A Biometric Approach to Encrypt a File with the Help of Session Key

نویسندگان

  • Sougata Das
  • Rahul Das
  • Ayan Mukherjee
چکیده

In this paper, we have employed “Face Recognition” technique with conventional session based authentication to provide a two layer security. Different features of a human face are used for authentication. Since this scheme uses biological characteristics, this is very difficult to forge. Additionally we will be using conventional session based authentication to provide a two layer security. This method of authentication can be used to grant access to a network, important files and documents. The main objective of this work is to provide a two layer authentication system through biometric (face) and conventional session based password authentication. The encryption key for this authentication will be generated with the combination of the biometric key [7] and session based password.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multibiometric Based Secure Encryption, Authentication Scheme with Fuzzy Extractor

Encryption and authentication schemes suffice for the security of information stored or exchanged by different parties, but secure key generation and distribution is a highly non-trivial matter in cryptography. Fuzzy extractor is a security primitive, which can be used to encrypt and authenticate a message using his biometric b to reproduce extraction of an almost uniformly key from non-uniform...

متن کامل

A Multifactor Security Protocol for Wireless Payment Secure Web Authentication Using Biometric Characteristics

This authentication technique uses a best approach for secure web transaction. It uses a Biometric property of user for authentication and SMS (Short Message Service) to enforce an extra security level along with the traditional Login/password system. Biometric properties are needed when a user wants a transaction then the user gives their fingerprint information. In this technique uses a encry...

متن کامل

Development of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals

Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...

متن کامل

Research of Biometric Key Generation Based on Fingerprint Bit - strings ⋆

Biometric key technology is the organic combination of biometric encryption technology and traditional cryptography. Biometric key can directly encrypt data or encrypt key, with the character of portable use and not easily being stolen, forgotten and broken. This article provides an algorithm for generating key based on the fingerprint feature bit-strings, extracting fingerprint feature informa...

متن کامل

Accessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets

In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013