2018
DOI: 10.20944/preprints201810.0618.v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Security and Cryptographic Challenges for Authentication Based on Biometrics Data

Abstract: Authentication systems based on biometrics characteristics and data represents one of the most important trend in the evolution of our world. In the near future, biometrics systems will be everywhere in the society, such as government, education, smart cities, banks etc. Due to its uniqueness characteristic, biometrics systems will become also vulnerable, privacy being one of the most important challenge. The classic cryptographic primitives are not sufficient to assure a strong level of secureness for privacy… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…However, although it is not considered very secure [ 8 ], RC4 continues to motivate research nowadays [ 8 , 9 , 10 ]. Furthermore, this cipher is a good option to measure the effectiveness of methods that analyze weaknesses in stream ciphers related to those already known in RC4 [ 11 , 12 , 13 , 14 ], or to check the performance of hardware or software schemes that make use of cryptography [ 15 , 16 , 17 ].…”
Section: Preliminariesmentioning
confidence: 99%
“…However, although it is not considered very secure [ 8 ], RC4 continues to motivate research nowadays [ 8 , 9 , 10 ]. Furthermore, this cipher is a good option to measure the effectiveness of methods that analyze weaknesses in stream ciphers related to those already known in RC4 [ 11 , 12 , 13 , 14 ], or to check the performance of hardware or software schemes that make use of cryptography [ 15 , 16 , 17 ].…”
Section: Preliminariesmentioning
confidence: 99%
“…Maximizing our margin is important, hence we are intrigued in using support vector machines and concurrent hyperplanes. Using equation (5) to describe parallel hyperplanes…”
Section: ( )} (3)mentioning
confidence: 99%
“…With this method, it doesn't matter whether someone has security expertise since the attacker just has to fool the biometric characteristic of the authorised user. Therefore, security systems are often designed to defend against spoof attacks using approaches such as hashing, digital signature, or encryption that are mostly useless in such assaults [5]. Reliable anti-spoofing solutions for biometric characteristics, including fingerprints, face, and other biometric features, have recently received considerable attention in the research community [6].…”
Section: Introductionmentioning
confidence: 99%
“…These algorithms produce a multi-level taxonomy, or clustering of biometrics data, utilizing the dendrogram tree structure. Dendrograms can be constructed top-down or bottom-up, creating two categories of algorithms [133]: divisive and agglomerative. Divisive clustering algorithms build the dendrogram from the root, where the entire samples enter a single cluster and are successively divided by the worst cluster until every cluster comprises just a single sample.…”
Section: Hierarchical Clusteringmentioning
confidence: 99%