12.07.2015 Views

Biometric Cryptography

Biometric Cryptography

Biometric Cryptography

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

DESCRIPTION OF BCS SCHEMES- Key Release Scheme -• <strong>Biometric</strong> authentication decoupled from the cryptographicpart of the system.• Easy to implement but not used frequently because of majorvulnerabilities:• Template needs to be stored in database which means it can be stolen• Change to the biometric matching process• Cryptographic key has to be stored as part of the template• Not appropriate for high security application

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!