Secure biometric key generation scheme for cryptography using combined biometric features of fingerprint and iris

被引:0
|
作者
Balakumar, P. [1 ]
Venkatesan, R. [2 ]
机构
[1] Department of Computer Science and Engineering, Selvam College of Technology, Namakkal, Tamilnadu, India
[2] Department of Computer Science and Engineering, PSG College of Technology, Coimbatore, Tamilnadu, India
来源
关键词
Authentication - Smart cards - Public key cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
Exact and automatic recognition and authentication of users are a essential difficulty in all systems. Shared secrets like Personal Identification Numbers or Passwords and key devices such as Smart cards are not presently sufficient in few situations. What is required is a system that could authenticate that the person is actually the person. The biometrics is improving the capability to recognize the persons. The usage of biometrics system permits the recognition of a living person according to the physiological features or behavioral features to be recognized without human involvement. This leads to the world wide usage of biometrics to secure the system. The various biometrics used in securing system are fingerprint, iris, retina, etc. The construction of cryptographic key from biometrics is used generally to secure the system. The efficiency and the flexibility of the cryptographic make it suitable for securing purpose. In some times, biometrics can be stolen; this makes the attackers to access the system for any time. This problem is diminished in this paper by using two biometrics features. The biometrics used in this paper is fingerprint and iris. These two features are combined with the help of fusion algorithm. From the combined features, cryptographic key is generated. The experimental result shows that the proposed techniques results in better security than the existing techniques.
引用
收藏
页码:349 / 356
相关论文
共 50 条
  • [1] A secure scheme of biometric key generation from biometric features
    Fu, Bo
    Zhou, Jun-Lin
    Duan, Gui-Duo
    Zhuan, Si-Yu
    Li, Jian-Ping
    [J]. WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING, VOL 1 AND 2, 2006, : 1031 - +
  • [2] Comparable Features and Same Cryptography Key Generation using Biometric Fingerprint Image
    Panchal, Gaurangkumar
    Samanta, Debasis
    [J]. PROCEEDINGS OF THE 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL & ELECTRONICS, INFORMATION, COMMUNICATION & BIO INFORMATICS (IEEE AEEICB-2016), 2016, : 691 - 695
  • [3] Efficient cancellable biometric key generation scheme for cryptography
    Gaddam, Sunil V.K.
    Lal, Manohar
    [J]. International Journal of Network Security, 2010, 11 (02) : 61 - 69
  • [4] A Novel Key Generation Scheme for Biometric Cryptosystems Using Fingerprint Minutiae
    Andalib, Ahmed Shayer
    Abdulla-Al-Shami, Md.
    [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV), 2013,
  • [5] Biometric digital signature key generation and cryptography communication based on fingerprint
    Jo, Je-Gyeong
    See, Jong-Won
    Lee, Hyung-Woo
    [J]. FRONTIERS IN ALGORITHMICS, PROCEEDINGS, 2007, 4613 : 38 - +
  • [6] Secure biometric-key generation with biometric helper
    Teoh, Andrew Beng Jin
    Toh, Kar-Ann
    [J]. ICIEA 2008: 3RD IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, PROCEEDINGS, VOLS 1-3, 2008, : 2145 - 2150
  • [7] Development of an efficient secure Biometric system by using Iris, Fingerprint, Face
    Telgad, Rupali L.
    Siddiqui, Almas
    Lothe, Savita A.
    Deshmukh, P. D.
    Jadhao, Gajanan
    [J]. 2017 1ST INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND INFORMATION MANAGEMENT (ICISIM), 2017, : 100 - 104
  • [8] Multimodal Biometric Recognition using Iris & Fingerprint
    Bharadi, Vinayak Ashok
    Pandya, Bhavesh
    Nemade, Bhushan
    [J]. 2014 5TH INTERNATIONAL CONFERENCE CONFLUENCE THE NEXT GENERATION INFORMATION TECHNOLOGY SUMMIT (CONFLUENCE), 2014, : 697 - 702
  • [9] Enhanced RSA Key Generation Modelling Using Fingerprint Biometric
    Bansal, Neha
    Mahto, Dindayal
    Yadav, Dilip Kumar
    [J]. HELIX, 2018, 8 (05): : 3922 - 3926
  • [10] Enhanced Biometric Recognition for Secure Authentication Using Iris Preprocessing and Hyperelliptic Curve Cryptography
    Rajasekar, Vani
    Premalatha, J.
    Sathya, K.
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020 (2020):