Open Access   Article Go Back

A Survey on Secure Crypto-Biometric System using Blind Authentication Technique

A.S. Naik1 , S.M. Metagar2 , P.D. Hasalkar3

Section:Survey Paper, Product Type: Journal Paper
Volume-2 , Issue-5 , Page no. 93-97, May-2014

Online published on May 31, 2014

Copyright © A.S. Naik , S.M. Metagar, P.D. Hasalkar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: A.S. Naik , S.M. Metagar, P.D. Hasalkar , “A Survey on Secure Crypto-Biometric System using Blind Authentication Technique,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.93-97, 2014.

MLA Style Citation: A.S. Naik , S.M. Metagar, P.D. Hasalkar "A Survey on Secure Crypto-Biometric System using Blind Authentication Technique." International Journal of Computer Sciences and Engineering 2.5 (2014): 93-97.

APA Style Citation: A.S. Naik , S.M. Metagar, P.D. Hasalkar , (2014). A Survey on Secure Crypto-Biometric System using Blind Authentication Technique. International Journal of Computer Sciences and Engineering, 2(5), 93-97.

BibTex Style Citation:
@article{Naik_2014,
author = {A.S. Naik , S.M. Metagar, P.D. Hasalkar },
title = {A Survey on Secure Crypto-Biometric System using Blind Authentication Technique},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2014},
volume = {2},
Issue = {5},
month = {5},
year = {2014},
issn = {2347-2693},
pages = {93-97},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=165},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=165
TI - A Survey on Secure Crypto-Biometric System using Blind Authentication Technique
T2 - International Journal of Computer Sciences and Engineering
AU - A.S. Naik , S.M. Metagar, P.D. Hasalkar
PY - 2014
DA - 2014/05/31
PB - IJCSE, Indore, INDIA
SP - 93-97
IS - 5
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
3805 3535 downloads 3565 downloads
  
  
           

Abstract

Reliable user authentication is becoming an increasingly important task in the Web-enabled world. Biometrics-based authentication systems offer obvious usability advantages over traditional password and token-based authentication schemes. However, biometrics also raises some issues in lack of privacy, template security, and revocability. The use of cryptographic primitives to bolster the biometric authentication system can solve the issues in biometric system.The combination of biometrics over cryptography may lead to a problem of lack of accuracy in biometric verification. In this paper, We propose a cryptographic protocol for biometrics authentication without revealing personal biometrical data against malicious verifier the protocol is termed as blind biometric authentication protocol, which addresses the concerns of user�s privacy, template protection, trust issue. The accuracy problem can be solved by designing a classifier. The protocol is blind in the sense that it reveals only the identity, and no additional information about the user or the biometric to the authenticating server or vice-versa. The proposed protocol is secure to different attacks.

Key-Words / Index Term

Biometrics, Cryptosystems, Privacy, Public Key Cryptography, Security, Authentication

References

[1] A. K. Jain, A. Ross, and S. Prabhakar, �An introduction to biometric recognition,� IEEE Trans. Circuits Syst. Video Technol., vol. 14, no. 1, pp. 4�20, Jan. 2004.
[2] N. K. Ratha, J. H. Connell, and R. M. Bolle, �Enhancing security and privacy in biometrics-based authentication systems,� IBM Syst. J., vol. 40, no. 3, pp. 614�634, Mar. 2001.
[3] R. Rivest, A. Shamir, and L. Adleman, �A method for obtaining digital signatures and public-key cryptosystems,� Commun. ACM, vol. 21, no. 2, pp. 120�126, 1978.
[4] C. Fontaine and F. Galand, �A survey of homomorphic encryption for nonspecialists,� EURASIP, vol. 1, pp. 1�15, 2007.
[5] C. Gentry, �Fully homomorphic encryption using ideal lattices,� STOC, pp. 169�178, 2009.
[6] F. Farooq, R. M. Bolle, T.-Y. Jea, and N. Ratha, �Anonymous and revocable fingerprint recognition,� in CVPR Biometrics Worshop, Jun. 2007, pp. 1�7.
[7] A. Teoh, D. Ngo, and A. Goh, �Biohashing: Two factor authentication featuring fingerprint data and tokenised random number,� Pattern Recognit., vol. 37, no. 11, pp. 2245�2255, Nov. 2004.
[8] A. K. Jain, K. Nandakumar, and A. Nagar, �Biometric template security,� EURASIP, vol. 8, no. 2, pp. 1�17, 2008.
[9] M. Upmanyu, A. M. Namboodiri, K. Srinathan, and C. V. Jawahar, �Efficient biometric verification in the encrypted domain,� in 3rd Int. Conf. Biometrics, Jun. 2009, pp. 906�915.
[10] Yogesh Badhe, Hafij Balbatti, Neelkanth Kaladagi , Kranti Kumar, �IRIS Recognition and Authentication System for Enhancing Data Security� , International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (1-5), March 2014.