A survey on biometric based crypto techniques
-
2018-03-18 https://doi.org/10.14419/ijet.v7i2.7.12234 -
Attribute Based Encryption, Image Processing, Finger Prints, Palm Prints -
The biometric based crypto techniques extract the features from grayscale images and use those features in encryption process i.e., key will be generated from extracted features. In attribute based crypto-systems attributes of the user like email, usernames etc.…will be treated as a public key. Secret key is associated with each attribute i.e. for email there will be a secret key and for username there will be another secret key. In biometric based crypto systems, an access policy is built from the extracted biometric features.
Â
Â
-
References
[1] Identity Based Encryption - David Oswald.
[2] Shamir, “Identity based crypto systems and schems†– Document.
[3] J. Bethencourt, A. Sahai, and B. Waters, “Cipher text-policy attribute- based encryption,†IEEE.
[4] Mr. Anup R. Nimje #1, Prof. V. T. Gaikwad*2, Prof. H. N. Datir^3 “Attribute - Based Encryption Techniques in Cloud Comp uting Security: An Overview†International Journal of Computer Trends and Technology - volume4Issue3 - 2013.
[5] Zhibin Zhou, Member, IEEE Dijiang Huang, Senior Member, IEEE, and Zhijie Wang “Efficient Privacy-Preserving Ciphertext-Policy Attribute Based Encryption and Broadcast Encryptionâ€.
[6] J. Katz, A. Sahai, and B. Waters, “Predicate encryption supporting disjunctions, polynomial equations, and inner products,â€
[7] Rafail Ostrovsky, Amit Sahai,Brent Waters “Attribute based encryption with Non-Monotonic access structure.â€- eprint.iacr.org
[8] Eric zaxahoni, Luis J. Dominguez, Shigeo Mitsunari, Ana H. Sanchez Ramirez, Tadanori Teruya-Henriquez, “Software implementation of Attribute based encryption schemeâ€- IEEE.
[9] Chaohong WU, “Advanced feature extraction algorithms for automatic fingerprint recognition systemsâ€.
[10] Asker M. Bazen, “Finger print feature extraction, matching & database searchâ€, - ist.psu.edu.
[11] M.I. Sezan, “A peak detection algorithm and its application to histogram - based image data reductionâ€, Computer Vision, Graphics, and Image Processing 49 (1) (1990) 36 – 51.
[12] Rosenfeld, P. de la Torre, “Histogram concavity analysis as an aid in threshold selectionâ€, IEEE Transactions on System, Man, and Cybernetics 13 (1983) 231 – 235.
[13] T. Pavlidis, “Threshold selection using second derivatives of the gray - scale imageâ€, in: Proceedings of the ICDAR, 1993, pp. 274 – 277.
[14] N. Otsu, “A thresholding selection method from gray - scale histogramâ€, IEEE Transactions on System, Man, and Cybernetics 9 (1979) 62 – 66.
[15] Khurram Khurshid, Imran Siddiqi, Claudie Faure, Nicole Vincent, “Comparison of Niblack inspired Binarization methods for ancient documentsâ€, 16th International conference on Document Recognition and Retrieval, 2009.
[16] J. Sauvola, T. Seppänen, S. Haapakoski, M. Pietikänen, “Adaptive document binarization†, Fourth International Conference Document Analysis and Recognition (ICDAR), p. 147 - 152, Ulm, Germany, August 1997.
[17] Madhuri Latha, Chakravarthy, “An Improved B ernsen Algorithm Approaches for License Plate Recognitionâ€, IOSR Journal of Electronics and Communication Engineering (IOSR - JECE) ISSN: 2278 - 2834, ISBN: 2278 - 8735. Volume 3, Issue 4 (Sep - Oct. 2012).
[18] Christian Holz, Frank R. Bentley [24], “On-Demand Biometrics: Fast Cross-Device Authentication†#chi4good, CHI 2016, San Jose, CA, USA
[19] Mohammed Nasir Uddin, Selina Sharmin, Abu Hasnat Shohel Ahmedand Emrul Hasan, Shahadot Hossainand Muniruzzaman, “A Survey of Biometrics Security Systemâ€, IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.10, October 2011.
[20] Shah Faisal Darwaish, Esmiralda Moradian,Tirdad Rahmani, Martin Knauer,“Biometric identification on android smartphones â€, 18th International Conference on Knowledge Based and Intelligent Information & Engineering Systems - KES2014.
[21] Izem Hamouchene, Saliha Aouat, A New Texture Analysis Approach for Iris Recognition, 2014 AASRI Conference on Circuit and Signal Processing (CSP 2014).
[22] Inass SH. Hussein and Md Jan Nordin, “Palmprint Verification using invariant moments based on wavelet transformâ€, Journal of Computer Science 10 (8): 1389-1396, 2014.
[23] Hugh Wimberly, Lorie M. Liebrock , “Using Fingerprint Authentication to Reduce System Security: An Empirical Studyâ€, 2011 IEEE Symposium on Security and Privacy.
[24] Dhiraj Sunehra, “Fingerprint Based Biometric ATM Authentication Systemâ€, International Journal of Engineering inventions.
[25] Kumar Ankit and Jayaram Rekha, “Biometrics as a Cryptographic Method for Network Security â€, Indian Journal of Science and Technology, Vol 9(22), DOI: 10.17485/ijst/2016/v9i22/95288, June 2016
[26] Sang-Hyeon Ryu and Hyoung-Gook Kim, “Speaker identification using voice-based cryptography for mobile VoIP secure voice communicationâ€, - IEEE
[27] Sattar B. Sadkhan, Ali Al-Sherbaz, Rana S. Mohammed, “â€Chaos based cryptography for voice encryption in wireless communicationâ€, -IEEE
[28] Musheer Ahmad, Bashir Alamand Omar Farooq, “Chaos based mixed keystream generation for voice data encryptionâ€.
[29] Huang,W. Jia, D. Zhang, “Palmprint verification based on robust line orientation code,†Pattern Recognition, Science Direct, pp. 1504 – 1513, 2008.
[30] S. M. Prasad, V.K. Govindan, P. S. Sathidevi, “Palmprint Authentication Using Fusion of Wavelet Based Representations,†IEEE, pp. 978-1-4244-5612-3, 2009.
[31] J. Dai and J. Zhou, “Multi feature-Based High- Resolution Palmprint Recognition,†IEEE Transaction on Pattern Analysis and Machine Intelligence, Vol.33, No. 5, pp. 0162-8828, May 2011.
[32] J. Dai, J. Feng, J. Zhou, “Robust and Efficient Ridge- Based Palmprint Matching,†IEEE Transaction on Pattern Analysis and Machine Intelligence, Vol.34, No. 8, pp. 0162-8828, August 2012
[33] P.S. Sanjekar, “Palmprint Identification by Wavelet Transform,†Proc. Of international conf. on Image Processing and vision System, Vol 1, Oct 2011.
-
How to Cite
Ruth Ramya, K., Saahithi, S., Gnaneswar, T., & Afsar Jaha, S. (2018). A survey on biometric based crypto techniques. International Journal of Engineering & Technology, 7(2.7), 1091-1095. https://doi.org/10.14419/ijet.v7i2.7.12234