Securing Multiple Information Using Bio-Chaotic Keys

نویسندگان

چکیده

To advancement in security applications, for the first time, a bio-chaotic key generated from emerging biometric trait “finger knuckle print (FKP)” has been proposed data and authentication. In system, feasibility to generate multiple keys single FKP image exploited secure information, which results significant enhancement of strength. The encryption decryption processes keep user-specificity perform better reducing space storage transmission. research contribution is facilitate simplified optical implementation. Simulation show validity effectiveness scheme.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Four Keys to Securing Distributed Control Systems

This white paper presents an overview of industrial security requirements and the new security extensions to the Data Distribution Service (DDS) standard. Implemented as plug-ins, the security extensions introduce authentication, confidentiality and access control while still satisfying demanding reliability and performance requirements. A power grid use case shows how DDS Security can be easil...

متن کامل

Device-based Isolation for Securing Cryptographic Keys

In this work, we describe an effective device-based isolation approach for achieving data security. Device-based isolation leverages the proliferation of personal computing devices to provide strong run-time guarantees for the confidentiality of secrets. To demonstrate our isolation approach, we show its use in protecting the secrecy of highly sensitive data that is crucial to security operatio...

متن کامل

Securing UML Information Flow Using FlowUML

FlowUML is a logic-based system to validate information flow policies at the requirements specification phase of UML based designs. It uses Horn clauses to specify information flow polices that can be checked against flow information extracted from UML sequence diagrams. FlowUML policies can be written at a coarse grain level of caller-callee relationships or at a finer level involving passed a...

متن کامل

Title of dissertation : INFORMATION THEORETIC GENERATION OF MULTIPLE SECRET KEYS

Title of dissertation: INFORMATION THEORETIC GENERATION OF MULTIPLE SECRET KEYS Chunxuan Ye, Doctor of Philosophy, 2005 Dissertation directed by: Professor Prakash Narayan Department of Electrical and Computer Engineering and Institute for System Research This dissertation studies the problem of secret key generation for encrypted group communication in a network, based on an information theore...

متن کامل

Chaotic Memory Randomization for Securing Embedded Systems

Embedded systems permeate through nearly all aspects of modern society. From cars to refrigerators to nuclear refineries, securing these systems has never been more important. Intrusions, such as the Stuxnet malware which broke the centrifuges in Iran’s Natanz refinery, can be catastrophic to not only the infected systems, but even to the wellbeing of the surrounding population. Modern day prot...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Photonics Journal

سال: 2021

ISSN: ['1943-0655', '1943-0647']

DOI: https://doi.org/10.1109/jphot.2020.3047806