Network Security Using Biometric and Cryptography

被引:0
|
作者
Dutta, Sandip [1 ]
Kar, Avijit [1 ]
Mahanti, N. C. [1 ]
Chatterji, B. N. [1 ]
机构
[1] Birla Inst Technol, Dept Comp Sci & Engn, Ranchi 835215, Bihar, India
关键词
DES; MD5; Biometric; Cryptography; Watermarking;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We propose a biometrics-based (fingerprint) Encryption / Decryption Scheme, in which unique key is generated using partial portion of combined sender's and receiver's fingerprints. From this unique key a random sequence is generated, which is used as an asymmetric key for both Encryption and Decryption. Above unique Key is send by the sender after Watermaking it in sender's fingerprint along with Encrypted Message. The computational requirement and network security features are addressed. Proposed system has a advantage that for public key, it has not to search from a database and security is maintained.
引用
收藏
页码:38 / 44
页数:7
相关论文
共 50 条
  • [1] Quantum Cryptography Based Biometric Encryption for Network Security
    Rani, Anju
    Lal, Avanindra Kumar
    Sharma, Shalini
    Banda, Latha
    Pandit, Amit Kant
    [J]. 2013 INTERNATIONAL CONFERENCE ON MACHINE INTELLIGENCE AND RESEARCH ADVANCEMENT (ICMIRA 2013), 2013, : 63 - 67
  • [2] A Model for Biometric Security using Visual Cryptography
    Gupta, Himanshu
    Sharma, Nupur
    [J]. 2016 5TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO), 2016, : 328 - 332
  • [3] Iris Biometric Security using Watermarking and Visual Cryptography
    Swathi, B.
    Kumari, T. Madhavi
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON POWER, CONTROL, SIGNALS AND INSTRUMENTATION ENGINEERING (ICPCSI), 2017, : 1218 - 1220
  • [4] Improvement of existing security system by using Elliptic Curve and Biometric Cryptography
    Rathi, Anu
    Rathi, Divya
    Astya, Rani
    Nand, Parma
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 994 - 998
  • [5] NETWORK SECURITY USING LATTICE BASED CRYPTOGRAPHY
    Singhla, Sonal
    Yadav, Shailja
    Tanwar, Rohit
    [J]. IIOAB JOURNAL, 2019, 10 (02) : 66 - 71
  • [6] Advanced Network Security using Cryptography and Steganography
    Pandey, Jay Kumar
    Kushwaha, Amit
    Srivastava, Vibha
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, COMMUNICATION AND ENERGY CONSERVATION INCACEC 2009 VOL 1, 2009, : 326 - 331
  • [7] Service Layer Security Architecture for IOT Using Biometric Authentication and Cryptography Technique
    Sharma, Santosh Kumar
    Khuntia, Bonomali
    [J]. INTELLIGENT MANUFACTURING AND ENERGY SUSTAINABILITY, ICIMES 2019, 2020, 169 : 827 - 837
  • [8] Cancelable Biometric Template Security Using Segment-Based Visual Cryptography
    Punithavathi, P.
    Geetha, S.
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTER VISION AND IMAGE PROCESSING, CVIP 2016, VOL 1, 2017, 459 : 511 - 521
  • [9] Advanced Biometric Home Security System using Digital Signature and DNA cryptography
    Mathew, Sheryl
    Saranya, G.
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON INNOVATIONS IN GREEN ENERGY AND HEALTHCARE TECHNOLOGIES (IGEHT), 2017,
  • [10] A Novel Security Architecture for Biometric Templates Using Visual Cryptography and Chaotic Image Encryption
    James, Divya
    Philip, Mintu
    [J]. ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS, 2012, 305 : 239 - 246