A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
K-Medoids-Based Random Biometric Pattern for Cryptographic Key Generation
[chapter]
2009
Lecture Notes in Computer Science
In this paper we report an approach for cryptographic key generation based on keystroke dynamics and the k-medoids algorithm. ...
The cryptographic key released by the proposed approach may be used in several encryption algorithms. ...
A random biometric pattern generated using the biometric information with a determined random distribution is shown. ...
doi:10.1007/978-3-642-10268-4_10
fatcat:ltjoe4gh4rahjmek2y7ogeq23e
Design of Secured Key Generation Algorithm using Fingerprint Based Biometric Modality
2012
IOSR Journal of Engineering
This may be efficiently solved by the combination of biometrics with cryptography. This paper presents ways for generating the strong bio-crypt key based mostly on fingerprint. ...
Researchers are examining suggests that to utilize biometric options of the user to get sturdy and repeatable cryptographic keys rather than a memorable password. ...
[6] proposed an approach for cryptographic key generation that is on the idea of keystroke dynamics and therefore the k-medoids algorithm. ...
doi:10.9790/3021-0202325330
fatcat:ys4f7mbrebazrddzqsctjqzmtq
Stable Hash Generation for Efficient Privacy-Preserving Face Identification
2021
IEEE Transactions on Biometrics Behavior and Identity Science
However, these schemes appear to be unsuitable for indexing (workload reduction) in biometric identification systems. ...
In this work, we propose a privacypreserving face identification system which utilises a Product Quantisation-based hash look-up table for indexing and retrieval of protected face templates. ...
K-medoids K-medoids [55] is a centroid-based clustering technique similar to K-means, which assumes k clusters a priori. ...
doi:10.1109/tbiom.2021.3100639
fatcat:g6lszbksxneslggvujmnq2le54
Contents
2016
Procedia Computer Science
and K-Medoids Algorithm for Big Data P. ...
Video Steganography Based on Randomization and Parallelization Sudeepa K.B., Raju K., Ranjan Kumar H.S., G. ...
doi:10.1016/s1877-0509(16)00132-0
fatcat:n6xmyqd54zhq3abpytexijodqy
Biometric Feature-Type Transformation: Making templates compatible for secret protection
2015
IEEE Signal Processing Magazine
However, biometric templates used for similarity evaluation cannot be stored unprotected in the system because the consequences of biometric compromise is highly devastating. ...
For applications that demand greater security, biometrics can be used in complement with passwords and security tokens to offer a multifactor authentication. ...
His research, for which he has received government and industry funding, focuses on biometric security, specifically in biometric template protection and biocrypto key computation. ...
doi:10.1109/msp.2015.2423693
fatcat:jbr3m7g5tjh6pby6brhyu64ffm
D2.3 - GDPR-compliant and Privacy-Preserving Analytics for Healthcare Providers
2020
Zenodo
Knowledge-
based/
Computational
models
Rule-based
expert systems
FSA, Markov, HMM
Machine Learning Decision Trees,
Random Forest,
SVM, ANN,
Bayesian
Networks
k-means, SOM,
EM, LOF, k-NN ...
Most common approaches rely on distance as a measure, such as the kmeans, the k-Medoids or the Expectation-Minimisation(EM) Clustering algorithm. ...
doi:10.5281/zenodo.4022329
fatcat:sdtc5fkkofc6vigeil25ulhm5u
Cybersecurity Threats and Their Mitigation Approaches Using Machine Learning—A Review
2022
Journal of Cybersecurity and Privacy
The shortcomings of these state-of-the-art models and how attack patterns have evolved over the past decade have also been presented. ...
Quantum cryptography [26] In this cryptography, for the two parties, sender and receiver, the transmission generates cryptographic keys to encrypt data, following the laws of quantum mechanics. ...
For example, an NN is used to identify actual vs. forged biometrics (e.g., fingerprints) through classification based on their patterns [79] . ...
doi:10.3390/jcp2030027
fatcat:3m3rxixzjjcwbhzk2od72xatta
IEEE Access Special Section Editorial: AI-Driven Big Data Processing: Theory, Methodology, and Applications
2020
IEEE Access
The clustering methods K-Means, K-Medoids, Density-Based Spatial Clustering of Applications with Noise, Agglomerative Hierarchical Cluster Tree and Clustering by Fast Search and Finding of Density Peaks ...
In the article, ''Graph fusion for finger multimodal biometrics,'' by Zhang et al., a graph-based feature extraction method for finger biometric images is proposed. ...
Based on the long short-term memory neural network (LSTM NN), they develop a data-driven trajectory model to generate human-like driving trajectories. ...
doi:10.1109/access.2020.3035461
fatcat:rt7ejtponrfexigie4cfpt7gd4
Machine Learning for Healthcare Wearable Devices: The Big Picture
2022
Journal of Healthcare Engineering
Potential solutions from the literature are presented, and areas open for improvement and further research are highlighted. ...
In this study, a review of the different areas of the recent machine learning research for healthcare wearable devices is presented. ...
Task Research work Techniques Sensors Dataset(s) [59] SVM and K-medoids clustering-based template learning ECG and PPG sensors 14 subjects recordings for a 30-minute training session and a 30-minute testing ...
doi:10.1155/2022/4653923
pmid:35480146
pmcid:PMC9038375
fatcat:ib3allbsanf5jhefovkfdqh2ri
D2.5-Profiling Analytics and Privacy Methodological Foundations, Release II
2020
Zenodo
This deliverable will incorporate the initial input and the provided feedback/updates and will include the final incorporated methodology for Profiling, Analytics and Privacy. ...
The general principles of generating and using public keys for cryptography are depicted in the next three figures. generation algorithm which generates a key pair. ...
In particular, supervised learning algorithms based on Support Vector Machines (SVM), k-NN, Decision Trees and Random Forest were tested and evaluated using a multi-fold cross-validation metric, with Random ...
doi:10.5281/zenodo.3709433
fatcat:urciji7wffhnrgjmlk3aph25nu
ijair-volume-6-issue-1-vii-january-march-2019 -HINDUSTAN BOOK.pdf
2022
figshare.com
This paper experiments various basic image segmentation techniques for Lung Chest X-Ray images ...
Relocation Algorithms, Probabilistic Clustering, K-Medoids Methods, K-Means Methods are the algorithms used in the partitioning method. ...
In other words, the keys to the dimension tables are not natural keys, but generated and meaningless ID numbers. ...
doi:10.6084/m9.figshare.20217722.v1
fatcat:l74ihuqhcvdtjomod3zdwzfniu
Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet
2018
International Journal of Network Security
unpublished
He also thanks David Jao for suggestions (i) to formalize the definition of UBSS (ii) to give a careful thought to its applications (iii) to state the isogeny problems in a general form and (iv) to improve ...
Patankar for guidance, helpful discussions and a careful first reading of the manuscript. ...
We also give the generalized statements of isogeny problems. This makes it convenient for constructions of isogeny-based cryptographic primitives. ...
fatcat:l5qol3fgizghrkdel7sgt3qz6q