[go: up one dir, main page]

Sheng et al., 2015 - Google Patents

A biometric key generation method based on semisupervised data clustering

Sheng et al., 2015

Document ID
10158318266019744251
Author
Sheng W
Chen S
Xiao G
Mao J
Zheng Y
Publication year
Publication venue
IEEE Transactions on Systems, Man, and Cybernetics: Systems

External Links

Snippet

Storing biometric templates and/or encryption keys, as adopted in traditional biometrics- based authentication methods, has raised a matter of serious concern. To address such a concern, biometric key generation, which derives encryption keys directly from statistical …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6268Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches
    • G06K9/627Classification techniques relating to the classification paradigm, e.g. parametric or non-parametric approaches based on distances between the pattern to be recognised and training or reference patterns
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/62Methods or arrangements for recognition using electronic means
    • G06K9/6267Classification techniques
    • G06K9/6279Classification techniques relating to the number of classes

Similar Documents

Publication Publication Date Title
Sheng et al. A biometric key generation method based on semisupervised data clustering
Dinca et al. The fall of one, the rise of many: a survey on multi-biometric fusion methods
Bolle et al. Biometric perils and patches
Natgunanathan et al. Protection of privacy in biometric data
Jain et al. Biometrics: a tool for information security
Zhao et al. Negative iris recognition
US20080235788A1 (en) Haptic-based graphical password
Ouda et al. Bioencoding: A reliable tokenless cancelable biometrics scheme for protecting iriscodes
Sheng et al. Template-free biometric-key generation by means of fuzzy genetic clustering
Tran et al. A multi-filter fingerprint matching framework for cancelable template design
CN101924750A (en) Biometric authentication method, client terminal for biometric authentication, authentication server
KR100749380B1 (en) Unique biocode generation method of encryption biometric system
Neha et al. Biometric re-authentication: An approach towards achieving transparency in user authentication
KR102181340B1 (en) Method and system for generating cryptographic key using biometrics and fuzzy vault
Ahmad et al. Improving the performance of projection-based cancelable fingerprint template method
Dash et al. Privacy preserving unique identity generation from multimodal biometric data for privacy and security applications
Al-Assam et al. Multi-Factor Biometrics for Authentication: A false sense of security
Ghouzali Multimodal biometric watermarking-based transfer learning authentication
Sonkar et al. Cancelable iris biometric: A review
Choudhary et al. Secured Automated Certificate Creation Based on Multimodal Biometric Verification
Le et al. Protecting biometric features by periodic function-based transformation and fuzzy vault
Pandiaraja et al. An Overview of Joint Biometric Identification for Secure Online Voting with Blockchain Technology
Ohana et al. HoneyFaces: Increasing the security and privacy of authentication using synthetic facial images
Aldosary et al. A Robust Multimodal Biometric Security System Using the Polynomial Curve Technique within Shamir's Secret Sharing Algorithm
Kümmel et al. Handwriting biometric hash attack: A genetic algorithm with user interaction for raw data reconstruction