Authentication Methods Based on Digital Fingerprint Random Encryption IBC

نویسندگان

  • Changgeng Yu
  • Guixiong Liu
چکیده

Aiming at the problem of the storage and transmission security of fingerprint templates in datacenter computer monitoring system (DCRMS), an authentic method based on digital fingerprint random encryption IBC is proposed in this paper, combined with the feature of fingerprint vector encryption algorithms. The method is mainly based on fusion user’s fingerprint characteristic and asymmetric authentication technology which is to secure the implementation in DCRMS environment. The analysis about the safety of authentication scheme indicated that scheme can authenticate the users right legality, while the attacker can’t get users’ privacy information. It is difficult to find the solution in limited time. Users’ identification and fingerprint template is to be protected. The experimental results show that the false reject rate of the authentication system is 1.83% while its false acceptance rate is 0, and the average login time is 0.94 s.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Authentication protocol for fingerprint feature extraction and IBC in monitoring systems

Authentication methods based on biometric parameters are gaining importance over the years. But they require the storage and transmission security of fingerprint templates to perform this task. In this work an efficient method based on digital fingerprint random encryption IBC is introduced. The process works by user’s fingerprint feature and asymmetric authentication technology to security imp...

متن کامل

Digital holographic security system based on multiple biometrics

A new multiple biometrics based encryption technique using digital holographic security system has been proposed. In this method, a face image of an enrolled person can be spatially multiplexed by a phase mask. This phase mask has been generated by the fingerprint of the enrolled person. In order to overcome the problem of rotation and scaling of the fingerprint, the log polar transform of the ...

متن کامل

Encrypted Sensing Based on Digital Holography for Fingerprint Images

We propose a novel biometric sensing technique for personal authentication in which fingerprint images are captured using an optical encryption method. This method can reduce the risk of data theft or leakage of personal information captured by biometric sensing. This method, termed encrypted sensing, is implemented using digital holography with double random phase encoding. We demonstrate expe...

متن کامل

Biometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm

Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...

متن کامل

Practical Implementation of a Secure Email System Using Certificateless Cryptography and Domain Name System

Email is currently the most widely used communication system in daily life. To improve security and efficiency, most email systems adopt Public Key Infrastructure (PKI) as the mechanism to implement security, but PKI based systems suffer from expensive certificate management and problems in scalability. Identity Based Cryptography (IBC) is another method, but it has the inherent drawback of Key...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JSW

دوره 9  شماره 

صفحات  -

تاریخ انتشار 2014