2012
DOI: 10.1007/978-3-031-02335-4
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Information Security and Privacy by Combining Biometrics with Cryptography

Abstract: Securing information during its storage and transmission is an important and widely addressed issue. Generally, cryptographic techniques are used for information security. In cryptography, the general idea is to transform the information during a phase called encryption, before being stored or transmitted, based on a secret key. This secret key is required in order to retrieve the information from the transformed data during decryption. These secret keys are generally too long for a user to remember, and there… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 156 publications
0
6
0
Order By: Relevance
“…In addition, in the case the key is compromised, the user will not be able to create a new one. Thus, to ensure that the regeneration scheme is revocable, we used the shuffling scheme proposed by [24].…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…In addition, in the case the key is compromised, the user will not be able to create a new one. Thus, to ensure that the regeneration scheme is revocable, we used the shuffling scheme proposed by [24].…”
Section: Discussionmentioning
confidence: 99%
“…To protect template data, we adopt the shuffling scheme introduced by Kanade et al in Ref. [24]. This scheme employs a binary shuffling key, which due to its length, is either securely stored on a dedicated token or derived through a password-based mechanism.…”
Section: Biometric Template Protection Scheme: Shufflingmentioning
confidence: 99%
See 1 more Smart Citation
“…Though they are good to some extent, traditional security tools are not strong enough to cope with the creative strategies of cyber hooligans. Hence, integrating AI technology has been considered an essential solution to the advanced threats emerging in the dynamic context, helping to identify the targets more precisely within a timely manner and even react to the threats in a quicker and real-time approach [2]. The positive sides of AI in the cybersecurity sector are undeniable; however, AI carries a plethora of challenges and ethical concerns, which calls for an unstinted examination.…”
Section: Introductionmentioning
confidence: 99%
“…AI cybersecurity will be more effective in countering cyber crimes as long as the network of cybersecurity mechanisms is -from organizations to jurisdictions-duly deliberated and critically analyzed concerning their potentials and risks surrounding the approach. AI systems, especially algorithmic machine learning-based ones, can issue-based data screening, detecting patterns and anomalies that may reflect malicious actions of cyber-threats in a wide range [2,3]. AI-based cybersecurity solutions equipped with humans' cyber abilities have proven to be effective in fighting against malware and phishing and detecting unauthorized intrusion attempts more than that contributed to the height of digital infrastructure.…”
Section: Introductionmentioning
confidence: 99%