A Novel Data Encryption Technique By Genetic Crossover Of Robust Biometric Key And Session Based Password
نویسندگان
چکیده
منابع مشابه
A Novel Data Encryption Technique by Genetic Crossover of Robust Biometric Key and Session Based Password
In Fingerprint based Biometric authentication image of the fingerprint can be scanned and can be used later on for the purpose of authentication. So this process does not provide very high security. This paper proposes another level of security by using the concept of combined key. The key is obtained by crossing over of the Session key generated from the password given by the legitimate user a...
متن کاملA Novel Data Encryption Technique by Genetic Crossover of Robust Finger Print Based Key and Handwritten Signature Key
Unimodal biometric systems have to contend with a variety of problems such as noisy data, intra-class variations, restricted degrees of freedom, non-universality; phishing attacks spoof attacks, and high false acceptance rates. In order for the biometrics to be ultra-secure and to provide more-than-average accuracy, more then one form of biometric identification is required. Hence some of these...
متن کاملA Novel Image Encryption Model Based on Hybridization of Genetic Algorithm, Chaos Theory and Lattice Map
Encryption is an important issue in information security which is usually provided using a reversible mathematical model. Digital image as a most frequently used digital product needs special encryption algorithms. This paper presents a new encryption algorithm high security for digital gray images using genetic algorithm and Lattice Map function. At the first the initial value of Logistic Map ...
متن کاملGenerate an Encryption Key by using Biometric Cryptosystems to secure transferring of Data over a Network
Our modern day era faces an inevitable problem of securing our most integrated data and messages. The chief problem is to protect our data in a unique way that could only be worked upon by the sender and the recipient. Most of the traditional techniques probably in-use today, emphasizes on keys that are generated by generic function, algorithms or in random key generators. But question remains ...
متن کاملPassword-Based Encryption Analyzed
The use of passwords in security protocols is particularly delicate because of the possibility of off-line guessing attacks. We study password-based protocols in the context of a recent line of research that aims to justify symbolic models in terms of more concrete, computational ones. We offer two models for reasoning about the concurrent use of symmetric, asymmetric, and passwordbased encrypt...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Network Security & Its Applications
سال: 2011
ISSN: 0975-2307
DOI: 10.5121/ijnsa.2011.3209