Attributes | Values |
---|
rdf:type
| |
Description
| - General biometric systems are well known in public and systems based on the fingerprint recognition belong, without question, to the most familiar ones. Fingerprints have been used for identification and authentication for a long time because their uniqueness and reliability have been proven in everyday life. Nowadays, there are a great number of such biometric systems based on fingerprint recognition on the market. One group of them is used for forensic purposes (these are called dactyloscopic systems and are used in tasks of person identification). Another group of biometric systems represents the topic of interest of this monography - access or verification systems.<br>Both such systems and related basic biometric terms and processes are described in the first and second chapters.<br>If we try to combine a biometric (fingerprint) system with some cryptographic system, we are confronted with the question, if there is enough information entropy in the fingerprint. Some computations of the similarity
- General biometric systems are well known in public and systems based on the fingerprint recognition belong, without question, to the most familiar ones. Fingerprints have been used for identification and authentication for a long time because their uniqueness and reliability have been proven in everyday life. Nowadays, there are a great number of such biometric systems based on fingerprint recognition on the market. One group of them is used for forensic purposes (these are called dactyloscopic systems and are used in tasks of person identification). Another group of biometric systems represents the topic of interest of this monography - access or verification systems.<br>Both such systems and related basic biometric terms and processes are described in the first and second chapters.<br>If we try to combine a biometric (fingerprint) system with some cryptographic system, we are confronted with the question, if there is enough information entropy in the fingerprint. Some computations of the similarity (en)
|
Title
| - Biometric Cryptography Based on Fingerprints
- Biometric Cryptography Based on Fingerprints (en)
|
skos:prefLabel
| - Biometric Cryptography Based on Fingerprints
- Biometric Cryptography Based on Fingerprints (en)
|
skos:notation
| - RIV/00216305:26230/10:PU89548!RIV11-MSM-26230___
|
http://linked.open...avai/riv/aktivita
| |
http://linked.open...avai/riv/aktivity
| |
http://linked.open...vai/riv/dodaniDat
| |
http://linked.open...aciTvurceVysledku
| |
http://linked.open.../riv/druhVysledku
| |
http://linked.open...iv/duvernostUdaju
| |
http://linked.open...titaPredkladatele
| |
http://linked.open...dnocenehoVysledku
| |
http://linked.open...ai/riv/idVysledku
| - RIV/00216305:26230/10:PU89548
|
http://linked.open...riv/jazykVysledku
| |
http://linked.open.../riv/klicovaSlova
| - biometrics, cryptography, verification, authentication, identification, fingerprint, enrollment, matching, classification, orientation field, ridge count, biometric template, biometric key, certificate, entropy, error rate, PIN, password (en)
|
http://linked.open.../riv/klicoveSlovo
| |
http://linked.open...ontrolniKodProRIV
| |
http://linked.open...i/riv/mistoVydani
| |
http://linked.open...vEdiceCisloSvazku
| |
http://linked.open...i/riv/nazevZdroje
| - Biometric Cryptography Based on Fingerprints
|
http://linked.open...in/vavai/riv/obor
| |
http://linked.open...ichTvurcuVysledku
| |
http://linked.open...v/pocetStranKnihy
| |
http://linked.open...cetTvurcuVysledku
| |
http://linked.open...UplatneniVysledku
| |
http://linked.open...iv/tvurceVysledku
| |
http://linked.open...n/vavai/riv/zamer
| |
number of pages
| |
http://purl.org/ne...btex#hasPublisher
| - Lambert Academic Publishing
|
https://schema.org/isbn
| |
http://localhost/t...ganizacniJednotka
| |