2019
DOI: 10.1007/978-3-030-34080-3_79
|View full text |Cite
|
Sign up to set email alerts
|

Fingerprint Based Cryptographic Key Generation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(8 citation statements)
references
References 15 publications
0
8
0
Order By: Relevance
“…Approaches for generating cryptographic key from biometrics have considered various biometric traits, such as fingerprint [12][13][14][15][16][17] finger vein [18], iris [19], face [20,21], voice [22], handwritten signature [23], gait [24][25][26][27], ECG [28,29], retina [30] and multi-modal [31][32][33].…”
Section: Fig 1 Generation Of Cryptographic Keys From Biometricsmentioning
confidence: 99%
See 4 more Smart Citations
“…Approaches for generating cryptographic key from biometrics have considered various biometric traits, such as fingerprint [12][13][14][15][16][17] finger vein [18], iris [19], face [20,21], voice [22], handwritten signature [23], gait [24][25][26][27], ECG [28,29], retina [30] and multi-modal [31][32][33].…”
Section: Fig 1 Generation Of Cryptographic Keys From Biometricsmentioning
confidence: 99%
“…Here, several existing approaches of stable binary string generations are briefly discussed. The generated stable binary string can be used directly as a cryptographic key for symmetric encipherment [12][13][14][15] or it can be used as a seed value to generate the private-public key pairs for asymmetric encipherment [34,35].…”
Section: Fig 1 Generation Of Cryptographic Keys From Biometricsmentioning
confidence: 99%
See 3 more Smart Citations