Effective Cryptosystem Scheme Using Biometric Template
International Journal of Emerging Trends in Science and Technology,
Vol. 1 No. 05 (2014),
1 July 2014
Abstract
Abstract—Nowadays security is an important issue. Encryption and Decryption is a technique to ensure the security. Having secure and reliable means for communicating with videos and images is becoming a very necessity and its issues must be carefully considered. Hence, network security and data encryption have become important. Nowadays the images and videos are the most usable forms of encryption. There are two types of applications for information transmission over the Internet. The first ones are the online applications and next ones are the web pages, which consider the speed and security respectively as the main issue. In this thesis, encryption algorithms that can fulfil the requirements of these two applications were studied, and were adjusted to meet the requirements of image encryption by using the bio-metric template i.e. palm print. Bio-metric authentication systems are widely used in order to provide authentication without possessing any physical materials. Bio-metric authentication systems are mainly concentrating on security, privacy, and accuracy. In this thesis, propose a provably two way secured biometric authentication system, which concerns of user’s privacy, protection, trust issues, network security, and accuracy. The two way secured means, biometric details are going to be encrypted twice i.e. double encryption. In this system two different encryption algorithms have been used. One is private key cryptography another one is public key cryptography. Authentication by using two way encryption will give additional security when comparing with existing system
Â
Index Terms— Biometric, Image encryption and decryption, Image processing, Palm print.
Â
How to Cite
Download Citation
References
Biometric Security Concerns CESG UK Biometric Working Group, Tech. Rep., 2003 [Online]Available:http://www.cesg.gov.uk/policy_technologies/biometrics/media/biometricsecurityconcerns.pdf, Retrieved Oct., 2008
S. Prabhakar, S. Pankanti, and A. K. Jain, “Biometric recognition: Security and privacy concerns,†IEEE Security Privacy Mag., vol. 1, no. 2, pp. 33–42, Mar./Apr. 2003.
E. Mordini, “Biometrics, human body and medicine: A controversial history,†in Ethical, Legal and Social Issues in Medical Informatics, P. Duquenoy, C.George, andK.Kimppa, Eds. Hershey, PA: Idea Group Inc., 2008, pp. 249–272.
R. Cappelli, A. Lumini, D. Maio, and D. Maltoni, “Fingerprint image reconstruction from standard templates,†IEEE Trans. PAMI, vol. 29, no. 9, pp. 1489–1503, Sep. 2007.
A. K. Jain, K. Nandakumar, and A. Nagar, “Biometric template security,†Special Issue on Biometrics, EURASIP J. Adv. Signal Process., pp. 1–17, Jan. 2008.
C.S. Laih, and K. Y. Chen, "Generating visible RSA public keys for PKI",InternationalJournal of Information Security, Vol. 2, No. 2, Springer-Verlag, Berlin, (2004), pp. 103-109.
S.S.Maniccam, N.G. Bourbakis, “Losslessimage compression and encryption using SCANâ€,Pattern Recognition 34 (2001), 1229-1245
X.Y. Jing and D. Zhang, “A face and palmprint recognition approach based on discriminant DCT feature extractionâ€, IEEE Transactions on Systems, Man, and Cybernetics Part B: Cybernetics, vol. 34, no. 6, pp. 2405-2415, 2004.
L.S. Penrose, “Fingerprints and palmistryâ€, The Lancet, vol. 301, no 7814, pp. 1239- 1242, 1973.
I.Ozturk, and I. Sogukpinar, "Analysis and Comparison of Image EncryptioAlgorithms", International Journal of Information Technology, Vol. 1, No. 2, (2005), pp. 64-67.
D. Zhang and W. Shu. Two novel characteristics in palm print verification: Datum point invariance and line feature matching. Pattern Recognition, 32(4):691{702, 1999}.
- Article Viewed: 49 Total Download