12 Hits in 6.3 sec

K-Medoids-Based Random Biometric Pattern for Cryptographic Key Generation [chapter]

H. A. Garcia-Baleon, V. Alarcon-Aquino, O. Starostenko
2009 Lecture Notes in Computer Science  
In this paper we report an approach for cryptographic key generation based on keystroke dynamics and the k-medoids algorithm.  ...  The cryptographic key released by the proposed approach may be used in several encryption algorithms.  ...  A random biometric pattern generated using the biometric information with a determined random distribution is shown.  ... 
doi:10.1007/978-3-642-10268-4_10 fatcat:ltjoe4gh4rahjmek2y7ogeq23e

Design of Secured Key Generation Algorithm using Fingerprint Based Biometric Modality

A. Jaya Lakshmi
2012 IOSR Journal of Engineering  
This may be efficiently solved by the combination of biometrics with cryptography. This paper presents ways for generating the strong bio-crypt key based mostly on fingerprint.  ...  Researchers are examining suggests that to utilize biometric options of the user to get sturdy and repeatable cryptographic keys rather than a memorable password.  ...  [6] proposed an approach for cryptographic key generation that is on the idea of keystroke dynamics and therefore the k-medoids algorithm.  ... 
doi:10.9790/3021-0202325330 fatcat:ys4f7mbrebazrddzqsctjqzmtq

Stable Hash Generation for Efficient Privacy-Preserving Face Identification

Daile Osorio-Roig, Christian Rathgeb, Pawel Drozdowski, Christoph Busch
2021 IEEE Transactions on Biometrics Behavior and Identity Science  
However, these schemes appear to be unsuitable for indexing (workload reduction) in biometric identification systems.  ...  In this work, we propose a privacypreserving face identification system which utilises a Product Quantisation-based hash look-up table for indexing and retrieval of protected face templates.  ...  K-medoids K-medoids [55] is a centroid-based clustering technique similar to K-means, which assumes k clusters a priori.  ... 
doi:10.1109/tbiom.2021.3100639 fatcat:g6lszbksxneslggvujmnq2le54


2016 Procedia Computer Science  
and K-Medoids Algorithm for Big Data P.  ...  Video Steganography Based on Randomization and Parallelization Sudeepa K.B., Raju K., Ranjan Kumar H.S., G.  ... 
doi:10.1016/s1877-0509(16)00132-0 fatcat:n6xmyqd54zhq3abpytexijodqy

Biometric Feature-Type Transformation: Making templates compatible for secret protection

MengHui Lim, Andrew Beng Jin Teoh, Jaihie Kim
2015 IEEE Signal Processing Magazine  
However, biometric templates used for similarity evaluation cannot be stored unprotected in the system because the consequences of biometric compromise is highly devastating.  ...  For applications that demand greater security, biometrics can be used in complement with passwords and security tokens to offer a multifactor authentication.  ...  His research, for which he has received government and industry funding, focuses on biometric security, specifically in biometric template protection and biocrypto key computation.  ... 
doi:10.1109/msp.2015.2423693 fatcat:jbr3m7g5tjh6pby6brhyu64ffm

D2.3 - GDPR-compliant and Privacy-Preserving Analytics for Healthcare Providers

Suite5, SECURA BV, Tampere University
2020 Zenodo  
Knowledge- based/ Computational models Rule-based expert systems FSA, Markov, HMM Machine Learning Decision Trees, Random Forest, SVM, ANN, Bayesian Networks k-means, SOM, EM, LOF, k-NN  ...  Most common approaches rely on distance as a measure, such as the kmeans, the k-Medoids or the Expectation-Minimisation(EM) Clustering algorithm.  ... 
doi:10.5281/zenodo.4022329 fatcat:sdtc5fkkofc6vigeil25ulhm5u

Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning—A Review

Mostofa Ahsan, Kendall E. Nygard, Rahul Gomes, Md Minhaz Chowdhury, Nafiz Rifat, Jayden F Connolly
2022 Journal of Cybersecurity and Privacy  
The shortcomings of these state-of-the-art models and how attack patterns have evolved over the past decade have also been presented.  ...  Quantum cryptography [26] In this cryptography, for the two parties, sender and receiver, the transmission generates cryptographic keys to encrypt data, following the laws of quantum mechanics.  ...  For example, an NN is used to identify actual vs. forged biometrics (e.g., fingerprints) through classification based on their patterns [79] .  ... 
doi:10.3390/jcp2030027 fatcat:3m3rxixzjjcwbhzk2od72xatta

IEEE Access Special Section Editorial: AI-Driven Big Data Processing: Theory, Methodology, and Applications

Zhanyu Ma, Sunwoo Kim, Pascual Martinez-Gomez, Jalil Taghia, Yi-Zhe Song, Huiji Gao
2020 IEEE Access  
The clustering methods K-Means, K-Medoids, Density-Based Spatial Clustering of Applications with Noise, Agglomerative Hierarchical Cluster Tree and Clustering by Fast Search and Finding of Density Peaks  ...  In the article, ''Graph fusion for finger multimodal biometrics,'' by Zhang et al., a graph-based feature extraction method for finger biometric images is proposed.  ...  Based on the long short-term memory neural network (LSTM NN), they develop a data-driven trajectory model to generate human-like driving trajectories.  ... 
doi:10.1109/access.2020.3035461 fatcat:rt7ejtponrfexigie4cfpt7gd4

Machine Learning for Healthcare Wearable Devices: The Big Picture

Farida Sabry, Tamer Eltaras, Wadha Labda, Khawla Alzoubi, Qutaibah Malluhi, Yuxiang Wu
2022 Journal of Healthcare Engineering  
Potential solutions from the literature are presented, and areas open for improvement and further research are highlighted.  ...  In this study, a review of the different areas of the recent machine learning research for healthcare wearable devices is presented.  ...  Task Research work Techniques Sensors Dataset(s) [59] SVM and K-medoids clustering-based template learning ECG and PPG sensors 14 subjects recordings for a 30-minute training session and a 30-minute testing  ... 
doi:10.1155/2022/4653923 pmid:35480146 pmcid:PMC9038375 fatcat:ib3allbsanf5jhefovkfdqh2ri

D2.5-Profiling Analytics and Privacy Methodological Foundations, Release II

Suite5, Frankfurt University, UBITECH, NTUA
2020 Zenodo  
This deliverable will incorporate the initial input and the provided feedback/updates and will include the final incorporated methodology for Profiling, Analytics and Privacy.  ...  The general principles of generating and using public keys for cryptography are depicted in the next three figures. generation algorithm which generates a key pair.  ...  In particular, supervised learning algorithms based on Support Vector Machines (SVM), k-NN, Decision Trees and Random Forest were tested and evaluated using a multi-fold cross-validation metric, with Random  ... 
doi:10.5281/zenodo.3709433 fatcat:urciji7wffhnrgjmlk3aph25nu

ijair-volume-6-issue-1-vii-january-march-2019 -HINDUSTAN BOOK.pdf

V. Thamilarasi
This paper experiments various basic image segmentation techniques for Lung Chest X-Ray images  ...  Relocation Algorithms, Probabilistic Clustering, K-Medoids Methods, K-Means Methods are the algorithms used in the partitioning method.  ...  In other words, the keys to the dimension tables are not natural keys, but generated and meaningless ID numbers.  ... 
doi:10.6084/m9.figshare.20217722.v1 fatcat:l74ihuqhcvdtjomod3zdwzfniu

Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+77 others)
2018 International Journal of Network Security   unpublished
He also thanks David Jao for suggestions (i) to formalize the definition of UBSS (ii) to give a careful thought to its applications (iii) to state the isogeny problems in a general form and (iv) to improve  ...  Patankar for guidance, helpful discussions and a careful first reading of the manuscript.  ...  We also give the generalized statements of isogeny problems. This makes it convenient for constructions of isogeny-based cryptographic primitives.  ...