Biometric key generation using crow algorithm

نویسندگان

چکیده

<p><span>The researchers have been exploring methods to use biometric characteristics of the user as a replacement for using unforgettable pass-word, in an attempt build robust cryptographic keys, because, human users detect difficulties call up long keys. Biometric recognition provides authentic solution authentication problem identity administration systems. With extensive utilization different applications, there is growing concern about confidentiality and security technologies. This paper proposes based key recreation scheme. Since ears are not correlated. Until now, encryption keys generated swarm intelligence approach. Collective simple groups autonomous agents emerged by intelligence. The crow search algorithm which known (CSA) new meta-intuitive method assembled intelligent group behavior crows. Despite that CSA demonstrates important features, its approach poses excessive challenges while faced with great multimodal formularization.</span></p>

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Biometric Key Generation Using Fingerprints

Article history: Received 25 April 2014 Received in revised form 8 May 2014 Accepted 20 May 2014 Available online 17 June 2014

متن کامل

Cryptographic Key Generation using Retina Biometric Parameter

Crypto Biometrics system is recently emerging as an effective process to generate a cryptographic key. Conventional cryptographic key generation is using password which can be guessed or cracked. Further, the large size of strong key results in delay while encryption / decryption. Biometric field has however emerged in the recent days to reduce process delay and enhances the level of accuracy. ...

متن کامل

Biometric Key Generation Using Pseudo-Signatures

Recent work has shown that biometric key generation using handwriting as input are susceptible to attacks based on generative models and population statistics. In this paper, we propose an approach for overcoming these vulnerabilities through the use of idiosyncratic “pseudosignatures.” We summarize the past work that led us to this notion, and describe a novel graphical user interface we have ...

متن کامل

Development of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals

Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...

متن کامل

Optimal Operation of CHP Combined Heat Generation Systems Using the Crow Search Optimization Algorithm

Energy efficiency of power plants is less than 60% However, the efficiency of the CHP units can be up to 90 %.CHP units in addition to high efficiency, They reduce environmental pollutants by 13 to 18 percent. The purpose of this thesis is to use the simultaneous power and power generation plants to reach the optimal economic destination for Genco And to maximize economic profit And to minimize...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science

سال: 2021

ISSN: ['2502-4752', '2502-4760']

DOI: https://doi.org/10.11591/ijeecs.v21.i1.pp208-214