Biometric key generation using crow algorithm
نویسندگان
چکیده
<p><span>The researchers have been exploring methods to use biometric characteristics of the user as a replacement for using unforgettable pass-word, in an attempt build robust cryptographic keys, because, human users detect difficulties call up long keys. Biometric recognition provides authentic solution authentication problem identity administration systems. With extensive utilization different applications, there is growing concern about confidentiality and security technologies. This paper proposes based key recreation scheme. Since ears are not correlated. Until now, encryption keys generated swarm intelligence approach. Collective simple groups autonomous agents emerged by intelligence. The crow search algorithm which known (CSA) new meta-intuitive method assembled intelligent group behavior crows. Despite that CSA demonstrates important features, its approach poses excessive challenges while faced with great multimodal formularization.</span></p>
منابع مشابه
Biometric Key Generation Using Fingerprints
Article history: Received 25 April 2014 Received in revised form 8 May 2014 Accepted 20 May 2014 Available online 17 June 2014
متن کاملCryptographic Key Generation using Retina Biometric Parameter
Crypto Biometrics system is recently emerging as an effective process to generate a cryptographic key. Conventional cryptographic key generation is using password which can be guessed or cracked. Further, the large size of strong key results in delay while encryption / decryption. Biometric field has however emerged in the recent days to reduce process delay and enhances the level of accuracy. ...
متن کاملBiometric Key Generation Using Pseudo-Signatures
Recent work has shown that biometric key generation using handwriting as input are susceptible to attacks based on generative models and population statistics. In this paper, we propose an approach for overcoming these vulnerabilities through the use of idiosyncratic “pseudosignatures.” We summarize the past work that led us to this notion, and describe a novel graphical user interface we have ...
متن کاملDevelopment of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals
Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...
متن کاملOptimal Operation of CHP Combined Heat Generation Systems Using the Crow Search Optimization Algorithm
Energy efficiency of power plants is less than 60% However, the efficiency of the CHP units can be up to 90 %.CHP units in addition to high efficiency, They reduce environmental pollutants by 13 to 18 percent. The purpose of this thesis is to use the simultaneous power and power generation plants to reach the optimal economic destination for Genco And to maximize economic profit And to minimize...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science
سال: 2021
ISSN: ['2502-4752', '2502-4760']
DOI: https://doi.org/10.11591/ijeecs.v21.i1.pp208-214