Securing Multiple Information Using Bio-Chaotic Keys
نویسندگان
چکیده
To advancement in security applications, for the first time, a bio-chaotic key generated from emerging biometric trait “finger knuckle print (FKP)” has been proposed data and authentication. In system, feasibility to generate multiple keys single FKP image exploited secure information, which results significant enhancement of strength. The encryption decryption processes keep user-specificity perform better reducing space storage transmission. research contribution is facilitate simplified optical implementation. Simulation show validity effectiveness scheme.
منابع مشابه
Four Keys to Securing Distributed Control Systems
This white paper presents an overview of industrial security requirements and the new security extensions to the Data Distribution Service (DDS) standard. Implemented as plug-ins, the security extensions introduce authentication, confidentiality and access control while still satisfying demanding reliability and performance requirements. A power grid use case shows how DDS Security can be easil...
متن کاملDevice-based Isolation for Securing Cryptographic Keys
In this work, we describe an effective device-based isolation approach for achieving data security. Device-based isolation leverages the proliferation of personal computing devices to provide strong run-time guarantees for the confidentiality of secrets. To demonstrate our isolation approach, we show its use in protecting the secrecy of highly sensitive data that is crucial to security operatio...
متن کاملSecuring UML Information Flow Using FlowUML
FlowUML is a logic-based system to validate information flow policies at the requirements specification phase of UML based designs. It uses Horn clauses to specify information flow polices that can be checked against flow information extracted from UML sequence diagrams. FlowUML policies can be written at a coarse grain level of caller-callee relationships or at a finer level involving passed a...
متن کاملTitle of dissertation : INFORMATION THEORETIC GENERATION OF MULTIPLE SECRET KEYS
Title of dissertation: INFORMATION THEORETIC GENERATION OF MULTIPLE SECRET KEYS Chunxuan Ye, Doctor of Philosophy, 2005 Dissertation directed by: Professor Prakash Narayan Department of Electrical and Computer Engineering and Institute for System Research This dissertation studies the problem of secret key generation for encrypted group communication in a network, based on an information theore...
متن کاملChaotic Memory Randomization for Securing Embedded Systems
Embedded systems permeate through nearly all aspects of modern society. From cars to refrigerators to nuclear refineries, securing these systems has never been more important. Intrusions, such as the Stuxnet malware which broke the centrifuges in Iran’s Natanz refinery, can be catastrophic to not only the infected systems, but even to the wellbeing of the surrounding population. Modern day prot...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Photonics Journal
سال: 2021
ISSN: ['1943-0655', '1943-0647']
DOI: https://doi.org/10.1109/jphot.2020.3047806