2013 2nd International Conference on Advances in Biomedical Engineering 2013
DOI: 10.1109/icabme.2013.6648877
|View full text |Cite
|
Sign up to set email alerts
|

Securing biometric data by combining watermarking and cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0
1

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 5 publications
0
2
0
1
Order By: Relevance
“…It may be authenticated using active or passive monitoring. The existing and actual videos are compared previously, and a maximum number of data storage is needed, if the security technique of watermarking may impart the vigorous surveillance in an imperceptible and sturdy way [28].…”
Section: Broadcast Monitoringmentioning
confidence: 99%
“…It may be authenticated using active or passive monitoring. The existing and actual videos are compared previously, and a maximum number of data storage is needed, if the security technique of watermarking may impart the vigorous surveillance in an imperceptible and sturdy way [28].…”
Section: Broadcast Monitoringmentioning
confidence: 99%
“…However, with the help of steganography, it would be very difficult to do so. In [15] Ouslim et al described in detail how biometric data can be transferred onto a computer network without an attack or even without being detected. They also highlight the possible location of such an attack, a sensor location, where most of the fingerprint is left.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Bu tekniklerin bir arada kullanılmasıyla güvenlik mekanizmasının seviyesi arttırılabilir. Yapılan birçok çalışmada [1,2,3,4,5,6] güvenlik seviyesini arttırmak için bu teknikler bir arada kullanılmıştır.…”
Section: Introductionunclassified