Iris authentication scheme based on fuzzy extractor

被引:0
|
作者
State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China [1 ]
不详 [2 ]
机构
来源
Jisuanji Yanjiu yu Fazhan | 2008年 / 6卷 / 1036-1042期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] A Performance-Optimization Method for Reusable Fuzzy Extractor Based on Block Error Distribution of Iris Trait
    Zhu, Feng
    Shen, Peisong
    Chen, Chi
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT II, 2019, 305 : 259 - 272
  • [32] An effective authentication scheme for a secured IRIS recognition system based on a novel encoding technique
    Harikrishnan D.
    Sunilkumar N.
    Shelby J.
    Kishor N.
    Remya G.
    Measurement: Sensors, 2023, 25
  • [33] A Secure Multimodal Authentication System Based on Chaos Cryptography and Fuzzy Fusion of Iris and Face
    Eid, Marwa M.
    Mohamed, Mohamed A.
    2017 INTL CONF ON ADVANCED CONTROL CIRCUITS SYSTEMS (ACCS) SYSTEMS & 2017 INTL CONF ON NEW PARADIGMS IN ELECTRONICS & INFORMATION TECHNOLOGY (PEIT), 2017, : 163 - 171
  • [34] Low-Overhead Remote User Authentication Protocol for IoT Based on a Fuzzy Extractor and Feature Extraction
    Taher, Bahaa Hussein
    Jiang, Sheng
    Yassin, Ali A.
    Lu, Hongwei
    IEEE ACCESS, 2019, 7 : 148950 - 148966
  • [35] Remote three-factor authentication scheme based on Fuzzy extractors
    Zhang, Min
    Zhang, Jiashu
    Zhang, Ying
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (04) : 682 - 693
  • [36] Adoption of Iris-Based Authentication
    Mohammadi, S.
    Kaldi, A.
    IEEM: 2008 INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT, VOLS 1-3, 2008, : 1582 - 1586
  • [37] Research on the security of information system authentication scheme based on the fuzzy number intuitionistic fuzzy information
    Wang, Yajie
    Yu, Huan
    Shi, Feng
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 37 (02) : 1629 - 1637
  • [38] Study on the security of information system authentication scheme based on the fuzzy number intuitionistic fuzzy information
    Wang, Ying
    Peng, Xinguang
    Bian, Jing
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2015, 28 (05) : 2225 - 2232
  • [39] A crypto-biometric scheme based on iris-templates with fuzzy extractors
    Alvarez Marino, R.
    Hernandez Alvarez, F.
    Hernandez Encinas, L.
    INFORMATION SCIENCES, 2012, 195 : 91 - 102
  • [40] Fuzzy extractor and chaos enhanced elliptic curve cryptography for image encryption and authentication
    Jasra Bhat
    Manasha Saqib
    Ayaz Hassan Moon
    International Journal of System Assurance Engineering and Management, 2022, 13 : 697 - 712