A Survey of Cancelable Biometric Based Key Generation Scheme using various Cryptography Techniques
K.N. Joshi1 , P. Chaudhari2
- Computer Engineering Department, LDRP - ITR, KSV, Gandhinagar, India.
- Computer Engineering Department, LDRP - ITR, KSV, Gandhinagar, India.
Section:Review Paper, Product Type: Journal Paper
Volume-6 ,
Issue-3 , Page no. 380-383, Mar-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i3.380383
Online published on Mar 30, 2018
Copyright © K.N. Joshi, P. Chaudhari . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: K.N. Joshi, P. Chaudhari, “A Survey of Cancelable Biometric Based Key Generation Scheme using various Cryptography Techniques,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.380-383, 2018.
MLA Style Citation: K.N. Joshi, P. Chaudhari "A Survey of Cancelable Biometric Based Key Generation Scheme using various Cryptography Techniques." International Journal of Computer Sciences and Engineering 6.3 (2018): 380-383.
APA Style Citation: K.N. Joshi, P. Chaudhari, (2018). A Survey of Cancelable Biometric Based Key Generation Scheme using various Cryptography Techniques. International Journal of Computer Sciences and Engineering, 6(3), 380-383.
BibTex Style Citation:
@article{Joshi_2018,
author = {K.N. Joshi, P. Chaudhari},
title = {A Survey of Cancelable Biometric Based Key Generation Scheme using various Cryptography Techniques},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2018},
volume = {6},
Issue = {3},
month = {3},
year = {2018},
issn = {2347-2693},
pages = {380-383},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1812},
doi = {https://doi.org/10.26438/ijcse/v6i3.380383}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i3.380383}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1812
TI - A Survey of Cancelable Biometric Based Key Generation Scheme using various Cryptography Techniques
T2 - International Journal of Computer Sciences and Engineering
AU - K.N. Joshi, P. Chaudhari
PY - 2018
DA - 2018/03/30
PB - IJCSE, Indore, INDIA
SP - 380-383
IS - 3
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
1003 | 332 downloads | 279 downloads |
Abstract
Key management in cryptosystem has more security concerns. In traditional cryptosystem key is generated randomly and very difficult to remember. The keys generated from biometric features provide better option than traditional cryptographic key management techniques such as password based key generations. Cancelable biometric is a customized technique in biometric based cryptography, where Cancelable Biometric refers to the intentional and systematically repeatable distortion of biometric features in order to protect sensitive user-specific data. This paper presents the survey conducted for same of the cancelable biometric key generation techniques.
Key-Words / Index Term
Cryptographic Key Generation, Biometrics, Feature Extraction , Key Generation, Biometric cryptography
References
[1] Kodge B. G., "Information Security: A Review on Steganography with Cryptography for Secured Data Transaction", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.6, pp.1-4, 2017.
[2]Colin Soutar, Danny Roberge, Alex Stoianov, Rene Gilroy, and B.V.K. Vijaya Kumar,” Biometric Encryption” McGraw-Hill, (1999)
[3] Indu Verma, Sanjay Jain ,”Biometric based Key-Generation System for Multimedia Data Security”IEEE,2016
[4] A. Sharma, RS Thakur, S. Jaloree, "Investigation of Efficient Cryptic Algorithm for image files Encryption in Cloud", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.5, pp.5-11, 2016.
[5]https://researcher.watson.ibm.com/researcher/view_group_subpage.php?id=1914
[6]http://www.scholarpedia.org/article/Cancelable_biometrics
[7]Archana C. Lomte,”Biometric Fingerprint Authentication with Minutiae using Ridge Feature Extraction” International Conference on Pervasive Computing (ICPC) IEEE,2015
[8]Subhas Barman,Debasis Samanta, Samiran chattopadhyay “Revocable Key Generation From Irrevocable Biometric Data for Symmetric Cryptography”IEEE,2015
[9] Gaurangkumar Panchal, Debasis Samanta “Comparable Features and Same Cryptography Key Generation using Biometric Fingerprint Image ” International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB16) IEEE,2016
[10] Aditi Bhatega,Kapil Sharma,”Secure Cancelable Fingerprint key Generation”IEEE,2014
[11]Padma Polash Paul,Marina Gavrilova” Multimodal Cancelable Biometrics” Int. Conf. on Cognitive Informatics & Cognitive Computing (ICCI*CC’12),IEEE,2012