecting iriscodes

O Ouda, N Tsumura, T Nakaguchi - IEICE TRANSACTIONS on …, 2010 - search.ieice.org
Despite their usability advantages over traditional authentication systems, biometrics-based
authentication systems suffer from inherent privacy violation and non-revocability issues. In …

Security of biometric authentication systems

V Matyáš, Z Říha - 2010 International Conference on Computer …, 2010 - ieeexplore.ieee.org
This overview paper outlines our views of actual security of biometric authentication and
encryption systems. The attractiveness of some novel approaches like cryptographic key …

Cancellable biometrics and user-dependent multi-state discretization in BioHash

ABJ Teoh, WK Yip, KA Toh - Pattern Analysis and Applications, 2010 - Springer
Although the use of biometrics for security access is convenient and easy to be
implemented, it also introduced privacy and other security concerns when the original …

Robust iris verification for key management

S Ziauddin, MN Dailey - Pattern Recognition Letters, 2010 - Elsevier
In this paper, we present a method for secret key generation and recovery based on iris
verification that, unlike typical systems which store iris templates persistently, stores recovery …

Biometrics-based identifiers for digital identity management

A Bhargav-Spantzel, A Squicciarini, E Bertino… - Proceedings of the 9th …, 2010 - dl.acm.org
We present algorithms to reliably generate biometric identifiers from a user's biometric
image which in turn is used for identity verification possibly in conjunction with cryptographic …

[图书][B] Changeable and privacy preserving face recognition

Y Wang - 2010 - Citeseer
Traditional methods of identity recognition are based on the knowledge of a password or a
PIN, or possession factors such as tokens and ID cards. Such strategies usually afford low …

Recent developments on applying biometrics in cryptography

Q Gao - Journal of Applied Security Research, 2010 - Taylor & Francis
Biometrics is an identification technology widely used in physical access control and
forensics. Cryptography is the science for information security. People generally agreed that …

Enhancing information security and privacy by combining biometrics with cryptography

SG Kanade - 2010 - theses.hal.science
Securing information during its storage and transmission is an important and widely
addressed issue. Generally, cryptographic techniques are used for information security …