Description |
1 online resource (xviii, 122 pages) : illustrations |
|
illustration |
Series |
Synthesis lectures on information security, privacy, and trust, 1945-9750 ; # 3 |
|
Synthesis lectures on information security, privacy and trust ; # 3. 1945-9750
|
Contents |
Preface -- Acknowledgments -- Glossary -- 1. Introduction -- 1.1 Introduction to biometrics -- 1.2 Introduction to cryptography -- 1.3 Introduction to combination of biometrics and cryptography -- 1.4 Motivation and goals -- 1.5 Performance evaluation strategies |
|
2. Cancelable biometric system -- 2.1 Introduction -- 2.2 Protection of biometric data, state of the art -- 2.3 A biometric data shuffling scheme to create cancelable biometric templates -- 2.4 Experimental results and security analysis of the proposed cancelable biometrics scheme -- 2.5 Conclusions and perspectives |
|
3. Cryptographic key regeneration using biometrics -- 3.1 Introduction -- 3.2 Obtaining cryptographic keys with biometrics, state of the art -- 3.3 Biometrics-based key regeneration scheme -- 3.4 Adaptations of the proposed generalized key regeneration scheme for iris biometrics -- 3.5 Adaptations of the proposed generalized key regeneration scheme for face biometrics -- 3.6 Extension of the proposed key regeneration scheme to obtain constant length keys with higher entropy -- 3.7 Conclusions and perspectives |
|
4. Biometrics-based secure authentication protocols -- 4.1 Introduction -- 4.2 Biometrics-based secure cryptographic protocols, state of the art -- 4.3 Biometrics-based cryptographic key regeneration and sharing -- 4.4 Biometrics-based session-key generation and sharing protocol -- 4.5 Conclusions and perspectives |
|
5. Concluding remarks -- 5.1 Summary -- 5.2 Future research directions |
|
A. Baseline biometric systems, databases, and experimental protocols -- B. BioSecure tool for performance evaluation -- Bibliography -- Author's biography |
Summary |
This book deals with "crypto-biometrics", a relatively new and multi-disciplinary area of research (started in 1998). Combining biometrics and cryptography provides multiple advantages, such as, revocability, template diversity, better verification accuracy, and generation of cryptographically usable keys that are strongly linked to the user identity. In this text, a thorough review of the subject is provided and then some of the main categories are illustrated with recently proposed systems by the authors. Beginning with the basics, this text deals with various aspects of crypto-biometrics, including review, cancelable biometrics, cryptographic key generation from biometrics, and crypto-biometric key sharing protocols. Because of the thorough treatment of the topic, this text will be highly beneficial to researchers and industry professionals in information security and privacy |
Analysis |
cancelable biometrics |
|
cancelability |
|
diversity |
|
key generation |
|
session key generation and sharing |
|
protocols |
Notes |
Part of: Synthesis digital library of engineering and computer science |
Bibliography |
Includes bibliographical references (pages 103-120) |
Notes |
Online resource; title from PDF title page (Morgan & Claypool, viewed Sept. 27, 2012) |
Subject |
Biometric identification.
|
|
Data encryption (Computer science)
|
|
Cryptography
|
|
Data protection.
|
|
COMPUTERS -- Optical Data Processing.
|
|
Biometric identification
|
|
Cryptography
|
|
Data encryption (Computer science)
|
|
Data protection
|
|
Biometrie
|
|
Datensicherung
|
|
Kryptologie
|
Form |
Electronic book
|
Author |
Petrovska-Delacrétaz, Dijana.
|
|
Dorizzi, Bernadette.
|
ISBN |
9781608458486 |
|
1608458482 |
|
1608458474 |
|
9781608458479 |
|
9783031023354 |
|
3031023358 |
|