Hadamard matrices and their applications
Hadamard matrices and their applications
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Password hardening based on keystroke dynamics
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Biometric Hash based on Statistical Features of Online Signatures
ICPR '02 Proceedings of the 16 th International Conference on Pattern Recognition (ICPR'02) Volume 1 - Volume 1
Cryptographic Key Generation from Voice
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Enhancing security and privacy in biometrics-based authentication systems
IBM Systems Journal - End-to-end security
Combining Crypto with Biometrics Effectively
IEEE Transactions on Computers
Image understanding for iris biometrics: A survey
Computer Vision and Image Understanding
A Novel Cryptosystem Based on Iris Key Generation
ICNC '08 Proceedings of the 2008 Fourth International Conference on Natural Computation - Volume 04
Efficient iris recognition by characterizing key local variations
IEEE Transactions on Image Processing
IEEE Transactions on Circuits and Systems for Video Technology
Privacy preserving key generation for iris biometrics
CMS'10 Proceedings of the 11th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Iris-Biometric fuzzy commitment schemes under signal degradation
ICISP'12 Proceedings of the 5th international conference on Image and Signal Processing
Hi-index | 0.01 |
As a result of the growing interest in biometrics a new field of research has emerged entitled Biometric Cryptosystems . Only a small amount of work, which additionally tends to be custom-built according to the specific application context, has been published in this area. This work provides a systematic treatment of how to construct biometric cryptosystems based on iris biometrics. A cryptographic primitive called Fuzzy Commitment Scheme is adopted to different types of iris recognition algorithms to hide and retrieve a cryptographic key in and out of a biometric template. Experimental results confirm the soundness of the approach.