Biometric System Using Cryptography: A Survey

نویسندگان

  • Anupam Baruah
  • Lakshmi Prasad Saikia
چکیده

In this paper, the biometric recognition for verification identification process and various cryptographic techniques for authentication purpose are discussed along with detailed review of literature. the main objective of this approach is to combine both cryptographic and biometric recognition to a system to provide high degree of security with protection against various attackers. Keywords— Biometrics, Cryptography, symmetric key encryption, asymmetric key encryption

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Development of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals

Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...

متن کامل

A Survey on Biometrics based Cryptographic Key Generation Schemes

Need for information security and privacy is increasing in recent times. Since several valuable data and files are stored in an organization server system and moreover personal information are being shared in WWW, the need for providing security and permitting only the authorized user is becoming indispensable. For this purpose, biometric authentication is used in several applications and it is...

متن کامل

Biometric Based Network Security Using MIPS Cryptography Processor

The empowerment in network on chip (NOC) and System on chip (SOC) in Microelectronics and Sensors have developed the various wireless communication Network technologies. In the past few years, many researchers have been focusing on building system architecture of network monitoring to improve the technical requirement specially designed for network security. Less research was found in providing...

متن کامل

Crytosystem for Computer security using Iris patterns and Hetro correlators

Biometric based cryptography system provides an efficient and secure data transmission as compare to the traditional encryption system. However, it is a computationally challenge task to solve the issues to incorporate biometric and cryptography. In connection with our previous works, this paper reveals a robust cryptosystem using iris biometric pattern as a crypto-key to resolve the issues in ...

متن کامل

Securing Database of Biometric Systems

In cyberspace security of private data is a prominent issue. Beside the reliable algorithm for automatic authentication, providing the security of the server database is considerable. In this paper a technique to secure the database of an iris-based biometric system is proposed. We employed visual cryptography, permutation and a block-based saving procedure to protect the template from maliciou...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015