Enhancing Security in Palm Print Recognition Systems Using Encryption Algorithms
نویسندگان
چکیده
Nowadays, the use of biometric characteristics (e.g., palmprints, irises, fingerprints) is incrementing for individual recognition and many applications of biometrics are already available. Biometrics recognition has many advantages over the traditionally used methods (e.g., password, smart card), because biometric characteristics cannot be shared or forgotten, as it is inherently associated with the individual. The main focus of Biometrics authentication system is on revocability, security, privacy, accuracy and privacy. In this fast developing communication world, one of the essential requirement is security of biometrics information. In this paper, a biometric authentication system with 2-way security is being proposed, which basically concerns with user’s privacy, network security, trust issues, template protection, and accuracy. Encryption of biometric details is done twice. That’s why; we called the system two way secured. None of the extra information is being disclosed to any unsafe network or any server’s database about the biometrics or user. Two different encryption algorithms are used at the client and server side. Modified version of RSA algorithm, i.e., RSA-2 algorithm is used at one side which is a public key cryptography and other encryption algorithm used is private key cryptography, 3DES algorithm. No restrictions are possessed on the biometric data used in the proposed approach and it is also applicable for different biometrics (palm print, face, iris, and finger print). An additional layer of security in authentication is being provided by using two way encryption schemes when compared with existing systems.
منابع مشابه
Improved Security Levels of Wireless LAN through DBSPS
Wireless Networks plays a vital role in the field of Information and Communication Technology (ICT). Security to the Wireless networks is a major challenge to the researchers and practitioners. Especially Wireless Local Area Networks are more prone to security threats. This work introduces a novel technique Double Bio-cryptic Security-aware Packet Scheduling (DBSPS) which strengthens security a...
متن کاملImproved Security Levels of WLAN through DBSPS
Wireless Networks plays a vital role in the field of Information and Communication Technology (ICT). Security to the Wireless networks is a major challenge to the researchers and practitioners. Especially Wireless Local Area Networks are more prone to security threats. This work introduces a novel technique Double Bio-cryptic Securityaware Packet Scheduling (DBSPS) which strengthens security as...
متن کاملIllumination Invariant Feature Extraction for Multispectral Palmprint Verification
The aim of biometrics is to identify humans from their personal traits more efficiently using devices, algorithms and procedures for applications that require security and authentication. Multispectral image analysis has gained importance due to its potential for accurate and faster recognition performance. In this paper, Multispectral palmprint biometric system is proposed which uses the fusio...
متن کاملPalm Print: A Biometric for Human Identification
As in today’s life security is main concern. So, a lot of researches are going in the field of security like password, security question, pattern matching and a very important approach is biometric security. So my work is to study about the palm print recognition to identify human. Palm print recognition system has proved its efficiency with many machine learning techniques like LBP, Repeated l...
متن کاملA Robust and Fast Computation Touchless Palm Print Recognition System Using LHEAT and the IFkNCN Classifier
Mobile implementation is a current trend in biometric design. This paper proposes a new approach to palm print recognition, in which smart phones are used to capture palm print images at a distance. A touchless system was developed because of public demand for privacy and sanitation. Robust hand tracking, image enhancement, and fast computation processing algorithms are required for effective t...
متن کامل