2012
DOI: 10.1007/978-3-642-32287-7_11
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Comparison of Encrypted Biometric Templates

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…Specific defense mechanisms such as tagging input signals with timestamps and using session keys to ensure forward secrecy have been developed [176]. Template encryption, where secure sketch schemes, homomorphic encryption, and chaotic theory, could be used, considering standard hashing and encryption methods which are applicable for other types of data fail for biometric templates [68,148]. A modified Hill Cipher algorithm for encryption and a combinatorial Discrete Cosine and Discrete Wavelet Transforms for concealment were proposed that led to an overall improvement in template storage [111].…”
Section: Sysmentioning
confidence: 99%
“…Specific defense mechanisms such as tagging input signals with timestamps and using session keys to ensure forward secrecy have been developed [176]. Template encryption, where secure sketch schemes, homomorphic encryption, and chaotic theory, could be used, considering standard hashing and encryption methods which are applicable for other types of data fail for biometric templates [68,148]. A modified Hill Cipher algorithm for encryption and a combinatorial Discrete Cosine and Discrete Wavelet Transforms for concealment were proposed that led to an overall improvement in template storage [111].…”
Section: Sysmentioning
confidence: 99%