Information Security Applications
11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers
Chapter
In the modern electronic world, authentication of a person is an important task in many areas of day-to-day life. Using a biometrics to authenticate a person’s identity has several advantages over the present ...
Chapter and Conference Paper
Face recognition problem is challenging because face images can vary considerably in terms of facial expressions, 3D orientation, lighting conditions, hair styles, and so on. This paper proposes a method of fa...
Chapter and Conference Paper
The fingerprint has been used as biometrics for user identification and authentication because of its characteristics like uniqueness in that no two fingerprints pair from different fingers is definitely ident...
Chapter and Conference Paper
In the modern electronic world, the authentication of a person is an important task in many areas of day-to-day. Using biometrics to authenticate a person’s identity has several advantages over the present pra...
Chapter and Conference Paper
Recently, fingerprint has been received considerable attentions as a user authentication technique using biometrics. Fingerprint retrieval, which retrieves a candidate list of fingerprints having similar featu...
Chapter and Conference Paper
In this paper, we propose a secure and scalable solution for user authentication by using fingerprint verification on the sensor-client-server model, even with the client that is not necessarily trusted by the...
Chapter and Conference Paper
In this paper, we describe biometric watermarking techniques for secure user verification on the remote, multimodal biometric system employing both fingerprint and face information, and compare their effects o...
Chapter and Conference Paper
As user authentication by using biometric information such as fingerprint has been widely accepted, there has been a growing interest in protecting the biometric information itself against external attackers. ...
Chapter and Conference Paper
As the fingerprint authentication technique becomes widely used at close range such as for the door lock, it will be applied for the remote user authentication as the next step. For large-scale remote user aut...
Chapter and Conference Paper
Biometric based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as compromise of the data will be permanent. Cancela...
Chapter and Conference Paper
To heighten the biometrics security level, the biometrics feature extraction and verification need to be performed within smart cards, not in external card readers. However, the smart card chip has very limite...
Chapter and Conference Paper
Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems, and some implementations for fingerprint have been reported to protect the stored fingerprint template by h...
Chapter and Conference Paper
Verification of a person’s identity using fingerprint has several advantages over the present practices of Personal Identification Numbers(PINs) and passwords. Also, as the VLSI technology has been improved, t...
Book and Conference Proceedings
11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers