2015 International Conference on Pervasive Computing (ICPC) 2015
DOI: 10.1109/pervasive.2015.7087177
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid cryptosystem for maintaining image integrity using biometric fingerprint

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…Other approaches (Meenakshi and Padmavathi, 2010;Filho et al, 2012;Nasir and Kuppuswamy, 2013;Le et al, 2014) analyze the security of the proposed techniques without providing detailed information on the recognition accuracy. Three other works (Butt and Damer, 2014;Nguyen et al, 2015;Dahake and Nimbhorkar, 2015) do not provide information on the recognition accuracy and security of the proposed techniques. This makes it difficult to access the suitability of the proposed approaches for practical situations.…”
Section: Open Issues and Challengesmentioning
confidence: 98%
See 1 more Smart Citation
“…Other approaches (Meenakshi and Padmavathi, 2010;Filho et al, 2012;Nasir and Kuppuswamy, 2013;Le et al, 2014) analyze the security of the proposed techniques without providing detailed information on the recognition accuracy. Three other works (Butt and Damer, 2014;Nguyen et al, 2015;Dahake and Nimbhorkar, 2015) do not provide information on the recognition accuracy and security of the proposed techniques. This makes it difficult to access the suitability of the proposed approaches for practical situations.…”
Section: Open Issues and Challengesmentioning
confidence: 98%
“…The scheme also provides improved authentication speed (can handle up to 624 bytes per second) and security of stored templates. Similarly, a technique based on key generation and encryption was proposed to provide secure transmission of mosaic image (Dahake and Nimbhorkar, 2015). The image is encrypted (prior to transmission) by using a key generated from fingerprint data.…”
Section: Hybrid Biometric Cryptosystemsmentioning
confidence: 99%