2012
DOI: 10.2200/s00417ed1v01y201205spt003
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Information Security and Privacy by Combining Biometrics with Cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(16 citation statements)
references
References 148 publications
0
16
0
Order By: Relevance
“…Biometric authentication compared to regular passwords is more secure as biometrics is part of a legitimate user's own data, hence users do not need to remember any form of passwords. In a typical biometric cryptography system, the key being generated originates from the initial biometric data (Kanade et al, 2012). In cryptography, the strength of a cryptographic key is measured by its entropy (Ballard et al, 2008).…”
Section: Key Generation Securitymentioning
confidence: 99%
“…Biometric authentication compared to regular passwords is more secure as biometrics is part of a legitimate user's own data, hence users do not need to remember any form of passwords. In a typical biometric cryptography system, the key being generated originates from the initial biometric data (Kanade et al, 2012). In cryptography, the strength of a cryptographic key is measured by its entropy (Ballard et al, 2008).…”
Section: Key Generation Securitymentioning
confidence: 99%
“…Research in this domain started in 1998 and there is not yet a uniform nomenclature/classification capable of categorizing the various techniques and approaches present in the literature. Two nomenclatures/classifications are highlighted: the one used by Jain et al in [8] and the one used by Kanade et al [7]. In [8] as well as in [14], the crypto-biometric techniques were named template protection schemes and classified in two categories: (a) Feature transformation schemes and (b) Biometric cryptosystem (also referred to as helper data-based schemes).…”
Section: A Combining Biometrics and Cryptographic Techniquesmentioning
confidence: 99%
“…The implementation of biometric techniques in access control systems usually increases total security as it adds the biometry as one extra security factor: the identity-based factor. Cryptographic techniques combined with biometrics allowed the emergence of a new research field referenced to as cryptobiometric systems [7]). …”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Biometric [2] is a very secure way of identification of a person or authentication of a person. It is well known that humans naturally use some body characteristics such as face, gait or voice to recognize each other.…”
Section: Introductionmentioning
confidence: 99%