A survey on biometric based crypto techniques
-
2018-03-18 https://doi.org/10.14419/ijet.v7i2.7.12234 -
Attribute Based Encryption, Image Processing, Finger Prints, Palm Prints -
Abstract
The biometric based crypto techniques extract the features from grayscale images and use those features in encryption process i.e., key will be generated from extracted features. In attribute based crypto-systems attributes of the user like email, usernames etc.…will be treated as a public key. Secret key is associated with each attribute i.e. for email there will be a secret key and for username there will be another secret key. In biometric based crypto systems, an access policy is built from the extracted biometric features.
Â
Â
-
References
[1] Identity Based Encryption - David Oswald.
[2] Shamir, “Identity based crypto systems and schems†– Document.
[3] J. Bethencourt, A. Sahai, and B. Waters, “Cipher text-policy attribute- based encryption,†IEEE.
[4] Mr. Anup R. Nimje #1, Prof. V. T. Gaikwad*2, Prof. H. N. Datir^3 “Attribute - Based Encryption Techniques in Cloud Comp uting Security: An Overview†International Journal of Computer Trends and Technology - volume4Issue3 - 2013.
[5] Zhibin Zhou, Member, IEEE Dijiang Huang, Senior Member, IEEE, and Zhijie Wang “Efficient Privacy-Preserving Ciphertext-Policy Attribute Based Encryption and Broadcast Encryptionâ€.
[6] J. Katz, A. Sahai, and B. Waters, “Predicate encryption supporting disjunctions, polynomial equations, and inner products,â€
[7] Rafail Ostrovsky, Amit Sahai,Brent Waters “Attribute based encryption with Non-Monotonic access structure.â€- eprint.iacr.org
[8] Eric zaxahoni, Luis J. Dominguez, Shigeo Mitsunari, Ana H. Sanchez Ramirez, Tadanori Teruya-Henriquez, “Software implementation of Attribute based encryption schemeâ€- IEEE.
[9] Chaohong WU, “Advanced feature extraction algorithms for automatic fingerprint recognition systemsâ€.
[10] Asker M. Bazen, “Finger print feature extraction, matching & database searchâ€, - ist.psu.edu.
[11] M.I. Sezan, “A peak detection algorithm and its application to histogram - based image data reductionâ€, Computer Vision, Graphics, and Image Processing 49 (1) (1990) 36 – 51.
[12] Rosenfeld, P. de la Torre, “Histogram concavity analysis as an aid in threshold selectionâ€, IEEE Transactions on System, Man, and Cybernetics 13 (1983) 231 – 235.
[13] T. Pavlidis, “Threshold selection using second derivatives of the gray - scale imageâ€, in: Proceedings of the ICDAR, 1993, pp. 274 – 277.
[14] N. Otsu, “A thresholding selection method from gray - scale histogramâ€, IEEE Transactions on System, Man, and Cybernetics 9 (1979) 62 – 66.
[15] Khurram Khurshid, Imran Siddiqi, Claudie Faure, Nicole Vincent, “Comparison of Niblack inspired Binarization methods for ancient documentsâ€, 16th International conference on Document Recognition and Retrieval, 2009.
[16] J. Sauvola, T. Seppänen, S. Haapakoski, M. Pietikänen, “Adaptive document binarization†, Fourth International Conference Document Analysis and Recognition (ICDAR), p. 147 - 152, Ulm, Germany, August 1997.
[17] Madhuri Latha, Chakravarthy, “An Improved B ernsen Algorithm Approaches for License Plate Recognitionâ€, IOSR Journal of Electronics and Communication Engineering (IOSR - JECE) ISSN: 2278 - 2834, ISBN: 2278 - 8735. Volume 3, Issue 4 (Sep - Oct. 2012).
[18] Christian Holz, Frank R. Bentley [24], “On-Demand Biometrics: Fast Cross-Device Authentication†#chi4good, CHI 2016, San Jose, CA, USA
[19] Mohammed Nasir Uddin, Selina Sharmin, Abu Hasnat Shohel Ahmedand Emrul Hasan, Shahadot Hossainand Muniruzzaman, “A Survey of Biometrics Security Systemâ€, IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.10, October 2011.
[20] Shah Faisal Darwaish, Esmiralda Moradian,Tirdad Rahmani, Martin Knauer,“Biometric identification on android smartphones â€, 18th International Conference on Knowledge Based and Intelligent Information & Engineering Systems - KES2014.
[21] Izem Hamouchene, Saliha Aouat, A New Texture Analysis Approach for Iris Recognition, 2014 AASRI Conference on Circuit and Signal Processing (CSP 2014).
[22] Inass SH. Hussein and Md Jan Nordin, “Palmprint Verification using invariant moments based on wavelet transformâ€, Journal of Computer Science 10 (8): 1389-1396, 2014.
[23] Hugh Wimberly, Lorie M. Liebrock , “Using Fingerprint Authentication to Reduce System Security: An Empirical Studyâ€, 2011 IEEE Symposium on Security and Privacy.
[24] Dhiraj Sunehra, “Fingerprint Based Biometric ATM Authentication Systemâ€, International Journal of Engineering inventions.
[25] Kumar Ankit and Jayaram Rekha, “Biometrics as a Cryptographic Method for Network Security â€, Indian Journal of Science and Technology, Vol 9(22), DOI: 10.17485/ijst/2016/v9i22/95288, June 2016
[26] Sang-Hyeon Ryu and Hyoung-Gook Kim, “Speaker identification using voice-based cryptography for mobile VoIP secure voice communicationâ€, - IEEE
[27] Sattar B. Sadkhan, Ali Al-Sherbaz, Rana S. Mohammed, “â€Chaos based cryptography for voice encryption in wireless communicationâ€, -IEEE
[28] Musheer Ahmad, Bashir Alamand Omar Farooq, “Chaos based mixed keystream generation for voice data encryptionâ€.
[29] Huang,W. Jia, D. Zhang, “Palmprint verification based on robust line orientation code,†Pattern Recognition, Science Direct, pp. 1504 – 1513, 2008.
[30] S. M. Prasad, V.K. Govindan, P. S. Sathidevi, “Palmprint Authentication Using Fusion of Wavelet Based Representations,†IEEE, pp. 978-1-4244-5612-3, 2009.
[31] J. Dai and J. Zhou, “Multi feature-Based High- Resolution Palmprint Recognition,†IEEE Transaction on Pattern Analysis and Machine Intelligence, Vol.33, No. 5, pp. 0162-8828, May 2011.
[32] J. Dai, J. Feng, J. Zhou, “Robust and Efficient Ridge- Based Palmprint Matching,†IEEE Transaction on Pattern Analysis and Machine Intelligence, Vol.34, No. 8, pp. 0162-8828, August 2012
[33] P.S. Sanjekar, “Palmprint Identification by Wavelet Transform,†Proc. Of international conf. on Image Processing and vision System, Vol 1, Oct 2011.
-
Downloads
-
How to Cite
Ruth Ramya, K., Saahithi, S., Gnaneswar, T., & Afsar Jaha, S. (2018). A survey on biometric based crypto techniques. International Journal of Engineering & Technology, 7(2.7), 1091-1095. https://doi.org/10.14419/ijet.v7i2.7.12234Received date: 2018-04-27
Accepted date: 2018-04-27
Published date: 2018-03-18