Abstract
In this paper will be presented some advances in crypto-biometric procedures used for encryption and division of secret data, as well as modern approaches for strategic management of divided information. Computer techniques for secret information sharing aim to secure information against disclosure to unauthorized persons. The paper will present algorithms dedicated for information division and sharing on the basis of biometric or personal features. Computer techniques for classified information sharing should also be useful in the process of shared information generation and distribution. For this purpose there will be presented a new approach for information management based on cognitive systems.
Chapter PDF
Similar content being viewed by others
References
Adleman, L.M., Rothemund, P.W.K., Roweiss, S., et al.: On applying molecular computation to the Data Encryption Standard. Journal of Computational Biology 6(1), 53–63 (1999)
Blakley, G.R.: Safeguarding Cryptographic Keys. In: Proceedings of the National Computer Conference, pp. 313–317 (1979)
Chomsky, N.: Syntactic Structures, London Mouton (1957)
Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Waterloo (2001)
Ogiela, L.: Cognitive Informatics in Automatic Pattern Understanding and Cognitive Information Systems. In: Wang, Y., Zhang, D., Kinsner, W. (eds.) Advances in Cognitive Informatics and Cognitive Computing. SCI, vol. 323, pp. 209–226. Springer, Heidelberg (2010)
Ogiela, L., Ogiela, M.R.: Advances in Cognitive Information Systems. In: COSMOS 17. Springer, Heidelberg (2012)
Ogiela, M.R., Ogiela, U.: Security of Linguistic Threshold Schemes in Multimedia Systems. In: Damiani, E., Jeong, J., Howlett, R.J., Jain, L.C. (eds.) New Directions in Intelligent Interactive Multimedia Systems and Services - 2. SCI, vol. 226, pp. 13–20. Springer, Heidelberg (2009)
Ogiela, M.R., Ogiela, U.: Shadow Generation Protocol in Linguistic Threshold Schemes. In: Ślęzak, D., Kim, T.-h., Fang, W.-C., Arnett, K.P. (eds.) SecTech 2009. CCIS, vol. 58, pp. 35–42. Springer, Heidelberg (2009)
Ogiela, M.R., Ogiela, U.: The use of mathematical linguistic methods in creating secret sharing threshold algorithms. Computers and Mathematics with Applications 60(2), 267–271 (2010)
Ogiela, M.R., Ogiela, U.: DNA-like linguistic secret sharing for strategic information systems. International Journal of Information Management 32, 175–181 (2012)
Ogiela, M.R., Ogiela, U.: Linguistic Protocols for Secure Information Management and Sharing. Computers and Mathematics with Applications 63(2), 564–572 (2012)
Peters, W.: Representing Humans in System Security Models: An Actor-Network Approach. Journal of Wireless Mobile Networks. Ubiquitous Computing, and Dependable Applications 2(1), 75–92 (2011)
Shamir, A.: How to Share a Secret. Communications of the ACM, 612–613 (1979)
Tang, S.: Simple Secret Sharing and Threshold RSA Signature Schemes. Journal of Information and Computational Science 1, 259–262 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 IFIP International Federation for Information Processing
About this paper
Cite this paper
Ogiela, M.R., Ogiela, L., Ogiela, U. (2014). Crypto-Biometric Models for Information Secrecy. In: Teufel, S., Min, T.A., You, I., Weippl, E. (eds) Availability, Reliability, and Security in Information Systems. CD-ARES 2014. Lecture Notes in Computer Science, vol 8708. Springer, Cham. https://doi.org/10.1007/978-3-319-10975-6_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-10975-6_13
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-10974-9
Online ISBN: 978-3-319-10975-6
eBook Packages: Computer ScienceComputer Science (R0)