The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The impressive amount of recent technological advancements in the area of information systems have brought along, besides the multitude of positive aspects, some negative aspects too. The most obvious one is represented by the fact that the technological innovations are prone to various categories of threats. Making sure that information stays safe, unaltered and secret is an integral part of providing...
This paper deals with software framework that is mainly for large organization where there is no proper security for IT inventory. How can we have a stabilized application which would help IT Admins and Managements to have a clear picture of what are the IT related usages and transactions that are carried out in an Organization? Then would help them frame a proper IT budget every year. To maintain...
In this paper, we propose a secure and robust biometric hashing method. We use Radon transform, min-max quantizer and Reed-Muller decoder in this method. Our goal is to preserve privacy in a biometric recognition system while achieving the desirable accuracy rate. We do the verification using the hash values and hence increase the security of the system. In addition, we guarantee the irreversibility...
In order to meet the application requirements regarding universality, permanence and performance, many multimodal biometric approaches have been proposed in recent decades. In these approaches, fused templates are stored unprotected as biometric reference in a token or database. Once the database is compromised, the attacker can potentially learn details that are sensitive to the data subject and...
The security of wireless body sensor network (BSN) is very important to telemedicine and m-healthcare, and it still remains a critical challenge. This paper presents a novel key distribution solution which allows two sensors in one BSN to agree on a changeable cryptographic key. A previously published scheme, fuzzy vault, is firstly applied to secure the random cryptographic key generated from electrocardiographic...
Security issues of Biometric Encryption are discussed in terms of resilience to the attacks. A number of previously unpublished attacks are considered: Nearest Impostors; using Error Correcting Code statistics; and Non-randomness attack.
The challenges in biometrics research activities have expanded recently to include the maintenance of security and privacy of biometric templates beside the traditional work to improve accuracy, speed, and robustness. Revocable biometric templates and biometric cryptosystems have been developed as template protection measures. Revocability means that biometric templates could be revoked in the same...
Biometric cryptography is a technique using biometric features to encrypt data, which can improve the security of the encrypted data and overcome the shortcomings of the traditional cryptography. This paper proposes a novel biometric cryptosystem based on palmprint features. In this system, the palmprint features, called DoG code, are extracted using Gaussian derivative filters. Then the Reed-Solomon...
In traditional Public Key Infrastructure (PKI) system, Private Key could be stored in central database or store distributed in smart-card and delivered to the users. The Private Key is usually protected by passwords that are easily guessed or stolen and thus lead to the collapse of the whole system. Current trend for PKI system is based on physiological and behavioral characteristics of persons, known...
As one of biometric technologies for personal identification and verification, many algorithm for iris recognition are proposed in recent decades. In these algorithms, iris templates are stored uncovered in the database. Once the database is compromised, the attackers can potentially obtain sufficient information to impersonate the users. This paper proposes a novel template protection algorithm for...
In this paper, a secure face recognition system is presented, in which face detection is performed with skin color detection followed by light normalization and normalized cross correlation. Principal component analysis (PCA) is used for face verification. Due to the rising concern about the security and privacy of the biometric system, we offer a secure storage for user records by encrypting them...
Template security is a critical issue in biometric systems because biometric templates cannot be easily revoked and reissued. While multibiometric systems overcome limitations such as non-universality and high error rates that affect unibiometric systems, they require storage of multiple templates for the same user. Securing the different templates of a user separately is not optimal in terms of security...
In this paper we propose a three factor (smart card, iris code and password) scheme for cryptographic key regeneration based on fuzzy sketches idea which handles biometric variability with error correcting codes. Because errors in iris codes have mixed nature (random and burst errors), concatenated Hadamard and Reed-Solomon codes are used in this work. Hadamard codes can correct up to 25% errors but...
Biometric authentication cannot replace traditional authentication systems unless biometric data is sufficiently protected during the entire authentication procedure. In this paper a novel method to protect face biometric is presented. The randomized Radon signature (RRS) overcomes the natural limitations of biometrics by providing unique, non-reversible and reissuable templates to replace face images...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.