Survey of Biometric Based Key Generation to Enhance Security of Cryptosystems

被引:0
|
作者
Sadkhan, Sattar B. [1 ]
AL-Shukur, Baheeja K. [1 ]
Mattar, Ali K. [1 ]
机构
[1] Univ Babylon, Comp Software Dept, Babylon, Iraq
关键词
Key Generation; Key Binding; Biometric Cryptography; Biometric based-key generation; Biometric Security;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Security of cryptosystems became more important issues in several applications, and need to be focused. Traditional cryptosystem used traditional ways to secure the data (pin, password,..etc.) while biometric features extracted from single biometric model or from merging more than one biometric features to produce strong keys for security. This paper provides a survey we tried to explore different method to construct keys (that's lead to a secure cryptosystem) with more resistance against attackers and how the system react with it.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Extended notions of security for multicast public key cryptosystems
    Baudron, O
    Pointcheval, D
    Stern, J
    AUTOMATA LANGUAGES AND PROGRAMMING, 2000, 1853 : 499 - 511
  • [42] Attainable unconditional security for shared-key cryptosystems
    Biondi, Fabrizio
    Given-Wilson, Thomas
    Legay, Axel
    INFORMATION SCIENCES, 2016, 369 : 80 - 99
  • [43] On the security of public key cryptosystems with a double decryption mechanism
    Galindo, David
    Herranz, Javier
    INFORMATION PROCESSING LETTERS, 2008, 108 (05) : 279 - 283
  • [44] Secure biometric-key generation with biometric helper
    Teoh, Andrew Beng Jin
    Toh, Kar-Ann
    ICIEA 2008: 3RD IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, PROCEEDINGS, VOLS 1-3, 2008, : 2145 - 2150
  • [45] Biometric Based Unique Key Generation for Authentic Audio Watermarking
    Dutta, Malay Kishore
    Gupta, Phalguni
    Pathak, Vinay K.
    PATTERN RECOGNITION AND MACHINE INTELLIGENCE, PROCEEDINGS, 2009, 5909 : 458 - 463
  • [46] A Biometric Key Generation Method Based on Semisupervised Data Clustering
    Sheng, Weiguo
    Chen, Shengyong
    Xiao, Gang
    Mao, Jiafa
    Zheng, Yujun
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2015, 45 (09): : 1205 - 1217
  • [47] Distributed Private Key Generation for Identity Based Cryptosystems in Ad Hoc Networks
    Chan, Aldar C-F.
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2012, 1 (01) : 46 - 48
  • [48] Challenges and opportunities in biometric security: A survey
    Arora, Shefali
    Bhatia, M. P. S.
    INFORMATION SECURITY JOURNAL, 2022, 31 (01): : 28 - 48
  • [49] Security of Public-Key Cryptosystems Based on Chebyshev Polynomials Over Z/pkZ
    Yoshioka, Daisaburo
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2020, 67 (10) : 2204 - 2208
  • [50] Security of the cryptosystems based on ergodic matrices
    Huang, Hua-Wei
    Peng, Chang-Wen
    Qu, Yun-Yun
    Li, Chun-Hua
    Tongxin Xuebao/Journal on Communications, 2015, 36 (08):