kozyilmaz / biokey
Cryptographic Key Generation from Biometric Data
☆13Updated 6 years ago
Related projects: ⓘ
- Privacy mechanisms for decentralized fingerprint-based authentication☆10Updated 4 years ago
- Implementation for iris biometric template protection based on NTRU homomorphic encryption.☆12Updated 2 years ago
- A simplified implementation of the fuzzy vault algorithm for biometric data☆21Updated 9 years ago
- A Python implementation of fuzzy extractor.☆53Updated last year
- Homomorphic Encryption in Python☆20Updated 6 years ago
- Secure outsourcing of image editing to untrusted cloud environments by implementing Paillier's Homomorphic Cryptosystem and extending it …☆40Updated 4 years ago
- Implementation of algorithms from the paper Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data☆13Updated 10 years ago
- A collection of Python scripts that I used while working with NBIS to carry out some of the bulk work.☆12Updated 5 years ago
- This repo contains code/learning resources related to Homomorphic Encryption.☆28Updated 4 years ago
- Python implementation of "Somewhat Practical Fully Homomorphic Encryption"☆20Updated 4 years ago
- This repository provides python code for privacy preserving image classification based on fully homomorphic encryption (FHE).☆13Updated 5 years ago
- fingerprint recognition library written in Python3☆36Updated 3 years ago
- Implementation of the local and global unlinkability metrics for biometric template protection systems☆20Updated 5 years ago
- NTRU Python Library with Application to Encrypted Domain☆28Updated 7 months ago
- Medical data is often highly sensitive in terms of data privacy and security concerns. Federated learning, one type of machine learn- ing…☆15Updated 2 years ago
- Automatic Dataset Annotation to Learn CNN Pore Description for Fingerprint Recognition☆20Updated 5 years ago
- Privacy-Preserving Convolutional Neural Networks using Homomorphic Encryption☆69Updated last month
- Iris recognition using applied machine learning on CASIA iris images dataset☆55Updated 5 years ago
- 📊 Privacy Preserving Medical Data Analytics using Secure Multi Party Computation. An End-To-End Use Case. A. Giannopoulos, D. Mouris M.S…☆19Updated 9 months ago
- A Python implementation of the NewHope post-quantum cryptographic scheme.☆17Updated 2 years ago
- Toolbox for Automatic Secure Two-partY computation☆10Updated 8 years ago
- An implementation of BGV-FHE scheme☆23Updated 6 years ago
- Privacy Preserving Convolutional Neural Network using Homomorphic Encryption for secure inference☆45Updated 3 years ago
- Implementation of Deep Print, a Deep Learning based fixed-length Fingerprint Representation extractor, and various experiments with such …☆12Updated 7 months ago
- Simple Python Ring-Learning With Errors Key Exchange☆17Updated 7 years ago
- Private Set Intersection Cardinality protocol based on ECDH and Bloom Filters☆128Updated 3 months ago
- FingerNet is an universal deep ConvNet for extracting fingerprint representations including orientation field, segmentation, enhenced fin…☆42Updated last year
- C++ Library for Mobile Private Contact Discovery☆27Updated 3 years ago
- Fast Homomorphic Evaluation of Deep Discretized Neural Networks☆43Updated 6 years ago
- python prototype of PRE (Proxy Re-encryption) on Cloud storage and sharing☆21Updated 6 years ago