Open Access   Article Go Back

A Survey of Cancelable Biometric Based Key Generation Scheme using various Cryptography Techniques

K.N. Joshi1 , P. Chaudhari2

  1. Computer Engineering Department, LDRP - ITR, KSV, Gandhinagar, India.
  2. Computer Engineering Department, LDRP - ITR, KSV, Gandhinagar, India.

Section:Review Paper, Product Type: Journal Paper
Volume-6 , Issue-3 , Page no. 380-383, Mar-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i3.380383

Online published on Mar 30, 2018

Copyright © K.N. Joshi, P. Chaudhari . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: K.N. Joshi, P. Chaudhari, “A Survey of Cancelable Biometric Based Key Generation Scheme using various Cryptography Techniques,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.380-383, 2018.

MLA Style Citation: K.N. Joshi, P. Chaudhari "A Survey of Cancelable Biometric Based Key Generation Scheme using various Cryptography Techniques." International Journal of Computer Sciences and Engineering 6.3 (2018): 380-383.

APA Style Citation: K.N. Joshi, P. Chaudhari, (2018). A Survey of Cancelable Biometric Based Key Generation Scheme using various Cryptography Techniques. International Journal of Computer Sciences and Engineering, 6(3), 380-383.

BibTex Style Citation:
@article{Joshi_2018,
author = {K.N. Joshi, P. Chaudhari},
title = {A Survey of Cancelable Biometric Based Key Generation Scheme using various Cryptography Techniques},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2018},
volume = {6},
Issue = {3},
month = {3},
year = {2018},
issn = {2347-2693},
pages = {380-383},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1812},
doi = {https://doi.org/10.26438/ijcse/v6i3.380383}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i3.380383}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1812
TI - A Survey of Cancelable Biometric Based Key Generation Scheme using various Cryptography Techniques
T2 - International Journal of Computer Sciences and Engineering
AU - K.N. Joshi, P. Chaudhari
PY - 2018
DA - 2018/03/30
PB - IJCSE, Indore, INDIA
SP - 380-383
IS - 3
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
897 231 downloads 215 downloads
  
  
           

Abstract

Key management in cryptosystem has more security concerns. In traditional cryptosystem key is generated randomly and very difficult to remember. The keys generated from biometric features provide better option than traditional cryptographic key management techniques such as password based key generations. Cancelable biometric is a customized technique in biometric based cryptography, where Cancelable Biometric refers to the intentional and systematically repeatable distortion of biometric features in order to protect sensitive user-specific data. This paper presents the survey conducted for same of the cancelable biometric key generation techniques.

Key-Words / Index Term

Cryptographic Key Generation, Biometrics, Feature Extraction , Key Generation, Biometric cryptography

References

[1] Kodge B. G., "Information Security: A Review on Steganography with Cryptography for Secured Data Transaction", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.6, pp.1-4, 2017.
[2]Colin Soutar, Danny Roberge, Alex Stoianov, Rene Gilroy, and B.V.K. Vijaya Kumar,” Biometric Encryption” McGraw-Hill, (1999)
[3] Indu Verma, Sanjay Jain ,”Biometric based Key-Generation System for Multimedia Data Security”IEEE,2016
[4] A. Sharma, RS Thakur, S. Jaloree, "Investigation of Efficient Cryptic Algorithm for image files Encryption in Cloud", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.5, pp.5-11, 2016.
[5]https://researcher.watson.ibm.com/researcher/view_group_subpage.php?id=1914
[6]http://www.scholarpedia.org/article/Cancelable_biometrics
[7]Archana C. Lomte,”Biometric Fingerprint Authentication with Minutiae using Ridge Feature Extraction” International Conference on Pervasive Computing (ICPC) IEEE,2015
[8]Subhas Barman,Debasis Samanta, Samiran chattopadhyay “Revocable Key Generation From Irrevocable Biometric Data for Symmetric Cryptography”IEEE,2015
[9] Gaurangkumar Panchal, Debasis Samanta “Comparable Features and Same Cryptography Key Generation using Biometric Fingerprint Image ” International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB16) IEEE,2016
[10] Aditi Bhatega,Kapil Sharma,”Secure Cancelable Fingerprint key Generation”IEEE,2014
[11]Padma Polash Paul,Marina Gavrilova” Multimodal Cancelable Biometrics” Int. Conf. on Cognitive Informatics & Cognitive Computing (ICCI*CC’12),IEEE,2012