Filters








44 Hits in 6.4 sec

A Post-Quantum Fuzzy Commitment Scheme for Biometric Template Protection: An Experimental Study

Alawi A. Al-Saggaf
2021 IEEE Access  
CONCLUSIONS In this paper, the author proposed a new post-quantum fuzzy commitment scheme (PQFC) for biometric template protection.  ...  SECURITY PROPERTIES This section investigates the security properties of the ISO/IEC 24745 standard for biometric template protection.  ... 
doi:10.1109/access.2021.3100981 fatcat:vpc34nzaefcmbi5kectkdbmozm

Privacy-Preserving Biometric Authentication and Matching via Lattice-Based Encryption [chapter]

Constantinos Patsakis, Jeroen van Rest, Michał Choraś, Mélanie Bouroche
2016 Lecture Notes in Computer Science  
In this work we propose a very efficient protocol for privacy-preserving biometric authentication using lattice-based encryption.  ...  While the use of biometric data enables many useful applications, these data are very sensitive. For this reason, it is essential to handle them with the least user exposure.  ...  a good candidate for the post-quantum era of cryptography [6] .  ... 
doi:10.1007/978-3-319-29883-2_11 fatcat:sv7qnwu56zgq5mzhtj4oldmjbi

Preserving Privacy in Speaker and Speech Characterisation

Andreas Nautsch, Abelino Jiménez, Amos Treiber, Jascha Kolberg, Catherine Jasserand, Els Kindt, Héctor Delgado, Massimiliano Todisco, Mohamed Amine Hmani, Aymen Mtibaa, Mohammed Ahmed Abdelraheem, Alberto Abad (+11 others)
2019 Computer Speech and Language  
Whereas many privacy-preserving technologies have been developed for other biometric characteristics, very few solutions have been proposed to protect privacy in the case of speech signals.  ...  Such protection, in the form of privacy-preserving technologies, is required to ensure that: (i) the biometric profiles of a given individual (e.g., across different biometric service operators) are unlinkable  ...  reference UID/CEC/50021/2013; the SpeechXRays project that has received funding from the European Union's Horizon 2020 research and innovation program under grant agreement no 653586; the Privacy Preserving Secure  ... 
doi:10.1016/j.csl.2019.06.001 fatcat:lgq6bz2y5zepvfbrfznhboplha

Biometric template security

Abhishek Nagar
2009 SPIE Newsroom  
Biometric Template Security By Abhishek Nagar With the proliferation of biometric recognition systems, an attacker's benefit in staging a system compromise is also increasing and thus is the need to ensure  ...  system security and integrity.  ...  [142] proposed two template transformation schemes for iris images.  ... 
doi:10.1117/2.1200911.001590 fatcat:3uykbccxwnfcpcodymfook557y

Biometric Template Security

Anil K Jain, Karthik Nandakumar, Abhishek Nagar
2008 EURASIP Journal on Advances in Signal Processing  
Biometric Template Security By Abhishek Nagar With the proliferation of biometric recognition systems, an attacker's benefit in staging a system compromise is also increasing and thus is the need to ensure  ...  system security and integrity.  ...  [142] proposed two template transformation schemes for iris images.  ... 
doi:10.1155/2008/579416 fatcat:rrogtu2eh5d3dpyftnwm5dd2m4

Biometric Cryptosystem to Secure Smart Object Communications in the Internet of Things

Abdallah Meraoumia, Mohammed Amroune, LAboratory of Mathematics, Informatics and Systems (LAMIS) University of Larbi Tebessi, Tebessa, ALGERIA, Lakhdar Laimech, Hakim Bendjenna, LAboratory of Mathematics, Informatics and Systems (LAMIS) University of Larbi Tebessi, Tebessa, ALGERIA, LAboratory of Mathematics, Informatics and Systems (LAMIS) University of Larbi Tebessi, Tebessa, ALGERIA
2021 Maǧallaẗ Al-Kuwayt li-l-ʿulūm  
As a result, in this paper, we proposed a secure IoT framework based on cloud computing.  ...  In this study, we focused on the security aspect of connecting people to their objects using biometric cryptosystems.  ...  Digital image security: Fusion of encryption, steganography and watermarking, In: International Journal of Advanced Computer Science and Applications (IJACSA), vol. 8, no. 5.  ... 
doi:10.48129/kjs.11169 fatcat:p36kh6bbtba2paux4sphhkhp3u

Humanode Whitepaper: You are [not] a bot [article]

Dato Kavazi, Victor Smirnov, Sasha Shilina, MOZGIII, MingDong Li, Rafael Contreras, Hardik Gajera, Dmitry Lavrenov, the Humanode Core
2021 arXiv   pre-print
cryptographically secure neural networks for the private classification of 3D templates of users' faces 2) a private Liveness detection mechanism for identification of real human beings 3) a Substrate  ...  Humanode is a network safeguarded by cryptographically secure bio-authorized nodes. Users will be able to deploy nodes by staking their encrypted biometric data.  ...  If an efficient quantum computer is ever built, a post-quantum encryption scheme can resist attacks.  ... 
arXiv:2111.13189v1 fatcat:6pc4nj46sjdkvketwydvwh2ulu

Article 13 Entry and Clearance Regulations [chapter]

Ruwantissa Abeyratne
2013 Convention on International Civil Aviation  
Fingerprint image(s) and/or iris image(s) are optional biometrics for member States wishing to supplement the facial image with another biometric in the passport.  ...  The provision also calls for States Parties to ensure the integrity and security of travel or identity documents issued by or on behalf of the States Parties and to prevent their unlawful creation, issuance  ... 
doi:10.1007/978-3-319-00068-8_14 fatcat:nnmsax4kjngohpubrtvn3gxofu

Cyber terrorism and aviation—national and international responses

Ruwantissa Abeyratne
2011 Journal of Transportation Security  
At the 21st Aviation Security Panel Meeting of ICAO (AVSECP/21, 22 to 26 March 2010)  ...  For an informative discussion on Cyber terrorism post 9/11 see Wanda I.  ...  The use of biometric information for the identification of persons is another method that counters cyber terrorism and interference of computer imagery.  ... 
doi:10.1007/s12198-011-0074-3 fatcat:kwbrkaig7bep3enn7wqrn5slge

Security and privacy for 6G: A survey on prospective technologies and challenges [article]

Van-Linh Nguyen, Po-Ching Lin, Bo-Chao Cheng, Ren-Hung Hwang, Ying-Dar Lin
2021 arXiv   pre-print
Second, physical layer protection, deep network slicing, quantum-safe communications, artificial intelligence (AI) security, platform-agnostic security, real-time adaptive security, and novel data protection  ...  However, for now, security and privacy issues for 6G remain largely in concept.  ...  using post-quantum algorithms.  ... 
arXiv:2108.11861v1 fatcat:o7fgtm4tobfk5knltojut6xpyi

Hands-Free Authentication for Virtual Assistants with Trusted IoT Device and Machine Learning

Victor Takashi Hayashi, Wilson Vicente Ruggiero
2022 Sensors  
The protocol was validated with automatic formal security analysis.  ...  smart home behavior for continuous authentication.  ...  Acknowledgments: The authors thank the support provided by the Laboratory of Computer Architecture and Networks (LARC) at the Computing and Digital Systems Engineering Department (PCS), Polytechnic School  ... 
doi:10.3390/s22041325 pmid:35214227 pmcid:PMC8874467 fatcat:6xzkeybjmfat3lcdednt3lkj3q

Security in Approximate Computing and Approximate Computing for Security: Challenges and Opportunities

Weiqiang Liu, Chongyan Gu, Maire O'Neill, Gang Qu, Paolo Montuschi, Fabrizio Lombardi
2020 Proceedings of the IEEE  
Approximate Computing for Cryptography 1) Post Quantum Cryptography (PQC): Discrete Gaussian sampling is a critical constituent of many LBC based schemes [70] .  ...  Cryptography 1) Post-Quantum Cryptography (PQC): In the near future, quantum computers will break today's most popular public-key cryptographic systems, including RSA, elliptic-curve cryptography, DSA  ... 
doi:10.1109/jproc.2020.3030121 fatcat:vgxrxqkoibhgflrwq6rrfz7ofm

Aerodrome Security [chapter]

Ruwantissa Abeyratne
2014 Law and Regulation of Aerodromes  
Therefore, security at the airport carries multiple dimensions, from border control to body scanning; from cargo security to security of the aircraft and its passengers.  ...  online check-in where airlines can check in passengers through their mobile services, ease congestion at the terminal check in counters; mobile devices and hand held terminals with Wi-Fi connections; biometric  ...  Data protection legislation, including data privacy laws have been enacted by many countries throughout the world for two main reasons: protection of privacy; and ensuring of access by the owner to his  ... 
doi:10.1007/978-3-319-04780-5_6 fatcat:jnnw7qiz3fclxegzhvucbgpskq

Defining Security Requirements with the Common Criteria: Applications, Adoptions, and Challenges [article]

Nan Sun, Chang-Tsun Li, Hin Chan, Ba Dung Le, MD Zahidul Islam, Leo Yu Zhang, MD Rafiqul Islam, Warren Armstrong
2022 arXiv   pre-print
Best practices on developing Protection Profiles, recommendations, and future directions for trusted cybersecurity advancement are presented.  ...  Common Criteria for Information Technology Security Evaluation (often referred to as Common Criteria or CC) is an international standard (ISO/IEC 15408) for cyber security certification.  ...  ACKNOWLEDGMENT We acknowledge Mr Bosheng Yan's contribution to data collection in relation to Protection Profile development through his internship associated with the Development of Australian Cyber Criteria  ... 
arXiv:2201.07417v4 fatcat:2isn6dnvavcxxe4epaodhrqzsa

Defining Security Requirements With the Common Criteria: Applications, Adoptions, and Challenges

Nan Sun, Chang-Tsun Li, Hin Chan, Ba Dung Le, Md Zahidul Islam, Leo Yu Zhang, Md Rafiqul Islam, Warren Armstrong
2022 IEEE Access  
INDEX TERMS Common criteria, cyber security, protection profile, security standard and certification, trusted system.  ...  The Common Criteria for Information Technology Security Evaluation (often referred to as Common Criteria or CC) is an international standard (ISO/IEC 15408) for cyber security.  ...  ACKNOWLEDGMENT The authors would like to acknowledge Bosheng Yan's contribution to data collection in relation to Protection Profile development through his internship associated with the Development of  ... 
doi:10.1109/access.2022.3168716 fatcat:jqzrlkphkzh7zizdy247kbiv34
« Previous Showing results 1 — 15 out of 44 results