PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Authentication scheme using novel chaff generation method in fuzzy vault

Wybrane pełne teksty z tego czasopisma
Identyfikatory
Warianty tytułu
Konferencja
The Second International Conference on Research in Intelligent and Computing in Engineering
Języki publikacji
EN
Abstrakty
EN
Key Management is the critical issue of a cryptographic system and it requires a better security mechanism. Bio-cryptology provides a strong solution for the said critical issue. Fuzzy vault scheme is a popular scheme to design bio-cryptosystems. Key is secured with the biometric data mixed up with some noise points known as chaff points in a secure storage i.e. vault. Generation of chaff points is the important part of the fuzzy vault system. This work is mainly aims to present an authentication scheme (Key matching) with reducing the complexities of chaff generation. In chaff generation, circle packing, geometrical hashing etc. techniques are used to protect the real data from the noisy data, but these techniques are complex. Here a novel method of chaff generation is used where newly generated chaff point compared with genuine points (stored in a dataset) to assure that it is different, hence genuine points are protected. Experimental results shows that our method have less complexity and performs better than other existent methods.
Rocznik
Tom
Strony
89--92
Opis fizyczny
Bibliogr. 9 poz., rys., tab., wykr.
Twórcy
  • Department of Computer Science & Engineering NIT Jamshedpur
autor
  • Department of Computer Science & Engineering NIT Jamshedpur
  • Department of Computer Science & Engineering NIT Jamshedpur
  • Department of Computer Science & Engineering NIT Jamshedpur
Bibliografia
  • 1. A. K. Jain, K. Nandakumar, and A. Ross., "50 Years of Biometric Research: Accomplishments, Challenges, and Opportunities", Pattern Recognition Letters, 2016.
  • 2. R. Hooda1 and M. Kaur, "Novel Chaff Generation for Fingerprint Fuzzy Vault ", British Journal of Mathematics & Computer Science, 2015, vol. 10 (3), pp. 1-9,
  • 3. T. H. Nguyen, Y. Wang, Y. Ha, and R. Li, “Improved chaff point generation for vault scheme in bio-cryptosystems,” IET Biometrics, 2013, vol. 2, no. 2, pp.48-55.
  • 4. Mohammad Khalil-Hani and Rabia Bakhteri, “Securing Cryptographic Key with Fuzzy Vault based on a new Chaff Generation Method” International Conference on High Performance Computing and Simulation (HPCS), 2010, pp. 259-265.
  • 5. S. Lee, D. Moon, Y. Chung, “Inserting chaff minutiae for the geometric hashing-based fuzzy fingerprint vault”, Journal of Information Science and Engineering, vol. 25, no. 4, pp. 1177-1190, 2009.
  • 6. Jason Jeffers and Arathi Arakala, “Minutiae Based Structures for a Fuzzy Vault,”in Biometric Symposium IEEE, RMIT University, Melbourne, 2006, pp. 1-6.
  • 7. K. Nandakumar, A. K.Jain, and S.Pankanti, "Fingerprint-based fuzzy vault: implementation and performance," IEEE Transactions on Information Forensics and Security, Vol. 2, No. 4, December 2007, pp. 744-757.
  • 8. S. Prabhakar, S. Pankanti, and A. Jain, “Biometric recognition: Security and privacy concerns,” IEEE Security and Privacy, 2003, Vol. 1, pp. 33-42.
  • 9. A. Juels, M. Sudan, “A Fuzzy Vault Scheme”, in IEEE International Symposium on Information Theory, p. 408, 2002.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-eac61157-b0c3-4d59-9502-20779dc78671
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.