TITLE

THE INFLUENCE OF ENTROPY TO PRIVACY PROTECTION USING TWO TEMPLATES APPROACH

AUTHOR(S)
KUNJADIC, Goran; VEINOVIC, Mladen; MILOSAVLJEVIC, Milan M.
PUB. DATE
May 2013
SOURCE
Metalurgia International;May2013, Vol. 18 Issue 5, p195
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Privacy policy based on biometric data, in conjunction with cryptography is very important as it provides unique protection of biometric data. The usual solutions use only one biometric template, analyzing its entropy and defining the method for error correction, because biometric data are nosy by its nature. The main disadvantage of these methods is a limited quantity of information that template contains. We propose an original approach using two independently created templates, which significantly increase the total amount of information (the entropy of two templates) and thereby reduce the errors. Using our approach, the more reliable and more secure system for privacy protection and using biometrics in cryptographic operations can be achieved.
ACCESSION #
86444116

 

Related Articles

  • Biometric Encryption using Enhanced Finger Print Image and Elliptic Curve. Sagayee, G. Mary Amirtha; Arumugam, S.; Mala, G. S. Anandha // International Journal of Computer Science & Network Security;Jul2013, Vol. 13 Issue 7, p106 

    The greatest strength of biometrics is that it does not change over time. But at the same time while using it directly for enhancing the security in network system, if that data has been compromised, its compromised forever[1]. Therefore, cancellable biometrics will increase the privacy which...

  • Double layer secure sketch. Li, Cai // AIP Conference Proceedings;Sep2012, Vol. 1479 Issue 1, p1500 

    Secure sketch has been applied successfully in a wide variety of applications like cryptography, biometric authentication systems and so on. All of these secure sketches have properties in common namely error-tolerance and small entropy loss. The former ensures an input set w′ can unlock...

  • Entropy uncertainty relations and stability of phase-temporal quantum cryptography with finite-length transmitted strings. Molotkov, S. // Journal of Experimental & Theoretical Physics;Dec2012, Vol. 115 Issue 6, p969 

    Any key-generation session contains a finite number of quantum-state messages, and it is there-fore important to understand the fundamental restrictions imposed on the minimal length of a string required to obtain a secret key with a specified length. The entropy uncertainty relations for smooth...

  • EEG-Based Person Authentication Using a Fuzzy Entropy-Related Approach with Two Electrodes. Zhendong Mu; Jianfeng Hu; Jianliang Min // Entropy;Dec2016, Vol. 18 Issue 12, p1 

    Person authentication, based on electroencephalography (EEG) signals, is one of the directions possible in the study of EEG signals. In this paper, a method for the selection of EEG electrodes and features in a discriminative manner is proposed. Given that EEG signals are unstable and...

  • Image Steganography with Multilayer Security Using Moderate Bit Substitution. Jindal, Balkrishan; Singh, Amar Partap // Journal of Applied Sciences;2014, Vol. 14 Issue 8, p738 

    In this study, a novel method is proposed for hiding ciypto data in digital images using moderate significant bit substitution with multilayer security to the hidden data for secure communication. Firstly, secret data is enciypted using a flexible-matrix based symmetric key to add first layer of...

  • Entropy of Fingerprints. Young, Matthew R.; Elliott, Stephen J.; Tilton, Catherine J.; Goldman, James E. // International Journal of Computer Science Engineering & Technolo;Feb2013, Vol. 3 Issue 2, p43 

    The inherent differences between secret-based authentication (such as passwords and PINs) and biometric authentication have left gaps in the credibility of biometrics. These gaps are due, in large part, to the inability to adequately cross-compare the two types of authentication. This paper...

  • Proof of the Results from Section 6.  // Foundations & Trends in Communications & Information Theory;2010, Vol. 7 Issue 2/3, p299 

    The article offers proofs related to mathematical theorems. In the theorems, crossover probability and average error probability are calculated. Fuzzy commitment, data-processing inequality, and entropy are also defined. It informs that the entropy of the secret and privacy leakage is also defined.

  • Recent Developments in Context-Based Predictive Techniques for Lossless Image Compression. Memon, N.; Wu, X. // Computer Journal;1997, Vol. 40 Issue 2/3, p127 

    In this paper we describe some recent developments that have taken place in context-based predictive coding, in response to the JPEG/JBIG committee's recent call for proposals for a new international standard on lossless compression of continuous-tone images. We describe the different prediction...

  • Integration of the Functional Testing with the General Theory of the Technical Diagnosis. Popescu, Mihai // Informatica Economica;2010, Vol. 14 Issue 4, p57 

    The paper goal is to integrate the software reliability into the general theory of the reliability, this thing being a natural approach, perfectly justified by the core concepts governing the two areas.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics