Computation of cryptographic keys from face biometrics
We outline cryptographic key-computation from biometric data based on error-tolerant transformation of continuous-valued face eigenprojections to zero-error bitstrings suitable for cryptographic applicability. Biohashing is based on iterated inner-products between pseudorandom and user-specific eige...
| Main Authors: | Goh,, A, Ngo,, DCL |
|---|---|
| Format: | Article |
| Published: |
2003
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2599/ |
Similar Items
Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability
by: Kuan, , YW, et al.
Published: (2005)
by: Kuan, , YW, et al.
Published: (2005)
Generation of replaceable cryptographic keys from dynamic handwritten signatures
by: Yip, , WK, et al.
Published: (2006)
by: Yip, , WK, et al.
Published: (2006)
Personalised cryptographic key generation based on FaceHashing
by: TEOH, A
Published: (2004)
by: TEOH, A
Published: (2004)
A novel key release scheme from biometrics
by: Song, , Ong Thian, et al.
Published: (2006)
by: Song, , Ong Thian, et al.
Published: (2006)
Binarized revocable biometrics in face recognition
by: Pang, Ying Han, et al.
Published: (2005)
by: Pang, Ying Han, et al.
Published: (2005)
Eigenspace-based face hashing
by: Ngo, , DCL, et al.
Published: (2004)
by: Ngo, , DCL, et al.
Published: (2004)
An integrated dual factor authenticator based on the face data and tokenised random number
by: Teoh, , ABJ, et al.
Published: (2004)
by: Teoh, , ABJ, et al.
Published: (2004)
Flexibly-configurable and computation-efficient digital cash with polynomial-thresholded coinage
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs
by: Teoh, A.B.J., et al.
Published: (2006)
by: Teoh, A.B.J., et al.
Published: (2006)
Biophasor: Token supplemented cancellable biometrics
by: Teoh, , Andrew B. J, et al.
Published: (2006)
by: Teoh, , Andrew B. J, et al.
Published: (2006)
PalmHashing: a novel approach for cancelable biometrics
by: Tee, Connie, et al.
Published: (2005)
by: Tee, Connie, et al.
Published: (2005)
Bio-discretization: Biometrics authentication featuring face data and tokenised random number
by: Foon, , NH, et al.
Published: (2004)
by: Foon, , NH, et al.
Published: (2004)
Multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
A face and speech biometric verification system using a simple Bayesian structure
by: Teoh, , ABJ, et al.
Published: (2005)
by: Teoh, , ABJ, et al.
Published: (2005)
Analysable Chaos-based Design Paradigms For Cryptographic Applications
by: Abba, Abubakar
Published: (2024)
by: Abba, Abubakar
Published: (2024)
Loss-tolerant stream authentication via configurable integration of one-time signatures and hash-graphs
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Why and how should design patterns be formalized?
by: Taibi,, T, et al.
Published: (2001)
by: Taibi,, T, et al.
Published: (2001)
Efficient Big Integer Multiplication and Squaring Algorithms for Cryptographic Applications
by: Jahani, Shahram, et al.
Published: (2014)
by: Jahani, Shahram, et al.
Published: (2014)
An expert screen design and evaluation assistant that uses knowledge-based backtracking
by: Ngo,, DCL, et al.
Published: (2003)
by: Ngo,, DCL, et al.
Published: (2003)
Two-Factor Cancelable Biometrics Authenticator
by: Pang, Ying Han, et al.
Published: (2007)
by: Pang, Ying Han, et al.
Published: (2007)
Improving Chaotic Cryptographic
Primitives Based On Map’s
Complexity And Period Length Of
The Chaotic Maps
by: Masoumi, Amir Akhavan
Published: (2015)
by: Masoumi, Amir Akhavan
Published: (2015)
Iris authentication using privatized advanced correlation filter
by: Chong, , SC, et al.
Published: (2006)
by: Chong, , SC, et al.
Published: (2006)
A robust face recognition system
by: Pang, Ying Han, et al.
Published: (2005)
by: Pang, Ying Han, et al.
Published: (2005)
Fusion of locally linear embedding and principal component analysis for face recognition (FLLEPCA)
by: Abusham, , EE, et al.
Published: (2005)
by: Abusham, , EE, et al.
Published: (2005)
A discriminant pseudo Zernike moments in face recognition
by: Pang, Ying Han, et al.
Published: (2006)
by: Pang, Ying Han, et al.
Published: (2006)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Touch-less palm print biometric system
by: Michael Goh Kah, Ong, et al.
Published: (2008)
by: Michael Goh Kah, Ong, et al.
Published: (2008)
Theoretic evidence k-nearest neighbourhood classifiers in a bimodal biometric verification system
by: Jin, , ATB, et al.
Published: (2003)
by: Jin, , ATB, et al.
Published: (2003)
Nearest neighbourhood classifiers in a bimodal biometric verification system fusion decision scheme
by: Teoh,, A, et al.
Published: (2004)
by: Teoh,, A, et al.
Published: (2004)
Cancellable biometrics and annotations on BioHash
by: TEOH, A, et al.
Published: (2008)
by: TEOH, A, et al.
Published: (2008)
Visual Public-Key Cryptosystems.
by: Samsudin, Azman
Published: (2012)
by: Samsudin, Azman
Published: (2012)
Offline Signature Verification through Biometric Strengthening
by: Ooi, Shih-Yin, et al.
Published: (2007)
by: Ooi, Shih-Yin, et al.
Published: (2007)
Cancelable Biometrics Realization With Multispace Random Projections
by: Teoh, Andrew Beng Jin, et al.
Published: (2007)
by: Teoh, Andrew Beng Jin, et al.
Published: (2007)
Compatibility of biometric strengthening with probabilistic neural network
by: Shih-Yin, Ooi, et al.
Published: (2008)
by: Shih-Yin, Ooi, et al.
Published: (2008)
Reliable template protection technique for biometric authentication
by: Ong, Teng Sian, et al.
Published: (2008)
by: Ong, Teng Sian, et al.
Published: (2008)
Kernel Discriminant Embedding in face recognition
by: Han, Pang Ying, et al.
Published: (2011)
by: Han, Pang Ying, et al.
Published: (2011)
Typing Dynamics Biometric Authentication through Fuzzy Logic
by: Zhe, Jin, et al.
Published: (2008)
by: Zhe, Jin, et al.
Published: (2008)
Securing Telecommunication Based On Speaker Voice As The Public Key.
by: Enayah, Monther Rateb, et al.
Published: (2007)
by: Enayah, Monther Rateb, et al.
Published: (2007)
A preliminary study on biometric watermarking for offline handwritten signature
by: Low, C. Y., et al.
Published: (2007)
by: Low, C. Y., et al.
Published: (2007)
Similar Items
-
Cryptographic keys from dynamic hand-signatures with biometric secrecy preservation and replaceability
by: Kuan, , YW, et al.
Published: (2005) -
Generation of replaceable cryptographic keys from dynamic handwritten signatures
by: Yip, , WK, et al.
Published: (2006) -
Personalised cryptographic key generation based on FaceHashing
by: TEOH, A
Published: (2004) -
A novel key release scheme from biometrics
by: Song, , Ong Thian, et al.
Published: (2006) -
Binarized revocable biometrics in face recognition
by: Pang, Ying Han, et al.
Published: (2005)