Open Access Open Access  Restricted Access Subscription or Fee Access

Biometric based Network Video Security System with RSA Implementation

K. Sasi Rekha, C. Immaculate Mary

Abstract


Biometric is a method for uniquely identifying a person or verifying the identity of a person based on one or more physiological or behavioral traits. Since the biometric data that does not change over the course of the life, it is used as an effective authentication and access control measure. The RSA algorithm is widely used for encryption and authentication. RSA is an algorithm for public-key cryptography which increases security and convenience. It is the first algorithm known to be suitable for signing as well as encryption, and was one of the first great advances in public key cryptography. Fingerprints are one of many forms of biometrics used to identify individuals and verify their identity. The proposed Biometric-Crypto system generates a Cryptographic key from the fingerprints for Encrypting and decrypting the video file. If the Video file traverses via the Internet to reach a destination, it is susceptible to a number of attacks. A way to protect the video file is to encrypt the video file using RSA algorithm with the novel method of Biometric Fingerprint based Key Generation technique.

Keywords


Bio-metric Cryptosystem, Fingerprint, RSA, Video file.

Full Text:

PDF

References


Anil K. Jain, Ruud Bolle, Sharath Pankanti, “Biometrics: Personal identification in networked society”, Publisher: Kluwer Academic publisher; 4th edition (2002).

Jain, A. K. and Uludag, U. (2003), Hiding biometric data, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 25, no. 11, pp. 1494-1498.

“Biometrics”from http://en.wikipedia.org/wiki/Biometrics

“Generate a key for aes using biometric for voip network security” http://www.jatit.org/volumes/research-papers/Vol5No2/2Vol5No2.pdf

Paul Reid, “Biometrics for Network Security” Paul Reid Publisher: Prentice Hall PTR; 1st edition (2003) | ISBN-10: 0131015494.

Mark R. Hawthorne," Fingerprints: Analysis and Understanding”, CRC Press, 2008. [7] Proceso T. Tubid “Dactyloscopy: Science of Fingerprint Classification and Identification”.

William Stallings, “Technical Resource and Course Web Site for Cryptography and Network Security”, Third Edition.

Umut Uludag, Sharath Pankanti, Salil Prabhakar, Anil K.Jain, “Biometric Cryptosystems Issues and Challenges” Proceedings of the IEEE 2004.

“RSAAlgorithm”from http://en.wikipedia.org/wiki/RSA

Pravin M.Sonsare1, Shubhangi Sapkal2(2011) Stegano-CryptoSystem for Enhancing Biometric-Feature Security with RSA 2011 International Conference on Information and Network Technology IACSIT Press, Singapore 196 (sonsare@gmail.com) (91-9970083800)

Ross, A., Shah, J. and Jain, A. K. (2005), Towards reconstructing fingerprints form minutiae points, Proc. SPIE, Biometric Technology for Human Identification II, Vol. 5779, pp. 68-80, (Orlando, FL).

David Zhang, Anil K. Jain, “Advances in biometrics: international conference”, ICB 2006, Hong Kong, China.

“Image Enhancement for Fingerprint Minutiae-Based Algorithms Using CLAHE, Standard Deviation Analysis and Sliding Neighborhood”

www.iaeng.org/publication/.../WCECS2008_pp1199-1203.pdf

Prakash C. Gupta, “Data Communication and Computer Networks- Page 705.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.