Tesis sobre el tema "Systèmes biométriques"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 24 mejores tesis para su investigación sobre el tema "Systèmes biométriques".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
El, Abed Mohamad. "Évaluation de systèmes biométriques". Caen, 2011. http://www.theses.fr/2011CAEN2072.
Texto completoBiometric systems are increasingly used to verify or identify the identity of an individual. Given the challenges related to their use, mainly for e-commerce applications or physical access control (border control), it is important to have an evaluation methodology of such systems. The problematic addressed in this thesis is the design of a modality-independent evaluation methodology of biometric systems. The challenges are many such as the comparison of biometric systems for a particular application, the evaluation of an algorithm during its development or in setting its optimal parameters. We propose in this thesis a quality assessment method of biometric raw data. The proposed method has the advantage of being independent from the biometric modality, and the used verification system. Five public databases are used to validate the proposed method. We have also developed two evaluation methods related to the usability and the security aspects of a biometric system. The first consists of measuring users' acceptance and satisfaction when using biometric systems. The second consists of measuring the system (architecture and algorithms) robustness against attacks. The two presented methods have the advantage of being modality-independent. Three biometric authentication systems are used to show the benefits of both methods
Vibert, Benoît. "Contributions à l'évaluation de systèmes biométriques embarqués". Thesis, Normandie, 2017. http://www.theses.fr/2017NORMC208/document.
Texto completoBiometrics is sparking the interest of manufacturers and industrial compagniesbecause we are in need of new methods of authenticating individuals: for physicalaccess control, border control or for payments. Non-revocable and sensitive data isvery often stored on embedded systems of the secure element type (SE), such as asmart card. SEs include a comparison module called On-Card-Comparison (OCC),which determines whether the template presented corresponds to the template storedwithin it. In this thesis, we are particularly interested in fingerprints because it is abiometric modality that is very well perceived by the population.We propose in this thesis different contributions to evaluate embedded biometricsystems. The first is a biometric evaluation platform called EVABIO. The secondcontribution evaluates the impact on performance when reducing biometric templatesthat are to be stored on an SE. We propose methods to reduce the size of biometrictemplates while maintaining a high recognition rate thus, guaranteeing a good level ofperformance of the global biometric system. The last contribution studies attacks ona biometric system that is embedded on a SE. We look at what a priori are importantfor an impostor: we have shown that the type of fingerprint is an important a prioriand the reason why we have also proposed a countermeasure for embedded systems
Galdi, Chiara. "Conception et développement de systèmes biométriques multimodaux". Thesis, Paris, ENST, 2016. http://www.theses.fr/2016ENST0015/document.
Texto completoBiometric recognition for a long time has been used in confined spaces, usually indoor, where security-critical operations required high accuracy recognition systems, e.g. in police stations, banks, companies, airports. Field activities, on the contrary, required more portability and flexibility leading to the development of devices for less constrained biometric traits acquisition and consequently of robust algorithms for biometric recognition in less constrained conditions. However, the application of "portable" biometric recognition, was still limited in specific fields e.g. for immigration control, and still required dedicated devices. A further step would be to spread the use of biometric recognition on personal devices, as personal computers, tablets and smartphones. Some attempts in this direction were made embedding fingerprint scanners in laptops or smartphones. So far biometric recognition on personal devices has been employed just for a limited set of tasks, as to unlock the screen using fingerprints instead of passwords. The research activities described in this thesis were focused on studying and developing solutions for iris recognition on mobile devices. This topic has been analyzed in all its main phases: - Acquisition: collection of the MICHE database, containing pictures of irises acquired by mobile devices; - Segmentation: development of an innovative iris segmentation algorithm; - Feature extraction and matching: iris recognition has been combined with the face and with sensor (smartphone) recognition. Finally, the use of gaze analysis for human recognition has been investigated in order to verify its possible fusion with iris
Galdi, Chiara. "Conception et développement de systèmes biométriques multimodaux". Electronic Thesis or Diss., Paris, ENST, 2016. http://www.theses.fr/2016ENST0015.
Texto completoBiometric recognition for a long time has been used in confined spaces, usually indoor, where security-critical operations required high accuracy recognition systems, e.g. in police stations, banks, companies, airports. Field activities, on the contrary, required more portability and flexibility leading to the development of devices for less constrained biometric traits acquisition and consequently of robust algorithms for biometric recognition in less constrained conditions. However, the application of "portable" biometric recognition, was still limited in specific fields e.g. for immigration control, and still required dedicated devices. A further step would be to spread the use of biometric recognition on personal devices, as personal computers, tablets and smartphones. Some attempts in this direction were made embedding fingerprint scanners in laptops or smartphones. So far biometric recognition on personal devices has been employed just for a limited set of tasks, as to unlock the screen using fingerprints instead of passwords. The research activities described in this thesis were focused on studying and developing solutions for iris recognition on mobile devices. This topic has been analyzed in all its main phases: - Acquisition: collection of the MICHE database, containing pictures of irises acquired by mobile devices; - Segmentation: development of an innovative iris segmentation algorithm; - Feature extraction and matching: iris recognition has been combined with the face and with sensor (smartphone) recognition. Finally, the use of gaze analysis for human recognition has been investigated in order to verify its possible fusion with iris
Cabana, Antoine. "Contribution à l'évaluation opérationnelle des systèmes biométriques multimodaux". Thesis, Normandie, 2018. http://www.theses.fr/2018NORMC249/document.
Texto completoDevelopment and spread of connected devices, in particular smartphones, requires the implementation of authentication methods. In an ergonomic concern, manufacturers integrates biometric systems in order to deal with logical control access issues. These biometric systems grant access to critical data and application (payment, e-banking, privcy concerns : emails...). Thus, evaluation processes allows to estimate the systems' suitabilty with these uses. In order to improve recognition performances, manufacturer are susceptible to perform multimodal fusion.In this thesis, the evaluation of operationnal biometric systems has been studied, and an implementation is presented. A second contribution studies the quality estimation of speech samples, in order to predict recognition performances
Louati, Thamer. "Etude et réalisation d’un contrôle isoarchique de flux de personnes via des capteurs biométriques et infotroniques". Thesis, Aix-Marseille, 2013. http://www.theses.fr/2013AIXM4308.
Texto completoThe proposed work deals with the intelligent control, isoarchic and multicriteria of people flow in a restricted area. Our proposal is a control system based on a multimodal biometrics and RFID which are considered as two secured complementary techniques for robust and flexible people flow control. Multimodal biometrics is used for more reliable individual recognitions and the RFID for securing and storing supervised individuals identity information. This system is completely decentralized and the decision related to a control access request is made autonomously at each gate of each controlled area. The internal entities which participate to the decision making process respond to the holonic paradigm concepts and principles. The automatic gate opening is conditioned with several criteria conjunction (biometrics identifications, RFID identification, access permissions, authorized paths, status of the zone at time t, etc.). A multicriteria decision aid method is thus deployed in each access gate to merge biometrics identifications responses and to automatically treat the real-time access authorization requests. First, a state of art related to the biometric recognition, the contribution of multimodal biometric, the RFID technology and the physical access control based on biometric, was done. Then, an intelligent, isoarchic and multicriteria control of people flow system was proposed, including the use of multimodal biometric and RFID. At the end, a system simulation test bed was implemented to control prisoners flow in a jail. It supports the integration of various biometrics and RFID technologies
Ibarrondo, Luis Alberto. "Privacy-preserving biometric recognition systems with advanced cryptographic techniques". Electronic Thesis or Diss., Sorbonne université, 2023. https://theses.hal.science/tel-04058954.
Texto completoDealing with highly sensitive data, identity management systems must provide adequate privacy protection as they leverage biometrics technology. Wielding Multi-Party Computation (MPC), Homomorphic Encryption (HE) and Functional Encryption (FE), this thesis tackles the design and implementation of practical privacy-preserving biometric systems, from the feature extraction to the matching with enrolled users. This work is consecrated to the design of secure biometric solutions for multiple scenarios, putting special care to balance accuracy and performance with the security guarantees, while improving upon existing works in the domain. We go beyond privacy preservation against semi-honest adversaries by also ensuring correctness facing malicious adversaries. Lastly, we address the leakage of biometric data when revealing the output, a privacy concern often overlooked in the literature. The main contributions of this thesis are: • A new face identification solution built on FE-based private inner product matching mitigating input leakage. • A novel efficient two-party computation protocol, Funshade, to preserve the privacy of biometric thresholded distance metric operations. • An innovative method to perform privacy-preserving biometric identification based on the notion of group testing named Grote. • A new distributed decryption protocol with collaborative masking addressing input leakage, dubbed Colmade. • An honest majority three-party computation protocol, Banners, to perform maliciously secure inference of Binarized Neural Networks. • A HE Python library named Pyfhel, offering a high-level abstraction and low-level functionalities, with applications in teaching
El, Abed Mohamad. "Évaluation de système biométrique". Phd thesis, Université de Caen, 2011. http://tel.archives-ouvertes.fr/tel-01007679.
Texto completoBonazza, Pierre. "Système de sécurité biométrique multimodal par imagerie, dédié au contrôle d’accès". Thesis, Bourgogne Franche-Comté, 2019. http://www.theses.fr/2019UBFCK017/document.
Texto completoResearch of this thesis consists in setting up efficient and light solutions to answer the problems of securing sensitive products. Motivated by a collaboration with various stakeholders within the Nuc-Track project, the development of a biometric security system, possibly multimodal, will lead to a study on various biometric features such as the face, fingerprints and the vascular network. This thesis will focus on an algorithm and architecture matching, with the aim of minimizing the storage size of the learning models while guaranteeing optimal performances. This will allow it to be stored on a personal support, thus respecting privacy standards
Ly, Van Bao. "Réalisation d'un système de vérification de signature manuscrite en-ligne indépendant de la plateforme d'acquisition". Evry, Institut national des télécommunications, 2005. http://www.theses.fr/2005TELE0008.
Texto completoThis thesis contributes to the automatic identity verification using the online handwritten signature, which is often sampled by a digitizing tablet or a touch screen. The handwritten signature is a highly accepted biometric modality. The proposed algorithm is original, generic and independent of the experimental signature database. It can be installed with different acquisition devices without any adaptation. The signature is modelled by a Hidden Markov Model. Firstly, we perform a personalized normalization of the signature features, which improves the quality of the Hidden Markov Model. In this stage, we experiment only the Likelihood information of the Hidden Markov Model, and show that the normalization of the signature features is crucial to the system performance. Then, we exploit second information given by the Hidden Markov Model in order to verify the identity. It's the Segmentation of the signature, never used previously for this task. After, this information is fused with the Likelihood information to reinforce the verification system. The experiments show that the system performances are greatly improved compared to the exclusive use of the Likelihood information. These experiments are performed on 4 signature databases, whose characteristics are very different, and then on the integrated database, which is simply a mixture of the 4 previous databases. The good system performances show the independence of the proposed algorithm with respect to the considered signature database, or to the signature acquisition device
Boukellal, Hakim. "Propulsion par l'actine : génération de force". Paris 6, 2004. https://tel.archives-ouvertes.fr/tel-00009387.
Texto completoZuber, Emmanuel. "Approche biométrique de la dynamique de réactions antigène-anticorps : cas de deux systèmes automatisés de suivi en temps réel des cinétiques". Lyon 1, 1997. http://www.theses.fr/1997LYO1T113.
Texto completoBenferhat, Djamel. "Conception d'un système de communication tolérant la connectivité intermittente pour capteurs mobiles biométriques - Application à la supervision médicale de l'activité cardiaque de marathoniens". Phd thesis, Université de Bretagne Sud, 2013. http://tel.archives-ouvertes.fr/tel-00904627.
Texto completoHentati, Raïda. "Implémentation d'algorithmes de reconnaissance biométrique par l'iris sur des architectures dédiées". Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00917955.
Texto completoHilal, Alaa. "Système d'identification à partir de l'image d'iris et détermination de la localisation des informations". Thesis, Troyes, 2013. http://www.theses.fr/2013TROY0021/document.
Texto completoIris identification system is considered among the best biometric technologies. However problems related to the segmentation of the iris and to the normalization of iris templates are generally reported and induce loss of recognition performance. In this work three main contributions are made to the progress of the iris identification system. A new segmentation method is developed. It approximates the outer iris boundary with a circle and segments accurately the inner boundary of the iris by use of an active contour model. Next, a new normalization method is proposed. It leads to a more robust characterization and a better sampling of iris textures compared to traditional normalization methods. Finally using the proposed iris identification system, the location of discriminant characteristics along iris templates is identified. It appears that the most discriminant iris characteristics are located in inner regions of the iris (close to the pupil boundary) and that the discriminant capabilities of these characteristics decreases as outer regions of the iris are considered. The developed segmentation and normalization methods are tested and compared to a reference iris identification system over a database of 2639 iris images. Improvement in recognition performance validates the effectiveness of the proposed system
Abid, Mohamed. "Des mécanismes d’authentification basés sur l’identité de l’utilisateur pour renforcer la sécurité des réseaux". Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2011. http://www.theses.fr/2011TELE0005.
Texto completoIn this thesis, we design three new authentication mechanisms based on user identity. Therefore, we bring improvements in access control for different classes of networks such as Home Network, Governmental Network and Cellular Network. The identity can be biometric public features, simple strings (email addresses, login...), etc. The first solution concerns the use of biometric in Home Network' authentication mechanisms. In the Home Network (HN) case study, we aim at personalizing the access of each user in the HN and preventing illegitimate users (passing by the Home Gateway (HG)) to have any access. We propose a new biometric authentication method which respects the constraint of the non storage of the users' Biometric Template (BT) in the HG. To satisfy this constraint, we propose using the fuzzy vault method to hide a secret that should be used for authentication. A software generates a revocable biometric identity (BioID) using a functional transformation. This BioID is used in the fuzzy vault mechanisms to hide a secret session key. The second solution proposes e-Passport authentication mechanisms. The cryptographic parameters are generated using the biometric templates and hence, personalized for the user. In travel document case study, we present our proposal which introduces a new e-Passport authentication mechanisms based on the Elliptic Curve Diffie-Hellman (ECDH) Key Agreement protocol. This protocol is needed to generate a session key used to authenticate the traveler and the Inspection System (IS) to exchange secure data. Our protocol is defined using minutiae data (fingerprint) and iris code of the e-Passport holder. In the third solution, we worked on the Cellular Network and we used a simple string, like email addresses, as identifier to access to services. We choose the IP Multimedia Subsystem (IMS) which is an overlay architecture for the provision of multimedia services. We design a new service authentication mechanism relying on Identity Based Cryptography (IBC) for the IMS architecture. The goal was to authenticate the users using their public and private identifiers to overcome known weaknesses in the Authentication and Key Agreement (AKA) protocol. We focused on the eavesdropping and impersonation attacks that can take place in classical IMS scenario and we showed how our proposed solution can prevent against these attacks. We, then, proposed to add a Batch Verification on the Bootstrapping Server Function (BSF) to decrease signature verification delay and the authentication response time
Chihaoui, Takwa. "Système d'identification de personnes basé sur la rétine". Thesis, Paris Est, 2018. http://www.theses.fr/2018PESC1145/document.
Texto completoOur work is part of the retina biometrics. The retina is the sensory layer of the eye; it has a rich and unique texture even in twins. Its properties have made the retina biometrics an active research area. Indeed, numerous methods have been proposed for the various stages of the biometric method, from pretreatment of the retinal image to its analysis, through its characterization, in order to identify and authenticate an individual. We are interested in this work in these thesis works, the study, design, development and evaluation of a new biometric method based on the retina. This thesis presents our contributions for each stage of the proposed biometric method. Our first contribution lies in the proposition of a healthy and pathological retinal image analysis method, followed by a selection of a region of interest around the optical disc. This method improves the quality of the retinal image and extracts a more stable region of interest from the retina to maintain a satisfactory information density, to ensure a better quality of recognition. Our second contribution consists in proposing a new method for extracting local characteristics based on the standard SIFT descriptor. It applies a new method based on the removal of non-informative points of interest extracted by the standard SIFT descriptor. This new method of extracting local features reduces the number of redundant points of interest while maintaining the quality of the description. We validated, the proposed biometric method on different bases including healthy and pathological images. This biometric method has yielded encouraging results on healthy and pathological retinal images. The results obtained show encouraging performances. These results indicate that the method we have proposed, correctly locates the retinal region of interest. In identification mode, a correct identification rate of approximately 99.8% is reached. In verification mode, we obtained 0.12% as FRR error rate and 0% for the FAR and EER error rates. The comparative study showed that our method is more discriminative than other state-of-the-art methods, especially those based on segmentation and extraction of the vascular tree
Abid, Mohamed. "Des mécanismes d’authentification basés sur l’identité de l’utilisateur pour renforcer la sécurité des réseaux". Thesis, Evry, Institut national des télécommunications, 2011. http://www.theses.fr/2011TELE0005/document.
Texto completoIn this thesis, we design three new authentication mechanisms based on user identity. Therefore, we bring improvements in access control for different classes of networks such as Home Network, Governmental Network and Cellular Network. The identity can be biometric public features, simple strings (email addresses, login...), etc. The first solution concerns the use of biometric in Home Network' authentication mechanisms. In the Home Network (HN) case study, we aim at personalizing the access of each user in the HN and preventing illegitimate users (passing by the Home Gateway (HG)) to have any access. We propose a new biometric authentication method which respects the constraint of the non storage of the users' Biometric Template (BT) in the HG. To satisfy this constraint, we propose using the fuzzy vault method to hide a secret that should be used for authentication. A software generates a revocable biometric identity (BioID) using a functional transformation. This BioID is used in the fuzzy vault mechanisms to hide a secret session key. The second solution proposes e-Passport authentication mechanisms. The cryptographic parameters are generated using the biometric templates and hence, personalized for the user. In travel document case study, we present our proposal which introduces a new e-Passport authentication mechanisms based on the Elliptic Curve Diffie-Hellman (ECDH) Key Agreement protocol. This protocol is needed to generate a session key used to authenticate the traveler and the Inspection System (IS) to exchange secure data. Our protocol is defined using minutiae data (fingerprint) and iris code of the e-Passport holder. In the third solution, we worked on the Cellular Network and we used a simple string, like email addresses, as identifier to access to services. We choose the IP Multimedia Subsystem (IMS) which is an overlay architecture for the provision of multimedia services. We design a new service authentication mechanism relying on Identity Based Cryptography (IBC) for the IMS architecture. The goal was to authenticate the users using their public and private identifiers to overcome known weaknesses in the Authentication and Key Agreement (AKA) protocol. We focused on the eavesdropping and impersonation attacks that can take place in classical IMS scenario and we showed how our proposed solution can prevent against these attacks. We, then, proposed to add a Batch Verification on the Bootstrapping Server Function (BSF) to decrease signature verification delay and the authentication response time
Cauchie, Stéphane. "Tactim : from pattern recognition to the security for Biometry". Thesis, Tours, 2009. http://www.theses.fr/2009TOUR4033.
Texto completoIn this thesis, we propose a study on a new biometric signal following two axes; on the one hand, the pattern recognition objective and on the other hand security aspects. The first part is dedicated to the study of this new process: Tactim. With the help of signal processing methods, we propose a set of characteristic extractors. Then we present their uses through our biometric system. We take advantage of our pattern recognition solver, Coyote, in order to produce our biometric system. The second part is dedicated to the study of Coyote. Coyote is a Case Based Reasoning system, which assembles algorithms in order to produce pattern recognition systems which objective is to minimize error rates. Finally, when we consider the pattern recognition task accomplished (acceptable error rate), we study cryptographic protocols that ensure anonymity of the user during a biometric authentication. We propose a hybridization of our pattern recognition model with our cryptographic protocol (extension of the Bringer et al. protocol)
Ishak, Dany. "La conception d'un système ultrasonore passif couche mince pour l'évaluation de l'état vibratoire des cordes vocales". Thesis, Valenciennes, 2017. http://www.theses.fr/2017VALE0043/document.
Texto completoIn this work, a speaker recognition approach using a contact microphone is developed and presented. The contact passive element is constructed from a piezoelectric material. In this context, the position of the piezoelectric transducer on the individual’s neck may greatly affect the quality of the collected signal and consequently the information extracted from it. Thus, the multilayered medium in which the sound propagates before being detected by the transducer is modeled. The best location on the individual’ neck to place a particular transducer element is determined by implementing Monte Carlo simulation techniques and consequently, the simulation results are verified using real experiments. The recognition is based on the signal generated from the vocal cords’ vibrations when an individual is speaking and not on the vocal signal at the output of the lips that is influenced by the resonances in the vocal tract. Therefore, due to the varying nature of the collected signal, the analysis was performed by applying the Short Term Fourier Transform technique to decompose the signal into its frequency components. These frequencies represent the vocal folds’ vibrations (50-1000 Hz). The features in terms of frequencies’ interval are extracted from the resulting spectrogram. Then, a 1-D vector is formed for identification purposes. The identification of the speaker is performed using two evaluation criteria, namely, the correlation similarity measure and the Principal Component Analysis (PCA) in conjunction with the Euclidean distance. The results show that a high percentage of recognition is achieved and the performance is much better than many existing techniques in the literature
Tak, Hemlata. "End-to-End Modeling for Speech Spoofing and Deepfake Detection". Electronic Thesis or Diss., Sorbonne université, 2023. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2023SORUS104.pdf.
Texto completoVoice biometric systems are being used in various applications for secure user authentication using automatic speaker verification technology. However, these systems are vulnerable to spoofing attacks, which have become even more challenging with recent advances in artificial intelligence algorithms. There is hence a need for more robust, and efficient detection techniques. This thesis proposes novel detection algorithms which are designed to perform reliably in the face of the highest-quality attacks. The first contribution is a non-linear ensemble of sub-band classifiers each of which uses a Gaussian mixture model. Competitive results show that models which learn sub-band specific discriminative information can substantially outperform models trained on full-band signals. Given that deep neural networks are more powerful and can perform both feature extraction and classification, the second contribution is a RawNet2 model. It is an end-to-end (E2E) model which learns features directly from raw waveform. The third contribution includes the first use of graph neural networks (GNNs) with an attention mechanism to model the complex relationship between spoofing cues present in spectral and temporal domains. We propose an E2E spectro-temporal graph attention network called RawGAT-ST. RawGAT-ST model is further extended to an integrated spectro-temporal graph attention network, named AASIST which exploits the relationship between heterogeneous spectral and temporal graphs. Finally, this thesis proposes a novel data augmentation technique called RawBoost and uses a self-supervised, pre-trained speech model as a front-end to improve generalisation in the wild conditions
El, Khoury Franjieh. "Modélisation de la sécurisation d’accès aux réseaux par la technique de cryptographie asymétrique en utilisant la reconnaissance de l’iris et la technologie des agents". Thesis, Lyon 1, 2009. http://www.theses.fr/2009LYO10308.
Texto completoThe exponential growth in the use of the Internet as well as the emergence of new types of applications has increased the network’s constraints in terms f security. Fort the last several years, biometric techniques have proven their applicability and reliability in providing secure access to shared resources in different domains. Furthermore, software agents and multi-agent systems (MAS) have evidently been efficient in resolving several problems in network. Therefore, the aim of this research is to propose a model “IrisCryptoAgentSystem” (ICAS) that is based on a biometric method for authentication using the iris of the eyes and an asymmetric cryptography method using “Rivest-Shamir-Adleman” (RSA) in an agent-based architecture. This model should provide secure access to information and ensure the protection of confidential information. Therefore, our work focuses on the development of new methods in biometric autheitcation in order to provide greater efficiency in the ICAS model. We introduce pretopological aspects in the development of the indexed hierarchy to classify DHVA templates. Our approach aims to improve the existing methods for the localization of the external and the internal edges of the iris
Larcher, Anthony. "Modèles acoustiques à structure temporelle renforcée pour la vérification du locuteur embarquée". Phd thesis, Université d'Avignon, 2009. http://tel.archives-ouvertes.fr/tel-00453645.
Texto completoKanade, Sanjay Ganesh. "Enhancing information security and privacy by combining biometrics with cryptography". Thesis, Evry, Institut national des télécommunications, 2010. http://www.theses.fr/2010TELE0022/document.
Texto completoSecuring information during its storage and transmission is an important and widely addressed issue. Generally, cryptographic techniques are used for information security. Cryptography requires long keys which need to be kept secret in order to protect the information. The drawback of cryptography is that these keys are not strongly linked to the user identity. In order to strengthen the link between the user's identity and his cryptographic keys, biometrics is combined with cryptography. In this thesis, we present various methods to combine biometrics with cryptography. With this combination, we also address the privacy issue of biometric systems: revocability, template diversity, and privacy protection are added to the biometric verification systems. Finally, we also present a protocol for generating and sharing biometrics based crypto-biometric session keys. These systems are evaluated on publicly available iris and face databases