Please use this identifier to cite or link to this item:
http://hdl.handle.net/2080/1039
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Panigrahy, S K | - |
dc.contributor.author | Jena, D | - |
dc.contributor.author | Korra, S B | - |
dc.contributor.author | Jena, S K | - |
dc.date.accessioned | 2009-09-08T04:36:57Z | - |
dc.date.available | 2009-09-08T04:36:57Z | - |
dc.date.issued | 2009-08-19 | - |
dc.identifier.citation | Proceedings of Second International Conference, IC3 2009, Noida, India, August 17-19, 2009, P 182-193 | en |
dc.identifier.isbn | 978-3-642-03546-3 (Print) 978-3-642-03547-0 (Online) | - |
dc.identifier.uri | http://www.springerlink.com/content/x1228383t1553418/ | - |
dc.identifier.uri | http://hdl.handle.net/2080/1039 | - |
dc.description | Copyright belongs to the Book publisher-Springer | en |
dc.description.abstract | Biometrics are expected to add a new level of security to applications, as a person attempting access must prove who he or she really is by presenting a biometric to the system. The recent developments in the biometrics area have lead to smaller, faster and cheaper systems, which in turn has increased the number of possible application areas for biometric identity verification. The biometric data, being derived from human bodies (and especially when used to identify or verify those bodies) is considered personally identifiable information (PII). The collection, use and disclosure of biometric data — image or template, invokes rights on the part of an individual and obligations on the part of an organization. As biometric uses and databases grow, so do concerns that the personal data collected will not be used in reasonable and accountable ways. Privacy concerns arise when biometric data are used for secondary purposes, invoking function creep, data matching, aggregation, surveillance and profiling. Biometric data transmitted across networks and stored in various databases by others can also be stolen, copied, or otherwise misused in ways that can materially affect the individual involved. As Biometric systems are vulnerable to replay, database and brute-force attacks, such potential attacks must be analysed before they are massively deployed in security systems. Along with security, also the privacy of the users is an important factor as the constructions of lines in palmprints contain personal characteristics, from face images a person can be recognised, and fake signatures can be practised by carefully watching the signature images available in the database. We propose a cryptographic approach to encrypt the images of palmprints, faces, and signatures by an advanced Hill cipher technique for hiding the information in the images. It also provides security to these images from being attacked by above mentioned attacks. So, during the feature extraction, the encrypted images are first decrypted, then the features are extracted, and used for identification or verification. | en |
dc.description.sponsorship | Information Security Education & Awareness project under the Department of Information Technology, Govt. of India. | en |
dc.format.extent | 409543 bytes | - |
dc.format.mimetype | application/pdf | - |
dc.language.iso | en_US | - |
dc.publisher | Springer Berlin Heidelberg | en |
dc.relation.ispartofseries | Communications in Computer and Information Science;1865-0929 (Print) 1865-0937 (Online) | - |
dc.relation.ispartofseries | Contemporary Computing;Volume 40, Part 4 | - |
dc.subject | Biometrics | en |
dc.subject | Face | en |
dc.subject | Palmprint | en |
dc.subject | Signature | en |
dc.subject | Privacy Protection | en |
dc.subject | Cryptography | en |
dc.title | On the Privacy Protection of Biometric Traits: Palmprint, Face, and Signature | en |
dc.type | Book chapter | en |
Appears in Collections: | Conference Papers |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
privacy-biometrics-ic3-09.pdf | 399.94 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.