2012
DOI: 10.1016/j.proeng.2012.01.865
|View full text |Cite
|
Sign up to set email alerts
|

Biometric Cryptosystem Involving Two Traits And Palm Vein As Key

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 21 publications
(13 citation statements)
references
References 9 publications
0
13
0
Order By: Relevance
“…The fitness is mathematically given in equation (7). (7) ) ( FP FN TP TN TP TN Accuracy      (8) After fitness calculation, the obtained solution is given for the next step i.e. updation solution.…”
Section: Selecting Optimal Features Using Rider Optimization Algorithmentioning
confidence: 99%
See 1 more Smart Citation
“…The fitness is mathematically given in equation (7). (7) ) ( FP FN TP TN TP TN Accuracy      (8) After fitness calculation, the obtained solution is given for the next step i.e. updation solution.…”
Section: Selecting Optimal Features Using Rider Optimization Algorithmentioning
confidence: 99%
“…Two major uses of biometric frameworks are Authentication or Verification and Identification, depending on the selected biometric attribute. This enlisted biometric value could be an individual's physiological or social attribute that meets the needs of comprehensiveness, individuality, eternal quality and collectability [8]. The ear is an interesting human element.…”
mentioning
confidence: 99%
“…Also a better fusion scheme can be used which generate a more compact biometric template which stores most of the information in the individual template. Prasanalakshmi et al (2011) used three biometric traits such as face, fingerprint and palm vein to form a multimodal system and palm vein features are used as key for encryption. The features are extracted from all the three modalities.…”
Section: Multimodal Biometric Cryptosystemmentioning
confidence: 99%
“…Security gateway logs the details of the failed authentication in the auditing log, creating an audit trail for security administrators to investigate later. On a successful user and system authentication, the Biobex server displays its input page to gather multimodal biometric information as stored in the space specified token [5] and on final authentication, Security Gateway then determines all authorization policies that apply to the user when accessing the cloud application. The user's ID, group, and role within the enterprise are considered when evaluating the applicable policies.…”
Section: A Detailed Look At the Authentication Processmentioning
confidence: 99%