2015
DOI: 10.5120/20875-3613
|View full text |Cite
|
Sign up to set email alerts
|

Secret Sharing based Secure Authentication System

Abstract: The growth in the usage of internet has increased the demand for fast and accurate user identification and authentication. New threats, risks and vulnerabilities emphasize the need of a strong authentication system. Automated methods based on physiological characteristics of user are widely used to identify and verify the user. Biometric is the technology to deal with such methods which measures and statistically analyze the biological data. A biometric authentication system provides automatic authentication o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…Concerns about user privacy, massive databases, and centralized databases that can generate a security risk. Secret sharing divides a centralized database into different locations [22].…”
Section: Titlementioning
confidence: 99%
“…Concerns about user privacy, massive databases, and centralized databases that can generate a security risk. Secret sharing divides a centralized database into different locations [22].…”
Section: Titlementioning
confidence: 99%
“…e system is composed of two modules: enrolment and authentication [10][11][12][13]. e literature demonstrates the need for a more robust way of protecting multi-biometric template data.…”
Section: Related Workmentioning
confidence: 99%
“…Sunhant et al [10] used visual cryptography to divide original images into different images but the shares image does not guide any information about original one, and for added more security by using asymmetric watermarking. Rupali et al [11] proposed that centraled database will be split by using secret sharing across different locations, this will reduce threats against the centralised database and reducing the size of database. Patel et al [12] illustrated that it is desirable to modify biometric patterns to prevent the theft of them through transforming them through revocable and noninvertible transformations to create cancelable biometric templates.…”
Section: Related Workmentioning
confidence: 99%