Date: Saturday, 24 November 2007 02:23 pm (UTC)
Preventing that translation back from the database to the fingerprint is the topic I wanted to do for my PhD. We have strong cryptographic hashes used for things like passwords that must match exactly: it's possible to make the computer check whether the password is right without giving it enough information to actually reconstruct the password short of testing them all until one matches. There's very little known about how to do something similar with something like a fingerprint where a fuzzy match is needed - a secure robust hash, where "robust" means it can still match under small changes. At the moment, about the best we can do is store a reconstructible copy of the fingerprint to compare against.

The topic I've ended up actually doing, though, is quite a lot different from that.
If you don't have an account you can create one now.
HTML doesn't work in the subject.
More info about formatting

If you are unable to use this captcha for any reason, please contact us by email at support@dreamwidth.org

December 2024

S M T W T F S
12 34567
891011121314
15161718192021
22232425262728
293031    

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Thursday, 24 July 2025 06:37 pm
Powered by Dreamwidth Studios