Panchal et al., 2019 - Google Patents
Biometric-based cryptography for digital content protection without any key storagePanchal et al., 2019
- Document ID
- 5726447714034489261
- Author
- Panchal G
- Samanta D
- Barman S
- Publication year
- Publication venue
- Multimedia Tools and Applications
External Links
Snippet
The traditional digital data security mechanisms follow either cryptography or authentication. The primary point of contention with these mechanisms remains either memorizing or securely storing the user's credentials. The proposed work addresses this critical issue by …
- 238000009114 investigational therapy 0 abstract description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
- G06F21/608—Secure printing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K9/00—Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
- G06K9/00006—Acquiring or recognising fingerprints or palmprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Panchal et al. | Biometric-based cryptography for digital content protection without any key storage | |
| Natgunanathan et al. | Protection of privacy in biometric data | |
| Li et al. | Fuzzy extractors for biometric identification | |
| JP2017076839A (en) | Cryptographic processing method, cryptographic processing apparatus, and cryptographic processing program | |
| Lutsenko et al. | Biometric cryptosystems: overview, state-of-the-art and perspective directions | |
| Reddy et al. | Performance of iris based hard fuzzy vault | |
| Yang et al. | ECB4CI: An enhanced cancelable biometric system for securing critical infrastructures | |
| CN107181598B (en) | Fingerprint key processing method and device | |
| Sadhya et al. | Review of key‐binding‐based biometric data protection schemes | |
| Suresh et al. | Two-factor-based RSA key generation from fingerprint biometrics and password for secure communication | |
| Penn et al. | Customisation of paillier homomorphic encryption for efficient binary biometric feature vector matching | |
| Baghel et al. | An enhanced fuzzy vault to secure the fingerprint templates | |
| Tran et al. | Biometrics-based authenticated key exchange with multi-factor fuzzy extractor | |
| Bauspieß et al. | BRAKE: Biometric resilient authenticated key exchange | |
| Seo et al. | Construction of a New Biometric‐Based Key Derivation Function and Its Application | |
| Sandhya et al. | A bio-cryptosystem for fingerprints using Delaunay neighbor structures (dns) and fuzzy commitment scheme | |
| Suresh et al. | A stable cryptographic key generation from fingerprint biometrics using Gray code for secure data storage | |
| Liu et al. | Palmprint based multidimensional fuzzy vault scheme | |
| Pussewalage et al. | A survey: Error control methods used in bio-cryptography | |
| Gunasinghe et al. | Privacy preserving biometrics-based and user centric authentication protocol | |
| Gupta et al. | A complete end-to-end system for iris recognition to mitigate replay and template attack | |
| Sutcu et al. | Secure sketches for protecting biometric templates | |
| Sarkar et al. | Survey on Biometric applications for implementation of authentication in smart Governance | |
| Xi et al. | FE-SViT: A SViT-based fuzzy extractor framework | |
| Ziauddin et al. | Robust iris verification for key management |