Enhancing Information Security and Privacy by Combining Biometrics with Cryptography [electronic resource] / by Sanjay Kanade, Dijana Petrovska-Delacretaz, Bernadette Dorizzi.
By: Kanade, Sanjay [author.].
Contributor(s): Petrovska-Delacretaz, Dijana [author.] | Dorizzi, Bernadette [author.] | SpringerLink (Online service).
Material type: BookSeries: Synthesis Lectures on Information Security, Privacy, and Trust: Publisher: Cham : Springer International Publishing : Imprint: Springer, 2012Edition: 1st ed. 2012.Description: XVIII, 122 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783031023354.Subject(s): Data protection | Data and Information SecurityAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access onlineIntroduction -- Cancelable Biometric System -- Cryptographic Key Regeneration Using Biometrics -- Biometrics-Based Secure Authentication Protocols -- Concluding Remarks.
This book deals with "crypto-biometrics", a relatively new and multi-disciplinary area of research (started in 1998). Combining biometrics and cryptography provides multiple advantages, such as, revocability, template diversity, better verification accuracy, and generation of cryptographically usable keys that are strongly linked to the user identity. In this text, a thorough review of the subject is provided and then some of the main categories are illustrated with recently proposed systems by the authors. Beginning with the basics, this text deals with various aspects of crypto-biometrics, including review, cancelable biometrics, cryptographic key generation from biometrics, and crypto-biometric key sharing protocols. Because of the thorough treatment of the topic, this text will be highly beneficial to researchers and industry professionals in information security and privacy. Table of Contents: Introduction / Cancelable Biometric System / Cryptographic Key Regeneration Using Biometrics / Biometrics-Based Secure Authentication Protocols / Concluding Remarks.
There are no comments for this item.