9,964 research outputs found

    Biometric Template Protection based on Hill Cipher Algorithm with Two Invertible Keys

    Get PDF
    The security of stored templates has become an important issue in biometric authentication systems this because most of the biometric attacks target the biometric database beside the difficulty of issuing the templates again. Thus, to protect the biometric templates it must be encrypted before storing in database. In this paper we proposed an efficient encryption method based on two invertible and random keys to enhance and overcome the weakness of hill cipher algorithm the keys generated using upper triangular matrices with Pseudo-Random Number Generator (PRNG) using two large and random encryption keys. The proposed encryption method provides sufficient security and protection for the biometric templates from attacks, where the experimental results showed high efficiency comparing with the traditional Hill Cipher and existing methods

    Bio-Cryptosystem Using Fuzzy Vault Scheme

    Get PDF
    — In recent years most challenging problem is protection of information from unauthorized users. The conventional Cryptographic systems are insufficient to provide a security. The main problem is how to protect private keys from attackers and Intruder such as in case of Internet Banking. Cryptographic systems have been widely used in many information security systems. Hence in this paper we have proposed a framework of Biometric based cryptosystems. It provide reliable way of hiding private keys by using biometric features of individuals. A fuzzy vault approach is used to protect private keys and to release them only when legitimate individual enter their biometric sample. The main advantage of this system is there is no need of storing biometric information. However, fuzzy vault systems do not store directly these templates since they are encrypted with private keys by using novel cryptography algorithm. In proposed framework we are combining iris features with the encryption algorithm that can be a new research direction. The proposed approach provides high security and also image information can be protected. DOI: 10.17762/ijritcc2321-8169.150712

    Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data

    Get PDF
    We provide formal definitions and efficient secure techniques for - turning noisy information into keys usable for any cryptographic application, and, in particular, - reliably and securely authenticating biometric data. Our techniques apply not just to biometric information, but to any keying material that, unlike traditional cryptographic keys, is (1) not reproducible precisely and (2) not distributed uniformly. We propose two primitives: a "fuzzy extractor" reliably extracts nearly uniform randomness R from its input; the extraction is error-tolerant in the sense that R will be the same even if the input changes, as long as it remains reasonably close to the original. Thus, R can be used as a key in a cryptographic application. A "secure sketch" produces public information about its input w that does not reveal w, and yet allows exact recovery of w given another value that is close to w. Thus, it can be used to reliably reproduce error-prone biometric inputs without incurring the security risk inherent in storing them. We define the primitives to be both formally secure and versatile, generalizing much prior work. In addition, we provide nearly optimal constructions of both primitives for various measures of ``closeness'' of input data, such as Hamming distance, edit distance, and set difference.Comment: 47 pp., 3 figures. Prelim. version in Eurocrypt 2004, Springer LNCS 3027, pp. 523-540. Differences from version 3: minor edits for grammar, clarity, and typo

    CRYPTOSYSTEM FROM MULTIPLE BIOMETRIC MODALITIES

    Get PDF
    One of the most important parts of cryptographic systems is key generation. Researchers, for a long time period, have been inventing ways to produce tough and repeatable cryptographic keys. Keys that had these features are hard to be memorized and may be stolen or lost. For this purpose using biometric features to generate cryptographic key is the best way. Most previous Researchers focused to extract features and generate key from an individual biometric, but it is hard to be used in multi stages cryptographic systems. Therefore, this approach is enhancing the cryptographic systems by using long and complex cryptographic keys that are hard to be guessed and do not need to be memorized and provide better usage in multi stages cryptographic systems by extracting features from multi biometrics, That provides accuracy 99.83% with time less than using individual biometric by 90%

    Ensuring patients privacy in a cryptographic-based-electronic health records using bio-cryptography

    Get PDF
    Several recent works have proposed and implemented cryptography as a means to preserve privacy and security of patients health data. Nevertheless, the weakest point of electronic health record (EHR) systems that relied on these cryptographic schemes is key management. Thus, this paper presents the development of privacy and security system for cryptography-based-EHR by taking advantage of the uniqueness of fingerprint and iris characteristic features to secure cryptographic keys in a bio-cryptography framework. The results of the system evaluation showed significant improvements in terms of time efficiency of this approach to cryptographic-based-EHR. Both the fuzzy vault and fuzzy commitment demonstrated false acceptance rate (FAR) of 0%, which reduces the likelihood of imposters gaining successful access to the keys protecting patients protected health information. This result also justifies the feasibility of implementing fuzzy key binding scheme in real applications, especially fuzzy vault which demonstrated a better performance during key reconstruction
    • …
    corecore