This book deals with qcrypto-biometrics, q a relatively new and multi-disciplinary area of research (started in 1998). Combining biometrics and cryptography provides multiple advantages, such as, revocability, template diversity, better verification accuracy, and generation of cryptographically usable keys that are strongly linked to the user identity. In this text, a thorough review of the subject is provided and then some of the main categories are illustrated with recently proposed systems by the authors. Beginning with the basics, this text deals with various aspects of crypto-biometrics, including review, cancelable biometrics, cryptographic key generation from biometrics, and crypto-biometric key sharing protocols. Because of the thorough treatment of the topic, this text will be highly beneficial to researchers and industry professionals in information security and privacy. Table of Contents: Introduction / Cancelable Biometric System / Cryptographic Key Regeneration Using Biometrics / Biometrics-Based Secure Authentication Protocols / Concluding RemarksBASELINE SYSTEMS USED FOR EXTRACTING FEATURES FROM BIOMETRIC DATA 97 During acquisition, there is a possibility of rotation of iris due to ... In order to extract a binary face code from the face images, first a Gabor filter-based approach is employed . ... and then processed using log-Gabor filters having four scales and eight orientations using the MATLAB source code available at [92 ].
|Title||:||Enhancing Information Security and Privacy by Combining Biometrics with Cryptography|
|Author||:||Sanjay G. Kanade, Dijana Petrovska-Delacrétaz, Bernadette Dorizzi|
|Publisher||:||Morgan & Claypool Publishers - 2012|