About: Biometric Cryptography Based on Fingerprints     Goto   Sponge   NotDistinct   Permalink

An Entity of Type : http://linked.opendata.cz/ontology/domain/vavai/Vysledek, within Data Space : linked.opendata.cz associated with source document(s)

AttributesValues
rdf:type
Description
  • General biometric systems are well known in public and systems based on the fingerprint recognition belong, without question, to the most familiar ones. Fingerprints have been used for identification and authentication for a long time because their uniqueness and reliability have been proven in everyday life. Nowadays, there are a great number of such biometric systems based on fingerprint recognition on the market. One group of them is used for forensic purposes (these are called dactyloscopic systems and are used in tasks of person identification). Another group of biometric systems represents the topic of interest of this monography - access or verification systems.<br>Both such systems and related basic biometric terms and processes are described in the first and second chapters.<br>If we try to combine a biometric (fingerprint) system with some cryptographic system, we are confronted with the question, if there is enough information entropy in the fingerprint. Some computations of the similarity
  • General biometric systems are well known in public and systems based on the fingerprint recognition belong, without question, to the most familiar ones. Fingerprints have been used for identification and authentication for a long time because their uniqueness and reliability have been proven in everyday life. Nowadays, there are a great number of such biometric systems based on fingerprint recognition on the market. One group of them is used for forensic purposes (these are called dactyloscopic systems and are used in tasks of person identification). Another group of biometric systems represents the topic of interest of this monography - access or verification systems.<br>Both such systems and related basic biometric terms and processes are described in the first and second chapters.<br>If we try to combine a biometric (fingerprint) system with some cryptographic system, we are confronted with the question, if there is enough information entropy in the fingerprint. Some computations of the similarity (en)
Title
  • Biometric Cryptography Based on Fingerprints
  • Biometric Cryptography Based on Fingerprints (en)
skos:prefLabel
  • Biometric Cryptography Based on Fingerprints
  • Biometric Cryptography Based on Fingerprints (en)
skos:notation
  • RIV/00216305:26230/10:PU89548!RIV11-MSM-26230___
http://linked.open...avai/riv/aktivita
http://linked.open...avai/riv/aktivity
  • S, Z(MSM0021630528)
http://linked.open...vai/riv/dodaniDat
http://linked.open...aciTvurceVysledku
http://linked.open.../riv/druhVysledku
http://linked.open...iv/duvernostUdaju
http://linked.open...titaPredkladatele
http://linked.open...dnocenehoVysledku
  • 248951
http://linked.open...ai/riv/idVysledku
  • RIV/00216305:26230/10:PU89548
http://linked.open...riv/jazykVysledku
http://linked.open.../riv/klicovaSlova
  • biometrics, cryptography, verification, authentication, identification, fingerprint, enrollment, matching, classification, orientation field, ridge count, biometric template, biometric key, certificate, entropy, error rate, PIN, password (en)
http://linked.open.../riv/klicoveSlovo
http://linked.open...ontrolniKodProRIV
  • [71F6BD23660C]
http://linked.open...i/riv/mistoVydani
  • Saarbrücken
http://linked.open...vEdiceCisloSvazku
  • NEUVEDEN
http://linked.open...i/riv/nazevZdroje
  • Biometric Cryptography Based on Fingerprints
http://linked.open...in/vavai/riv/obor
http://linked.open...ichTvurcuVysledku
http://linked.open...v/pocetStranKnihy
http://linked.open...cetTvurcuVysledku
http://linked.open...UplatneniVysledku
http://linked.open...iv/tvurceVysledku
  • Drahanský, Martin
http://linked.open...n/vavai/riv/zamer
number of pages
http://purl.org/ne...btex#hasPublisher
  • Lambert Academic Publishing
https://schema.org/isbn
  • 978-3-8383-6361-5
http://localhost/t...ganizacniJednotka
  • 26230
Faceted Search & Find service v1.16.118 as of Jun 21 2024


Alternative Linked Data Documents: ODE     Content Formats:   [cxml] [csv]     RDF   [text] [turtle] [ld+json] [rdf+json] [rdf+xml]     ODATA   [atom+xml] [odata+json]     Microdata   [microdata+json] [html]    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3240 as of Jun 21 2024, on Linux (x86_64-pc-linux-gnu), Single-Server Edition (126 GB total memory, 58 GB memory in use)
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2024 OpenLink Software