Overview of biometry: fingerprints and iris
Автор: Egamnazarov K.
Журнал: Теория и практика современной науки @modern-j
Рубрика: Основной раздел
Статья в выпуске: 1 (31), 2018 года.
Бесплатный доступ
In this paper we give a survey of biometrical applications in security context. We start with a brief overview of the different biometric modalities which are most frequently used and compare their security contribution with classical cryptographic primitives. We then consider the case of fingerprints when used as password surrogates.
Biometry, iris, fingerprint, secret key
Короткий адрес: https://sciup.org/140272252
IDR: 140272252
Список литературы Overview of biometry: fingerprints and iris
- Juels, A., Sudan, M.: A fuzzy vault scheme. In: Lapidoth, A. Teletar, E. (eds.) Proceedings of International Symposium on Information Theory, 2002, p. 408
- Juels, A., Sudan, M.: A fuzzy vault scheme. Des. Codes Cryptogr. 38(2), 237-257 (2006)
- Yang, S., Verbaudwhede, I.: Automatic secure fingerprint verification system based on fuzzy vault scheme. In: Proceedings of International Conference on Acoustics, Speech and Signal Processing, 2005, pp. 609-612
Статья научная