Format:
1 Online-Ressource (xviii, 122 Seiten)
,
Illustrationen
Edition:
Electronic reproduction; Available via World Wide Web
ISBN:
9781608458486
Series Statement:
Synthesis lectures on information security, privacy and trust #3
Content:
This book deals with "crypto-biometrics", a relatively new and multi-disciplinary area of research (started in 1998). Combining biometrics and cryptography provides multiple advantages, such as, revocability, template diversity, better verification accuracy, and generation of cryptographically usable keys that are strongly linked to the user identity. In this text, a thorough review of the subject is provided and then some of the main categories are illustrated with recently proposed systems by the authors. Beginning with the basics, this text deals with various aspects of crypto-biometrics, including review, cancelable biometrics, cryptographic key generation from biometrics, and crypto-biometric key sharing protocols. Because of the thorough treatment of the topic, this text will be highly beneficial to researchers and industry professionals in information security and privacy
Content:
2. Cancelable biometric system -- 2.1 Introduction -- 2.2 Protection of biometric data, state of the art -- 2.3 A biometric data shuffling scheme to create cancelable biometric templates -- 2.4 Experimental results and security analysis of the proposed cancelable biometrics scheme -- 2.5 Conclusions and perspectives --
Content:
3. Cryptographic key regeneration using biometrics -- 3.1 Introduction -- 3.2 Obtaining cryptographic keys with biometrics, state of the art -- 3.3 Biometrics-based key regeneration scheme -- 3.4 Adaptations of the proposed generalized key regeneration scheme for iris biometrics -- 3.5 Adaptations of the proposed generalized key regeneration scheme for face biometrics -- 3.6 Extension of the proposed key regeneration scheme to obtain constant length keys with higher entropy -- 3.7 Conclusions and perspectives --
Content:
4. Biometrics-based secure authentication protocols -- 4.1 Introduction -- 4.2 Biometrics-based secure cryptographic protocols, state of the art -- 4.3 Biometrics-based cryptographic key regeneration and sharing -- 4.4 Biometrics-based session-key generation and sharing protocol -- 4.5 Conclusions and perspectives --
Content:
5. Concluding remarks -- 5.1 Summary -- 5.2 Future research directions --
Content:
A. Baseline biometric systems, databases, and experimental protocols -- B. BioSecure tool for performance evaluation -- Bibliography -- Author's biography
Content:
Preface -- Acknowledgments -- Glossary -- 1. Introduction -- 1.1 Introduction to biometrics -- 1.2 Introduction to cryptography -- 1.3 Introduction to combination of biometrics and cryptography -- 1.4 Motivation and goals -- 1.5 Performance evaluation strategies --
Note:
Includes bibliographical references
,
2. Cancelable biometric system -- 2.1 Introduction -- 2.2 Protection of biometric data, state of the art -- 2.3 A biometric data shuffling scheme to create cancelable biometric templates -- 2.4 Experimental results and security analysis of the proposed cancelable biometrics scheme -- 2.5 Conclusions and perspectives
,
3. Cryptographic key regeneration using biometrics -- 3.1 Introduction -- 3.2 Obtaining cryptographic keys with biometrics, state of the art -- 3.3 Biometrics-based key regeneration scheme -- 3.4 Adaptations of the proposed generalized key regeneration scheme for iris biometrics -- 3.5 Adaptations of the proposed generalized key regeneration scheme for face biometrics -- 3.6 Extension of the proposed key regeneration scheme to obtain constant length keys with higher entropy -- 3.7 Conclusions and perspectives
,
4. Biometrics-based secure authentication protocols -- 4.1 Introduction -- 4.2 Biometrics-based secure cryptographic protocols, state of the art -- 4.3 Biometrics-based cryptographic key regeneration and sharing -- 4.4 Biometrics-based session-key generation and sharing protocol -- 4.5 Conclusions and perspectives
,
5. Concluding remarks -- 5.1 Summary -- 5.2 Future research directions
,
A. Baseline biometric systems, databases, and experimental protocols -- B. BioSecure tool for performance evaluation -- Bibliography -- Author's biography.
,
Preface -- Acknowledgments -- Glossary -- 1. Introduction -- 1.1 Introduction to biometrics -- 1.2 Introduction to cryptography -- 1.3 Introduction to combination of biometrics and cryptography -- 1.4 Motivation and goals -- 1.5 Performance evaluation strategies
,
Electronic reproduction; Available via World Wide Web
,
Mode of access: World Wide Web.
,
System requirements: Adobe Acrobat Reader.
Additional Edition:
ISBN 9781608458479
Additional Edition:
Erscheint auch als Druck-Ausgabe Enhancing Information Security and Privacy by Combining Biometrics with Cryptography
Language:
English
DOI:
10.2200/S00417ED1V01Y201205SPT003
Bookmarklink