The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Biometric verification can be considered one of the most reliable approaches to person authentication. However, biometrics are highly sensitive personal data and any information leakage poses severe security and privacy risks. Biometric templates should hence be protected and impersonation with stolen templates must be prevented, while preserving system's performance. In this study, a general biometric...
Most existing biometric template protection schemes (BTPS) do not provide as strong security as cryptographic tools; and furthermore, they are rarely able to detect during a verification process whether a probe template has been leaked from the database or not (i.e., being used by an imposter or a genuine user). By using the "honeywords" idea, which was proposed to detect the cracking of...
Hash based biometric template protection schemes (BTPS), such as fuzzy commitment, fuzzy vault, and secure sketch, address the privacy leakage concern on the plain biometric template storage in a database through using cryptographic hash calculation for template verification. However, cryptographic hashes have only computational security whose being cracked shall leak the biometric feature in these...
In settings where hard-copy materials which are not allowed to be reproduced by any means but are massively delivered to users security specialists distinguish a real threat which is duplication. Such materials may be banknotes, legal documents like diplomas, CDs or even electronic materials distributed over the internet. One of the ways to fight duplication, software piracy and not only, is the usage...
Image Information Systems, as every other information system where we store digital data, is frequently attacked by outer intruders who want to possess these data and use them to their interest. In order to fight these phenomena information systems built on databases use different security techniques. Nevertheless, at the moment that system data, in our case images, are exposed on the web, they cannot...
The aim of Semantic Web is to add machineprocessable information to the Web. Our focus is on information related to people. This problem in Semantic Web is addressed by the FOAF Vocabulary. FOAF Vocabulary describes people, their activities and the people they know. The terms defined in this vocabulary let us say general things about us and people we know. But the terms in FOAF define people generally,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.