Iris authentication scheme based on fuzzy extractor

被引:0
|
作者
State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China [1 ]
不详 [2 ]
机构
来源
Jisuanji Yanjiu yu Fazhan | 2008年 / 6卷 / 1036-1042期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] Fuzzy extractor and chaos enhanced elliptic curve cryptography for image encryption and authentication
    Bhat, Jasra
    Saqib, Manasha
    Moon, Ayaz Hassan
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2022, 13 (02) : 697 - 712
  • [42] PairVoting: A Secure Online Voting Scheme Using Pairing-Based Cryptography and Fuzzy Extractor
    Sultan, Nazatul Haque
    Barbhuiya, Ferdous Ahmed
    Sarma, Nityananda
    2015 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNCATIONS SYSTEMS (ANTS), 2015,
  • [43] On Security of Fuzzy Commitment Scheme for Biometric Authentication
    Chang, Donghoon
    Garg, Surabhi
    Hasan, Munawar
    Mishra, Sweta
    INFORMATION SECURITY AND PRIVACY, ACISP 2022, 2022, 13494 : 399 - 419
  • [44] Biometric-Based Key Generation and User Authentication Using Voice Password Images and Neural Fuzzy Extractor
    Sulavko, Alexey
    Panfilova, Irina
    Inivatov, Daniil
    Lozhnikov, Pavel
    Vulfin, Alexey
    Samotuga, Alexander
    APPLIED SYSTEM INNOVATION, 2025, 8 (01)
  • [45] Fuzzy extractor and elliptic curve based efficient user authentication protocol for wireless sensor networks and internet of things
    Maurya A.K.
    Sastry V.N.
    Information (Switzerland), 2017, 8 (04)
  • [46] Biometric authentication utilizing fuzzy extractor with PSO based security ensuring the data security mechanism as Trio in Cloud
    Sathish, A.
    Bajulunisha, A.
    Sridevi, R.
    Vatchala, S.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2022, 42 (06) : 4805 - 4819
  • [47] A Fuzzy Attribute-Based Authentication Scheme on the Basis of Lagrange Polynomial Interpolation
    Zhu, Shuhua
    Zhan, Li
    Qiang, Hengchang
    Fu, Danlong
    Sun, Wei
    Tang, Yong
    HUMAN CENTERED COMPUTING, HCC 2014, 2015, 8944 : 685 - 692
  • [48] Security Authentication Method of Speech Perceptual Hashing Based on Fuzzy Commitment Scheme
    Zhang Qiu-yu
    Ren Zhan-wei
    Huang Yi-bo
    Yu Shuang
    Hu Wen-jin
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (01): : 229 - 240
  • [49] A Secure and Privacy Preserving Iris Biometric Authentication Scheme with Matrix Transformation
    Jegede, Abayomi
    Udzir, Nur Izura
    Abdullah, Azizol
    Mahmod, Ramlan
    INFORMATION SECURITY APPLICATIONS, WISA 2016, 2017, 10144 : 341 - 352
  • [50] Personal authentication based on iris texture analysis
    Benhammadi, Farid
    Kihal, Nassima
    2008 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1-3, 2008, : 537 - 543