Security of fingerprints in biometric authentication systems using cryptography and watermarking technique

Consideration of four major requirements when a biometric template protection algorithm is designed. The definition of a secure authentication model, based on fingerprint template protection by using the approaches of cryptography and watermarking.

Подобные документы

  • A General idea on the basis of information contained in cryptographic systems. Feature encryption standard "Rijndael". The principles of encoding data with a public key algorithm RSA. Safety standards models of information flow in computer programs.

    книга, добавлен 08.03.2014

  • A mixing core for block cipher cryptography. Measured Boolean function nonlinearity in variable size block ciphers. Orthogonal latin squares, nonlinear balanced block mixers, and mixing ciphers. Binomial and Poisson statistics functions in JavaScript.

    книга, добавлен 08.03.2014

  • Consideration of various information security standards in the Russian commercial organizations. Methods of data protection. Potential application of international standards in information security activities of the Russian commercial organization.

    статья, добавлен 13.02.2016

  • The concept of image segmentation as one of the topics of computer vision. The features of the process of dividing the image into segments that contain pixels of similar color. The implementation of the algorithm based on Kruskal's algorithm in C++.

    статья, добавлен 23.02.2016

  • Statistics increase in the total amount of information. Creating a storage cloud. Key features of its use. Consideration of the main advantages and disadvantages. Characteristic encryption and data protection. Recommendations file protection in the cloud.

    практическая работа, добавлен 29.11.2014

  • Fair Blind Signatures without Random Oracles. Fair Partially Blind Signatures. Parallel Shortest Lattice Vector Enumeration on Graphics Cards. Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes. Side-Channel, Fault Attacks.

    книга, добавлен 08.03.2014

  • Consideration of the safety of autonomous systems and robots. Analysis of threats related to the use of artificial intelligence in autonomous vehicles, robots and other autonomous systems. Information flows in autonomous systems and communications.

    статья, добавлен 20.03.2024

  • The methods of image segmentation, a process of division of an image into different segments which contain pixels of similar color, are considered. Graph-based segmentation algorithm, which is based on Kruskal’s algorithm is implemented in C++ language.

    статья, добавлен 23.02.2016

  • An overview of the most popular approaches to the modeling of automated systems for intelligent monitoring and management of environmental safety in the water sector. Principles of construction of adaptive systems of this class and requirements to them.

    статья, добавлен 30.04.2018

  • Practical acquaintance with the capabilities, configuration of firewalls. Information security in computer systems. Identify and control applications. The addition of security devices. Regular inspections of all users, regardless of location or device.

    лабораторная работа, добавлен 17.03.2016

  • Describe the architecture for building a cloud-based SaaS application platform, the main characteristics of the services. Creating a software template for the device of communication inherited of air transport, the use of algebras of real-time processes.

    статья, добавлен 25.10.2016

  • Analysis of the widespread approach to modeling and verification of systems, known as Model Checking, which allows to identify errors at different stages of development and maintenance of territorial development programs in order to eliminate them.

    статья, добавлен 30.04.2018

  • Standards and the Standardization Process: International, National and Industrial organizations. Cryptographic evaluation bodies. Security Mechanisms and Services. Encryption and Modes of Operation for Block Ciphers. Cryptographic Hash Functions.

    книга, добавлен 08.03.2014

  • Research Background, Objectives and Significance. Research on Concept and Connotation of Smart City. Characteristics of Smart City. Importance of Personal Data Classification. A Classified Personal Data Protection Architecture. Services in Smart City.

    дипломная работа, добавлен 23.09.2018

  • The accuracy and noise immunity of the interpolation method of nonlinear dynamical systems identification based on the Volterra model in the frequency domain. The algorithmic and software toolkit in Matlab is developed for the identification procedure.

    статья, добавлен 23.06.2016

  • Biometrics at a distance: issues, challenges, and prospects. Advanced technologies for touchless fingerprint recognition. Long-range facial image acquisition and quality. Detection of singularities in fingerprint images using linear phase portraits.

    книга, добавлен 08.03.2014

  • The methodological, technical approaches are considered to construct the agent-based model with built-in artificial neural networks. This model describes the user's behavior of electronic, distance learning in a virtual environment of one of universities.

    статья, добавлен 23.06.2016

  • The methods for adaptive, knowledge-based learning, such as online incremental feature selection, spiking neural networks, adaptive data and model integration, and artificial life systems, particle swarm optimisation, ensembles of evolving systems.

    книга, добавлен 09.04.2013

  • Characteristics of the model research cyber-physical systems in industrial production. Description of the hardware installation process and software environment. Consideration of modern approaches to modeling distributed software and semantic data.

    статья, добавлен 23.02.2016

  • Error propagation and feedforward invertibility. Generation of finite automata with invertibility. Weak inverses with bounded error propagation of a finite automaton. Canonical form for finite automaton one key cryptosystems. Generalized algorithms.

    книга, добавлен 08.03.2014

  • Course determination algorithm that proposed based on the correlation of pairs of images. The errors of course determination that are investigated for different threshold values of normalized correlation coefficient. Components of course errors.

    статья, добавлен 26.10.2016

  • Comparison of several common approaches to the analysis of system logs and streaming data generated en masse by the company's IT infrastructure. Characteristics of model-based anomaly search algorithms and hierarchical temporary memory algorithms.

    статья, добавлен 28.05.2021

  • A computational complexity based theory of modern encryption. Generating pseudo-random bit or number sequences. Generic encryption with pseudorandom functions. Problems with deterministic encryption in general. Required properties for digital cash.

    книга, добавлен 08.03.2014

  • Автоматизация вспомогательных процессов, возникающих при разработке мобильных приложений для операционной системы IOS. Описание и основные положения template-based подхода к мобильной разработке. Программа автоматизации процессов создания и настройки.

    дипломная работа, добавлен 27.08.2016

  • Theory and practice for integrating strong security features into modern communications and computer applications. Efficient hardware implementations and speed software for embedded systems, smart cards, microprocessors, hardware and software security.

    курс лекций, добавлен 08.03.2014

Работы в архивах красиво оформлены согласно требованиям ВУЗов и содержат рисунки, диаграммы, формулы и т.д.
PPT, PPTX и PDF-файлы представлены только в архивах.
Рекомендуем скачать работу и оценить ее, кликнув по соответствующей звездочке.