Tamper-proof and privacy-protected fingerprint identification systems
dc.contributor.author | Schwaiger, Michael | |
dc.contributor.editor | Brömme, Arslan | |
dc.contributor.editor | Busch, Christoph | |
dc.contributor.editor | Hühnlein, Detlef | |
dc.date.accessioned | 2019-05-31T08:18:52Z | |
dc.date.available | 2019-05-31T08:18:52Z | |
dc.date.issued | 2009 | |
dc.description.abstract | In this paper alternatives of tamper-proof and privacy-protected biometric identification systems are shown. One approach to secure such databases is to use cryptography. With its help it is possible to highly protect a system from any external attacker but an internal attacker still has direct access to all stored biometric data. This risk shall be avoided by using biometric encryption with another approach. In the following both approaches will be described and compared. | en |
dc.identifier.isbn | 978-3-88579-249-1 | |
dc.identifier.pissn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/23184 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | BIOSIG 2009: biometrics and electronic signatures | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-155 | |
dc.title | Tamper-proof and privacy-protected fingerprint identification systems | en |
dc.type | Text/Conference Paper | |
gi.citation.endPage | 184 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 181 | |
gi.conference.date | 17.–18. September 2009 | |
gi.conference.location | Darmstadt | |
gi.conference.sessiontitle | Regular Research Papers |
Dateien
Originalbündel
1 - 1 von 1