Sciweavers

104 search results - page 4 / 21
» Biometric Based Cryptographic Key Generation from Faces
Sort
View
TIFS
2010
307views more  TIFS 2010»
13 years 9 months ago
Face matching and retrieval using soft biometrics
—Soft biometric traits embedded in a face (e.g., gender and facial marks) are ancillary information and are not fully distinctive by themselves in face-recognition tasks. However...
Unsang Park, Anil K. Jain
CSE
2009
IEEE
14 years 5 months ago
Bio-chaotic Stream Cipher-Based Iris Image Encryption
Conventional cryptography uses encryption key, which are long bit strings and are very hard to memorize such a long random numbers. Also it can be easily attacked by using the brut...
Abdullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mah...
IJNSEC
2007
164views more  IJNSEC 2007»
13 years 10 months ago
A Biometric Identity Based Signature Scheme
We describe an identity based signature scheme that uses biometric information to construct the public key. Such a scheme would be beneficial in many repudiation situations for e...
Andrew Burnett, Fergus Byrne, Tom Dowling, Adam Du...
ICB
2007
Springer
161views Biometrics» more  ICB 2007»
14 years 2 months ago
Latent Identity Variables: Biometric Matching Without Explicit Identity Estimation
Abstract. We present a new approach to biometrics that makes probabilistic inferences about matching without ever estimating an identity "template". The biometric data is...
Simon J. D. Prince, Jania Aghajanian, Umar Mohamme...
CTRSA
2011
Springer
189views Cryptology» more  CTRSA 2011»
13 years 2 months ago
Ideal Key Derivation and Encryption in Simulation-Based Security
Abstract. Many real-world protocols, such as SSL/TLS, SSH, IPsec, IEEE 802.11i, DNSSEC, and Kerberos, derive new keys from other keys. To be able to analyze such protocols in a com...
Ralf Küsters, Max Tuengerthal