A survey on biometric based crypto techniques

  • Authors

    • K Ruth Ramya
    • S Saahithi
    • T Gnaneswar
    • SD Afsar Jaha
    2018-03-18
    https://doi.org/10.14419/ijet.v7i2.7.12234
  • Attribute Based Encryption, Image Processing, Finger Prints, Palm Prints
  • The biometric based crypto techniques extract the features from grayscale images and use those features in encryption process i.e., key will be generated from extracted features. In attribute based crypto-systems attributes of the user like email, usernames etc.…will be treated as a public key. Secret key is associated with each attribute i.e. for email there will be a secret key and for username there will be another secret key. In biometric based crypto systems, an access policy is built from the extracted biometric features.

     

     

  • References

    1. [1] Identity Based Encryption - David Oswald.

      [2] Shamir, “Identity based crypto systems and schems†– Document.

      [3] J. Bethencourt, A. Sahai, and B. Waters, “Cipher text-policy attribute- based encryption,†IEEE.

      [4] Mr. Anup R. Nimje #1, Prof. V. T. Gaikwad*2, Prof. H. N. Datir^3 “Attribute - Based Encryption Techniques in Cloud Comp uting Security: An Overview†International Journal of Computer Trends and Technology - volume4Issue3 - 2013.

      [5] Zhibin Zhou, Member, IEEE Dijiang Huang, Senior Member, IEEE, and Zhijie Wang “Efficient Privacy-Preserving Ciphertext-Policy Attribute Based Encryption and Broadcast Encryptionâ€.

      [6] J. Katz, A. Sahai, and B. Waters, “Predicate encryption supporting disjunctions, polynomial equations, and inner products,â€

      [7] Rafail Ostrovsky, Amit Sahai,Brent Waters “Attribute based encryption with Non-Monotonic access structure.â€- eprint.iacr.org

      [8] Eric zaxahoni, Luis J. Dominguez, Shigeo Mitsunari, Ana H. Sanchez Ramirez, Tadanori Teruya-Henriquez, “Software implementation of Attribute based encryption schemeâ€- IEEE.

      [9] Chaohong WU, “Advanced feature extraction algorithms for automatic fingerprint recognition systemsâ€.

      [10] Asker M. Bazen, “Finger print feature extraction, matching & database searchâ€, - ist.psu.edu.

      [11] M.I. Sezan, “A peak detection algorithm and its application to histogram - based image data reductionâ€, Computer Vision, Graphics, and Image Processing 49 (1) (1990) 36 – 51.

      [12] Rosenfeld, P. de la Torre, “Histogram concavity analysis as an aid in threshold selectionâ€, IEEE Transactions on System, Man, and Cybernetics 13 (1983) 231 – 235.

      [13] T. Pavlidis, “Threshold selection using second derivatives of the gray - scale imageâ€, in: Proceedings of the ICDAR, 1993, pp. 274 – 277.

      [14] N. Otsu, “A thresholding selection method from gray - scale histogramâ€, IEEE Transactions on System, Man, and Cybernetics 9 (1979) 62 – 66.

      [15] Khurram Khurshid, Imran Siddiqi, Claudie Faure, Nicole Vincent, “Comparison of Niblack inspired Binarization methods for ancient documentsâ€, 16th International conference on Document Recognition and Retrieval, 2009.

      [16] J. Sauvola, T. Seppänen, S. Haapakoski, M. Pietikänen, “Adaptive document binarization†, Fourth International Conference Document Analysis and Recognition (ICDAR), p. 147 - 152, Ulm, Germany, August 1997.

      [17] Madhuri Latha, Chakravarthy, “An Improved B ernsen Algorithm Approaches for License Plate Recognitionâ€, IOSR Journal of Electronics and Communication Engineering (IOSR - JECE) ISSN: 2278 - 2834, ISBN: 2278 - 8735. Volume 3, Issue 4 (Sep - Oct. 2012).

      [18] Christian Holz, Frank R. Bentley [24], “On-Demand Biometrics: Fast Cross-Device Authentication†#chi4good, CHI 2016, San Jose, CA, USA

      [19] Mohammed Nasir Uddin, Selina Sharmin, Abu Hasnat Shohel Ahmedand Emrul Hasan, Shahadot Hossainand Muniruzzaman, “A Survey of Biometrics Security Systemâ€, IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.10, October 2011.

      [20] Shah Faisal Darwaish, Esmiralda Moradian,Tirdad Rahmani, Martin Knauer,“Biometric identification on android smartphones â€, 18th International Conference on Knowledge Based and Intelligent Information & Engineering Systems - KES2014.

      [21] Izem Hamouchene, Saliha Aouat, A New Texture Analysis Approach for Iris Recognition, 2014 AASRI Conference on Circuit and Signal Processing (CSP 2014).

      [22] Inass SH. Hussein and Md Jan Nordin, “Palmprint Verification using invariant moments based on wavelet transformâ€, Journal of Computer Science 10 (8): 1389-1396, 2014.

      [23] Hugh Wimberly, Lorie M. Liebrock , “Using Fingerprint Authentication to Reduce System Security: An Empirical Studyâ€, 2011 IEEE Symposium on Security and Privacy.

      [24] Dhiraj Sunehra, “Fingerprint Based Biometric ATM Authentication Systemâ€, International Journal of Engineering inventions.

      [25] Kumar Ankit and Jayaram Rekha, “Biometrics as a Cryptographic Method for Network Security â€, Indian Journal of Science and Technology, Vol 9(22), DOI: 10.17485/ijst/2016/v9i22/95288, June 2016

      [26] Sang-Hyeon Ryu and Hyoung-Gook Kim, “Speaker identification using voice-based cryptography for mobile VoIP secure voice communicationâ€, - IEEE

      [27] Sattar B. Sadkhan, Ali Al-Sherbaz, Rana S. Mohammed, “â€Chaos based cryptography for voice encryption in wireless communicationâ€, -IEEE

      [28] Musheer Ahmad, Bashir Alamand Omar Farooq, “Chaos based mixed keystream generation for voice data encryptionâ€.

      [29] Huang,W. Jia, D. Zhang, “Palmprint verification based on robust line orientation code,†Pattern Recognition, Science Direct, pp. 1504 – 1513, 2008.

      [30] S. M. Prasad, V.K. Govindan, P. S. Sathidevi, “Palmprint Authentication Using Fusion of Wavelet Based Representations,†IEEE, pp. 978-1-4244-5612-3, 2009.

      [31] J. Dai and J. Zhou, “Multi feature-Based High- Resolution Palmprint Recognition,†IEEE Transaction on Pattern Analysis and Machine Intelligence, Vol.33, No. 5, pp. 0162-8828, May 2011.

      [32] J. Dai, J. Feng, J. Zhou, “Robust and Efficient Ridge- Based Palmprint Matching,†IEEE Transaction on Pattern Analysis and Machine Intelligence, Vol.34, No. 8, pp. 0162-8828, August 2012

      [33] P.S. Sanjekar, “Palmprint Identification by Wavelet Transform,†Proc. Of international conf. on Image Processing and vision System, Vol 1, Oct 2011.

  • Downloads

  • How to Cite

    Ruth Ramya, K., Saahithi, S., Gnaneswar, T., & Afsar Jaha, S. (2018). A survey on biometric based crypto techniques. International Journal of Engineering & Technology, 7(2.7), 1091-1095. https://doi.org/10.14419/ijet.v7i2.7.12234