Performance analysis of template data security and protection in Biometric Systems

Author(s):  
Arvind Selwal ◽  
Sunil Kumar Gupta ◽  
Surender ◽  
Anubhuti
2012 ◽  
Vol 1 (2) ◽  
pp. 31-34
Author(s):  
Shameena Begum ◽  
◽  
V.Ratna Vasuki ◽  
K.V.V.Srinivas K.V.V.Srinivas

2003 ◽  
Vol 70 (2-3) ◽  
pp. 117-130 ◽  
Author(s):  
M van der Haak ◽  
A.C Wolff ◽  
R Brandner ◽  
P Drings ◽  
M Wannenmacher ◽  
...  

2021 ◽  
Author(s):  
Poonam Poonia ◽  
Pawan K. Ajmera

Abstract Biometric systems proven to be one of the most reliable and robust method for human identification. Integration of biometrics among the standard of living provokes the necessity to vogue secure authentication systems. The use of palm-prints for user access and authentication has increased in the last decade. To give the essential security and protection benefits, conventional neural networks (CNNs) has been bestowed during this work. The combined CNN and feature transform structure is employed for mapping palm-prints to random base-n codes. Further, secure hash algorithm (SHA-3) is used to generate secure palm-print templates. The proficiency of the proposed approach has been tested on PolyU, CASIA and IIT-Delhi palm-print datasets. The best recognition performance in terms of Equal Error Rate (EER) of 0.62% and Genuine Acceptance Rate (GAR) of 99.05% was achieved on PolyU database.


2016 ◽  
Vol 8 (2) ◽  
pp. 50-59
Author(s):  
Milorad Milinković ◽  
Miroslav Minović ◽  
Miloš Milovanović

Nowadays, the development and the application of biometric systems on one hand, and the large number of hardware and software manufacturers on the other, caused two the most common problems of biometric systems: a problem of interoperability between system's components as well as between different biometric systems and a problem of biometric data security and privacy protection, both in storage and exchange. Specifications and standards, such as BioAPI and CBEFF, registered and published as multiple standards by ISO (International Organization for Standardization), propose the establishment of single platform (BioAPI) to facilitate the functioning of the biometric systems regardless of hardware or software manufacturers, and unique format for data exchange (CBEFF) to secure biometric data. In this paper, these standards are analyzed in detail and considered as possible solutions to aforementioned problems.


2022 ◽  
pp. 1-18
Author(s):  
Daniel Ruzza ◽  
Gabriele Bernasconi ◽  
Pietro De Giovanni

This chapter analyses the blockchain implemented by Genuino in the collectibles industry. Since collectibles are subject to high risk of counterfeiting and fake replications, blockchain technology can help substantially to ensure transparency, originality, ownership, and data security and protection. Two methods to use blockchain in the industry seem to be the most widespread today: creating digital native collectibles on blockchain and transposing physical objects into the blockchain by creating digital twins. By using blockchain, new consumer clusters emerge, highlighting the need to modernize both the traditional economies and the current business models.


2014 ◽  
Vol 556-562 ◽  
pp. 5316-5320
Author(s):  
Yi Peng Zhang ◽  
Zheng Tao Jiang ◽  
Chen Yang

Routers are the key equipments connecting Wan, LAN and Internet network, and are the main part of the Internet. The reliability and security of routers is very important to the network performance and information data security. The analysis and research on the technologies of router security and protection is the core issue for network security. This paper mainly aims at providing a series of test and analysis on the vulnerabilities of Tenda wireless routers. Technically, it’s very difficult to crack the WPA /WPA2 wireless encryption. In this paper, we use the related vulnerabilities of wireless routers, and open Wifi Protection Setup (WPS) and Quick Security Settings (QSS) to get router PIN code, which can help us bypass the WPA/WPA2 encryption and, realizesd the router attack.


Author(s):  
Zolidah Kasiran ◽  
Hikma Farah Ali ◽  
Noorhayati Mohamed Noor

The advancement of the data communication technologies has increased the traffic of data exchange over the internet and at the same time created the opportunity of data attack by various party.  This paper present  Time Performance Analysis Of Advanced Encryption Standard And Data Encryption Standard  in Data Security Transaction<strong>. </strong>In this study we proposed an AES algorithm with  different key size, and different file format. Our aim is to safely to transfer the file for using the AES algorithm. Proposed algorithm has done by analyzing the different time taken for both AES and DES, experiments were done by three different file  format which were text, image, and voice. Each file format type was tested with five different file sizes. The result of each experiments were analysed and it was confirmed that  the AES algorithm have better performance in term of time taken as compared to DES.


Sign in / Sign up

Export Citation Format

Share Document