Open Access   Article Go Back

Analysis on Biometrics, Forensics Protecting Using Key Binding Mode Based Ppbss Using Fuzzy Vault

Syed Javid Basha1 , B. Muni Hema Kumar2

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-06 , Page no. 116-121, Mar-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si6.116121

Online published on Mar 20, 2019

Copyright © Syed Javid Basha, B. Muni Hema Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Syed Javid Basha, B. Muni Hema Kumar, “Analysis on Biometrics, Forensics Protecting Using Key Binding Mode Based Ppbss Using Fuzzy Vault,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.06, pp.116-121, 2019.

MLA Style Citation: Syed Javid Basha, B. Muni Hema Kumar "Analysis on Biometrics, Forensics Protecting Using Key Binding Mode Based Ppbss Using Fuzzy Vault." International Journal of Computer Sciences and Engineering 07.06 (2019): 116-121.

APA Style Citation: Syed Javid Basha, B. Muni Hema Kumar, (2019). Analysis on Biometrics, Forensics Protecting Using Key Binding Mode Based Ppbss Using Fuzzy Vault. International Journal of Computer Sciences and Engineering, 07(06), 116-121.

BibTex Style Citation:
@article{Basha_2019,
author = {Syed Javid Basha, B. Muni Hema Kumar},
title = {Analysis on Biometrics, Forensics Protecting Using Key Binding Mode Based Ppbss Using Fuzzy Vault},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {07},
Issue = {06},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {116-121},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=880},
doi = {https://doi.org/10.26438/ijcse/v7i6.116121}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i6.116121}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=880
TI - Analysis on Biometrics, Forensics Protecting Using Key Binding Mode Based Ppbss Using Fuzzy Vault
T2 - International Journal of Computer Sciences and Engineering
AU - Syed Javid Basha, B. Muni Hema Kumar
PY - 2019
DA - 2019/03/20
PB - IJCSE, Indore, INDIA
SP - 116-121
IS - 06
VL - 07
SN - 2347-2693
ER -

           

Abstract

Direct storage of biometric templates in databases exposes the authentication system and legitimate users to numerous security and privacy challenges. Human beings can no longer be separated from electronic devices and the Internet technology. The need for information made available on systems and networks which are connected on the internet. It is very essential to provide an effective security measure and system that ensures the confidentiality, integrity, and availability of information system, networks, and the services and resources made available. In this paper a new way of technique is Fuzzy vault. Fuzzy Vault is one of the most promising bio-cryptographic techniques to prevent the template data from being misused. To make the fuzzy vault practically realizable in real-life applications especially for large databases, the chaff generation time needs to be reduced to greater extent. This work focuses on decreasing the chaff generation time to reduce the overall vault creation time This can be achieved using Biometric and Digital Forensic Technology.

Key-Words / Index Term

Biometrics, Digital Forensic Technology, Biometric Security, fingerprint recognition, Fuzzy Vault, Chaff Points

References

[1] Fish JT, Miller LS, Braswell MC (2013) Crime scene investigation Routledge.
[2] A.K Jain, P. Flynn, and A.A Ross, Handbook of Biometrics, New York, NY, USA: Spinter, 2008
[3] A. Cavoukian and A. Stoianov, “Biometric encryption,” Encyclopedia of Cryptography and Security, New York, NY, USA: Springer, 2009.
[4] Opdahl, A. L. and G. Sindre “Experimental comparison of attack trees and misuse cases for security threat identification.”Information and software Technology. In press, Corrected proof, 2008.
[5] N.S.Sargur, C.Huang, S. Harish, V. Shah. “Biometric and Forensic aspects of Digital Document Processing,” 2010, PP.720-728.
[6]G. Pangalos, C. Linoudis,and I. pagkalos.” The Importance of Cooperate Forensic Readlines in the information Security Framework,” in proceedings of IEEE Workshop on Enabling Technologies infrastructure for collaborative Enterprise “ 2010, PP.12-18
[7] A.Juels and M.Sudan “A Fuzzy valut scheme”, in Proc IEEE int. Symp. Inf, Theory, Jul 2002, p. 408
[8] T.C Clancy, N Kiyavash, and D.L Lin, “Secure Smartcard based fingerprint authentication, “ in Proc. ACM SIGMM workshop Biometrics Methods Appl 2003, pp 45-52.
[9] K. Nandakumar, A.K Jain, and S.Pankanti, “Fingerprint – based fuzzy vault: implementation and performance,” IEEE Trans, Inf. Forensics, Security, vol 2, no 4, pp 744 – 757, Dec 2007.
[10] P. Li X Yang, K Cao , X Tao, R.Wang, and J Tian, “An alignment – free fingerprint cryptosystem based onfuzzy vault schemen,: J. Netw, Comput. Appl., vol 33, pp 207-220, 2010.
[11] A.Nagar, K. Nandakumar, A.K Jain, and S.Pankanti, “Fingerprint – based fuzzy vault: implementation and performance,” IEEE Trans, Inf. Forensics, Security, vol 2, no 4, pp 744 – 757, Dec 2008.
[12]T.H Nguyen, Y.Wang, Y.Ha, and RLi “ Improved chaff point generation for vault scheme in bio-cryptosystems,” IET Biometrics, vol 2, no2 pp 48-55, Jun 2013.
[13]X.Wu, N.Qi, K. Wang, and D Zhang, “A novel cryptosystem base on iris key generation,” in Proc 4th Int. conf. Natural comput. 2008, pp 53-56.
[14]Y.Wu and B. Qiu, “Transforming a pattern identifier into biometric key generators,” in Proc. IEEE int Conf. Multimedia Expo, Jul 2010 pp 78-82.
[15]Clancy TC, Kiyavash N, Lin Dj Secure smart-card based finger print authentication. In: proceedings of the 2003.
[16] Nguyen TH, Wang Y, Nguyen TN, Li R, A fingerprint fuzzy valut scheme using a fast chaff point generation algorithm. IEEE 2013 International conference on Signal Processing, Communication and Computing; 5-8 August 2013
[17] Nguyen TH, Wang Y, Nguyen TN, Li R, Improved chaff point generation for vault scheme in bio-cryptosystems. IET Biometrices 2013; 2: 48-55
[18] Benhammadi F, Bey KB Password hardened fuzzy vault for fingerprint authentication system. Image vision comput 2014; 32: 487-496