User Authentication Via Biometric Hashing

作者: Ramarathnam Venkatesan , Mariusz H. Jakubowski

DOI:

关键词:

摘要: Techniques for authenticating biometric parameters via hashing are described. In one implementation, a parameter of user (e.g., fingerprint image, blood-vessel pattern, retina scan, etc.) is captured. One or more hashes produced from the parameter. To generate that appear random, pseudorandom metrics applied over The stored in association with information can be employed to authenticate user. Subsequently, during authentication, new captured and computed then compared predetermined hashes. If any found identical, sufficiently similar, hashes, deemed valid authenticated.

参考文章(33)
Josh Todd Gold, Automated measurement derivation ,(2008)
Nalini Ratha, Sharathchandra Pankanti, Jonathan Connell, Rudolf Bolle, Fingerprint biometric machine representations based on triangles ,(2004)
Tadashi Shimizu, Katsura Sakai, Kaoru Yasukawa, Hajime Sugino, Kensuke Ito, Detecting apparatus, input apparatus, pointing device, individual identification apparatus, and recording medium ,(2000)
Thomas Andreas Maria Kevenaar, Antonius Hermanus Maria Akkermans, Biometric template similarity based on feature locations ,(2005)
Ashish Khisti, Anthony Vetro, Stark C. Draper, Jonathan S. Yedidia, Emin Martinian, Biometric based user authentication and data encryption ,(2005)