A Survey on Secure Crypto-Biometric System using Blind Authentication Technique
A.S. Naik1 , S.M. Metagar2 , P.D. Hasalkar3
Section:Survey Paper, Product Type: Journal Paper
Volume-2 ,
Issue-5 , Page no. 93-97, May-2014
Online published on May 31, 2014
Copyright © A.S. Naik , S.M. Metagar, P.D. Hasalkar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: A.S. Naik , S.M. Metagar, P.D. Hasalkar , “A Survey on Secure Crypto-Biometric System using Blind Authentication Technique,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.93-97, 2014.
MLA Style Citation: A.S. Naik , S.M. Metagar, P.D. Hasalkar "A Survey on Secure Crypto-Biometric System using Blind Authentication Technique." International Journal of Computer Sciences and Engineering 2.5 (2014): 93-97.
APA Style Citation: A.S. Naik , S.M. Metagar, P.D. Hasalkar , (2014). A Survey on Secure Crypto-Biometric System using Blind Authentication Technique. International Journal of Computer Sciences and Engineering, 2(5), 93-97.
BibTex Style Citation:
@article{Naik_2014,
author = {A.S. Naik , S.M. Metagar, P.D. Hasalkar },
title = {A Survey on Secure Crypto-Biometric System using Blind Authentication Technique},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2014},
volume = {2},
Issue = {5},
month = {5},
year = {2014},
issn = {2347-2693},
pages = {93-97},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=165},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=165
TI - A Survey on Secure Crypto-Biometric System using Blind Authentication Technique
T2 - International Journal of Computer Sciences and Engineering
AU - A.S. Naik , S.M. Metagar, P.D. Hasalkar
PY - 2014
DA - 2014/05/31
PB - IJCSE, Indore, INDIA
SP - 93-97
IS - 5
VL - 2
SN - 2347-2693
ER -
VIEWS | XML | |
3805 | 3535 downloads | 3565 downloads |
Abstract
Reliable user authentication is becoming an increasingly important task in the Web-enabled world. Biometrics-based authentication systems offer obvious usability advantages over traditional password and token-based authentication schemes. However, biometrics also raises some issues in lack of privacy, template security, and revocability. The use of cryptographic primitives to bolster the biometric authentication system can solve the issues in biometric system.The combination of biometrics over cryptography may lead to a problem of lack of accuracy in biometric verification. In this paper, We propose a cryptographic protocol for biometrics authentication without revealing personal biometrical data against malicious verifier the protocol is termed as blind biometric authentication protocol, which addresses the concerns of user�s privacy, template protection, trust issue. The accuracy problem can be solved by designing a classifier. The protocol is blind in the sense that it reveals only the identity, and no additional information about the user or the biometric to the authenticating server or vice-versa. The proposed protocol is secure to different attacks.
Key-Words / Index Term
Biometrics, Cryptosystems, Privacy, Public Key Cryptography, Security, Authentication
References
[1] A. K. Jain, A. Ross, and S. Prabhakar, �An introduction to biometric recognition,� IEEE Trans. Circuits Syst. Video Technol., vol. 14, no. 1, pp. 4�20, Jan. 2004.
[2] N. K. Ratha, J. H. Connell, and R. M. Bolle, �Enhancing security and privacy in biometrics-based authentication systems,� IBM Syst. J., vol. 40, no. 3, pp. 614�634, Mar. 2001.
[3] R. Rivest, A. Shamir, and L. Adleman, �A method for obtaining digital signatures and public-key cryptosystems,� Commun. ACM, vol. 21, no. 2, pp. 120�126, 1978.
[4] C. Fontaine and F. Galand, �A survey of homomorphic encryption for nonspecialists,� EURASIP, vol. 1, pp. 1�15, 2007.
[5] C. Gentry, �Fully homomorphic encryption using ideal lattices,� STOC, pp. 169�178, 2009.
[6] F. Farooq, R. M. Bolle, T.-Y. Jea, and N. Ratha, �Anonymous and revocable fingerprint recognition,� in CVPR Biometrics Worshop, Jun. 2007, pp. 1�7.
[7] A. Teoh, D. Ngo, and A. Goh, �Biohashing: Two factor authentication featuring fingerprint data and tokenised random number,� Pattern Recognit., vol. 37, no. 11, pp. 2245�2255, Nov. 2004.
[8] A. K. Jain, K. Nandakumar, and A. Nagar, �Biometric template security,� EURASIP, vol. 8, no. 2, pp. 1�17, 2008.
[9] M. Upmanyu, A. M. Namboodiri, K. Srinathan, and C. V. Jawahar, �Efficient biometric verification in the encrypted domain,� in 3rd Int. Conf. Biometrics, Jun. 2009, pp. 906�915.
[10] Yogesh Badhe, Hafij Balbatti, Neelkanth Kaladagi , Kranti Kumar, �IRIS Recognition and Authentication System for Enhancing Data Security� , International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (1-5), March 2014.