Open Access Open Access  Restricted Access Subscription or Fee Access

An Effective Symmetric Key Based Network Security Framework –Aided by Crypto Biometrics

K.H. Aparna, M.B. Shyjith

Abstract


This work addresses all the concerns in traditional crypto biometric systems such as privacy of biometrics, sharing of biometrics between communicating parties, generating revocable key from irrevocable biometric, unwanted processing of low quality inputs etc. It uses fingerprint as basic biometric and acquires it from sender and receiver simultaneously. This is processed and its quality is determined. Feature extraction is done for good quality input data and transformations are made on it on both sides, exchanged through a novel key base steganography. The templates are fused and shuffled thus providing a provision for revocability. Since neither the final cryptographic key nor the original fingerprint is being stored there is no need of any kind of database security. Processing time is substantially reduced by the filtering, thus advocating an important issue in all classical crypto biometric systems. It also throws light on to extending the work for multiple sender/receiver systems with the same kind of biometric bindings, safety and security.  

Keywords


Crypto Biometric System, Symmetric Key, Feature Extraction, Revocability, and Key Based Steganography

Full Text:

PDF

References


Subhas Barman, Debasis Samanta and Samiran Chattopadhyay, “Fingerprint-based crypto-biometric system for network security”, Springer open journal, April 2015.H. Simpson, Dumb Robots, 3rd ed., Springfield: UOS Press, 2004, pp.6-9.

Subhas Barman, Debasis Samanta and Samiran Chattopadhyay, “Fingerprint Based Symmetric Cryptography”, IEEE High performance computing and applications(ICHPCA) International conference on 22-24 dec 2014.

LinLin Shen, Alex Kot and WaiMun Koo, “Quality measures of fingerprint images”, in proc. Audio video based person Authentication , 2001, pp 266-271, Springer open journal.B. Simpson, et al, “Title of paper goes here if known,” unpublished.

Ratha and Bolle, “Fingerprint Image Quality Estimation”, pp 819-823, ACCV 2000.

V Lokeswara Reddy, A Subramanyam, P Chenna Reddy, “Implementation of LSB Steganography and its Evaluation for Various File Formats”. Int. J. Adv. Netw. Appl. 02(05), 868–872 (2011).M. Young, The Technical Writer’s Handbook, Mill Valley, CA: University Science, 1989.

NK Ratha, S Chikkerur, JH Connell, RM Bolle, “Generating Cancellable Fingerprint Templates”, IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 561–572 (2007).

S.R.Soruba Sree, Dr. N.Radha. “A Survey on Fusion Techniques for Multimodal Biometric Identification”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 2, Issue 12, December 2014.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.