Kalaiarasi et al., 2016 - Google Patents
Stegnographic Mechanism Using BiometricsKalaiarasi et al., 2016
View PDF- Document ID
- 8397943247343483929
- Author
- Kalaiarasi G
- Gayathri R
- Banupriya R
- Publication year
- Publication venue
- IIRJET
External Links
Snippet
Stegnographic Mechanism Using Biometrics Page 1 International Innovative Research Journal
of Engineering and Technology Melange Publications ISSN NO:2456-1983 www.iirjet.org
August 2016 Volume 1 ♦ Special Issue IT33 Stegnographic Mechanism Using Biometrics …
- 230000007246 mechanism 0 title description 10
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
- G07C9/00031—Access-control involving the use of a pass in combination with an identity-check of the pass-holder
- G07C9/00071—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints
- G07C9/00087—Access-control involving the use of a pass in combination with an identity-check of the pass-holder by means of personal physical data, e.g. characteristic facial curves, hand geometry, voice spectrum, fingerprints electronically
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11803633B1 (en) | Method and system for securing user access, data at rest and sensitive transactions using biometrics for mobile devices with protected, local templates | |
US11824991B2 (en) | Securing transactions with a blockchain network | |
CN107251477B (en) | System and method for securely managing biometric data | |
Joshi et al. | Security vulnerabilities against fingerprint biometric system | |
US20170078091A1 (en) | One-Time Passcodes with Asymmetric Keys | |
AU2020399657B2 (en) | Privacy-preserving biometric authentication | |
Mohammed et al. | Current multi-factor of authentication: Approaches, requirements, attacks and challenges | |
Uludag | Secure biometric systems | |
CN108885656A (en) | account access | |
Loukhaoukha et al. | Efficient and secure cryptosystem for fingerprint images in wavelet domain | |
Aanjanadevi et al. | Face Attribute Convolutional Neural Network System for Data Security with Improved Crypto Biometrics. | |
Thawre et al. | Survey on security of biometric data using cryptography | |
Murugesh | Advanced biometric ATM machine with AES 256 and steganography implementation | |
Osho et al. | AbsoluteSecure: a tri-layered data security system | |
Latha et al. | A study on attacks and security against fingerprint template database | |
Ratha | Privacy protection in high security biometrics applications | |
US20240169350A1 (en) | Securing transactions with a blockchain network | |
Srinivas et al. | A Novel Approach For Generation of OTP'S Using Image's | |
Kaur et al. | Remote multimodal biometric authentication using visual cryptography | |
Kalaiarasi et al. | Stegnographic Mechanism Using Biometrics | |
Mehra et al. | Multimodal biometric image security using steganography and watermarking | |
Priscilla et al. | USAGE OF BIOINFORMATIC DATA FOR REMOTE AUTHENTICATION IN WIRELESS NETWORKS. | |
Akanbi et al. | Biocryptosystems for Template Protection: A Survey of Fuzzy Vault | |
Karunathilake et al. | A steganography-based fingerprint authentication mechanism to counter fake physical biometrics and trojan horse attacks | |
Priyadarshini et al. | Privacy preserved two factor authentication system using spread spectrum watermarking of fingerprint and crypto code |