2015
DOI: 10.1186/s13635-015-0020-1
|View full text |Cite
|
Sign up to set email alerts
|

Fingerprint-based crypto-biometric system for network security

Abstract: To ensure the secure transmission of data, cryptography is treated as the most effective solution. Cryptographic key is an important entity in this process. In general, randomly generated cryptographic key (of 256 bits) is difficult to remember. However, such a key needs to be stored in a protected place or transported through a shared communication line which, in fact, poses another threat to security. As an alternative to this, researchers advocate the generation of cryptographic key using the biometric trai… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 37 publications
(17 citation statements)
references
References 29 publications
0
17
0
Order By: Relevance
“…The fingerprints characteristic (Reference Points) have been produced two-way area (directional element) and probability distribution. Fingerprint data privacy and security are produced with voidable template in [14]. Also, the authors suggest a way with which key can be canceled thus the restriction of irrevocability attribute of biometric habit could be addressed.…”
Section: Related Workmentioning
confidence: 99%
“…The fingerprints characteristic (Reference Points) have been produced two-way area (directional element) and probability distribution. Fingerprint data privacy and security are produced with voidable template in [14]. Also, the authors suggest a way with which key can be canceled thus the restriction of irrevocability attribute of biometric habit could be addressed.…”
Section: Related Workmentioning
confidence: 99%
“…Very little work has been proposed about a framework for secure communication on a network using crypto-biometric system. Barman et al [15] proposed a system in which both sender and receiver exchange their cancelable biometrics using key-based steganography. Kanade et al [16] proposed a crypto-biometric system for establishing secure communication session between two clients.…”
Section: Existing Approachesmentioning
confidence: 99%
“…We ascertain the coordinating score between two pictures utilizing hamming separation. The DCT system is High precision with lessened blunder rates [6][7] [8]. The proposed Feature Extraction calculation can be utilized for a bigger database, for example, for Aadhar in light of the fact that it requires less investment for highlight extraction and has less many-sided quality with lessened scientific weight on the framework and enhances great picture precision.…”
Section: Fingerprint and Retina Using Dct And Image Based Steganograpmentioning
confidence: 99%