+

Panchal et al., 2019 - Google Patents

Biometric-based cryptography for digital content protection without any key storage

Panchal et al., 2019

Document ID
5726447714034489261
Author
Panchal G
Samanta D
Barman S
Publication year
Publication venue
Multimedia Tools and Applications

External Links

Snippet

The traditional digital data security mechanisms follow either cryptography or authentication. The primary point of contention with these mechanisms remains either memorizing or securely storing the user's credentials. The proposed work addresses this critical issue by …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • G06F21/608Secure printing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
Panchal et al. Biometric-based cryptography for digital content protection without any key storage
Natgunanathan et al. Protection of privacy in biometric data
Li et al. Fuzzy extractors for biometric identification
JP2017076839A (en) Cryptographic processing method, cryptographic processing apparatus, and cryptographic processing program
Lutsenko et al. Biometric cryptosystems: overview, state-of-the-art and perspective directions
Reddy et al. Performance of iris based hard fuzzy vault
Yang et al. ECB4CI: An enhanced cancelable biometric system for securing critical infrastructures
CN107181598B (en) Fingerprint key processing method and device
Sadhya et al. Review of key‐binding‐based biometric data protection schemes
Suresh et al. Two-factor-based RSA key generation from fingerprint biometrics and password for secure communication
Penn et al. Customisation of paillier homomorphic encryption for efficient binary biometric feature vector matching
Baghel et al. An enhanced fuzzy vault to secure the fingerprint templates
Tran et al. Biometrics-based authenticated key exchange with multi-factor fuzzy extractor
Bauspieß et al. BRAKE: Biometric resilient authenticated key exchange
Seo et al. Construction of a New Biometric‐Based Key Derivation Function and Its Application
Sandhya et al. A bio-cryptosystem for fingerprints using Delaunay neighbor structures (dns) and fuzzy commitment scheme
Suresh et al. A stable cryptographic key generation from fingerprint biometrics using Gray code for secure data storage
Liu et al. Palmprint based multidimensional fuzzy vault scheme
Pussewalage et al. A survey: Error control methods used in bio-cryptography
Gunasinghe et al. Privacy preserving biometrics-based and user centric authentication protocol
Gupta et al. A complete end-to-end system for iris recognition to mitigate replay and template attack
Sutcu et al. Secure sketches for protecting biometric templates
Sarkar et al. Survey on Biometric applications for implementation of authentication in smart Governance
Xi et al. FE-SViT: A SViT-based fuzzy extractor framework
Ziauddin et al. Robust iris verification for key management
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载