Sciweavers

574 search results - page 46 / 115
» Secure Remote Authentication Using Biometric Data
Sort
View
ICARCV
2008
IEEE
222views Robotics» more  ICARCV 2008»
14 years 4 months ago
Robust fusion using boosting and transduction for component-based face recognition
—Face recognition performance depends upon the input variability as encountered during biometric data capture including occlusion and disguise. The challenge met in this paper is...
Fayin Li, Harry Wechsler, Massimo Tistarelli
CSE
2009
IEEE
14 years 1 months ago
Reliable Identities Using Off-the-Shelf Hardware Security in MANETs
Application scenarios for mobile ad-hoc networks (MANETs) impose a variety of non-standard security requirements. furthermore, in many scenarios owner and user of devices do not a...
Nicolai Kuntze, Andreas Fuchs, Carsten Rudolph
ICASSP
2010
IEEE
13 years 10 months ago
Privacy and security of features extracted from minutiae aggregates
This paper describes our recent analysis on the security and privacy of biometric feature vectors obtained from fingerprint minutiae. A large number of contiguous regions (cuboid...
Abhishek Nagar, Shantanu Rane, Anthony Vetro
ACNS
2010
Springer
172views Cryptology» more  ACNS 2010»
14 years 1 months ago
Secure Sketch for Multiple Secrets
Secure sketches are useful in extending cryptographic schemes to biometric data since they allow recovery of fuzzy secrets under inevitable noise. In practice, secrets derived from...
Chengfang Fang, Qiming Li, Ee-Chien Chang
ICPR
2008
IEEE
14 years 4 months ago
A cryptosystem based on palmprint feature
Biometric cryptography is a technique using biometric features to encrypt data, which can improve the security of the encrypted data and overcome the shortcomings of the tradition...
Xiangqian Wu, Kuanquan Wang, David Zhang