2019
DOI: 10.22266/ijies2019.0228.02
|View full text |Cite
|
Sign up to set email alerts
|

RSA Cryptography based Multi-Modal Biometric Identification System for High-Security Application

Abstract: In recent days the requirements of Biometric Identification System (BIS) increased enormously. BIS Unimodal Biometric systems (UM-BS) have different kinds of problems like non-universality, noisy data, unacceptable error rate and spoof attacks. These limitations are solved by using multi-modal Biometric systems (MM-BS).MM-BS uses two or more individual modalities, like face, Palm, iris, retina, fingerprint, etc. This paper has introduced featurelevel fusion and Rivest Shamir Adleman (RSA) encryption based FEP-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 13 publications
0
7
0
Order By: Relevance
“…-False Rejection Ratio (FRR): It is a part of correct samples that are incorrectly rejected and calculated as Eq. ( 15) [36]:…”
Section: Evaluation Metricmentioning
confidence: 99%
“…-False Rejection Ratio (FRR): It is a part of correct samples that are incorrectly rejected and calculated as Eq. ( 15) [36]:…”
Section: Evaluation Metricmentioning
confidence: 99%
“…Others combine two template protection techniques [11]. Additionally, some works use classical encryption methods, such as Rivest-Shamir-Adleman (RSA) [10,25].…”
Section: Related Workmentioning
confidence: 99%
“…Vasavi et al [10] used RSA encryption to protect the face, iris, and palm biometric templates with a public key, which is randomly generated to come up with a cipher text. The authors extract their features using empirical mode decomposition (EMD).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The key for the encryption process is known as the public key and the key used for decryption is the private key. Both are key pairs that will be used in securing messages or information [23], [24]. The steps of the hybrid algorithm are shown in Figure 1, which is described as follows; − The plaintext is original or initial messages like human language in general.…”
Section: Proposed Hybrid Algorithmmentioning
confidence: 99%