92 research outputs found

    Chaotic-Based Encryption Algorithm using Henon and Logistic Maps for Fingerprint Template Protection

    Get PDF
    Fingerprint is a reliable user authentication method as it is unique to individual users that makes it efficient for authenticating users. In a fingerprint authentication system, user fingerprint information is stored in databases in an image format known as a fingerprint template. Although fingerprint is reliable, the templates stored in the database are exposed to security threats either during the data transmission process over the network or in storage. Therefore, there is a need to protect the fingerprint template, especially in unsecured networks to maintain data privacy and confidentiality. Many past studies proposed fingerprint template protection (FTP) using chaotic-based encryption algorithms that are more suitable to secure images than conventional encryption such as DES, AES, and RSA. The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. However, the robustness of the algorithm caused a trade-off to encryption speed where it remains an issue in FTP.  Hence, this study aims to improve the limitations found in the existing chaotic-based encryption algorithms for FTP by improving its encryption speed using Henon and Logistic map. A series of simulations were conducted using MATLAB to evaluate the performance of the proposed chaotic-based encryption algorithm for FTP through different analyses covering key sensitivity, histogram, correlations, differential, information entropy, and encryption/decryption speed. The performance proposed encryption algorithm was promising which could be a starting point for detailed analysis and implementation in real application domains

    Evaluasi Kinerja Wireless 802.11N untuk E Learning

    Get PDF
    Penelitian ini merupakan evaluasi kinerja tentang wireless LAN (WLAN) 802.11N yang diimplementasikan dalam suatu lingkungan fakultas. Dalam penelitian ini di bangun server E Learning dan akan di akses menggunakan Wireless LAN 802.11N. Simulasi ini menggunakan Perangkat Lunak Riverbed Modeler. Penelitian ini merupakan sebuah simulasi untuk memperkirakan jumlah klien pengguna web dan aplikasi jaringan lainnya yang bisa didukung oleh Wireless LAN 802.11N dengan memberikan   beban jaringan tertentu. Pada penelitian ini simulasi menghasilkan tampilan bahwa WLAN IEEE 802.11N bisa mendukung sampai lebih dari 100 klien pengguna e-learning dengan aktifitas web browsing

    An enhanced fingerprint template protection scheme

    Get PDF
    Fingerprint template protection (FTP) is required to secure authentication due to fingerprint has been widely used for user authentication systems. Fingerprint authentication consists of a microcontroller, fingerprint sensor, secure access control, and human interface. However, as many users frequently assess the systems, fingerprints could be replicated and modified by attackers. Currently, most existing FTP schemes fail to meet the properties of fingerprint authentication systems, namely diversity, revocability, security, and match/recognition performance, due to intra-user variability in fingerprint identifiers and matching issues in unencrypted domains. Therefore, this study aims to enhance the existing schemes by using chaos-based encryption and hash functions to meet the specified properties by securing users’ fingerprint templates (FT) within the embedded systems. Furthermore, an improved chaos-based encryption algorithm was proposed for encrypting FT. The MATLAB simulation with Fingerprint Verification Competition (FVC) 2002 database was used to measure the encryption results, secret key spaces, key sensitivity, histogram, correlation, differential, entropy information, matching/recognition analysis, and revocability. The proposed FTP scheme was also evaluated using Burrows–Abadi– Needham (BAN) logic analysis for protocol robustness with resistance to replay attacks, stolen-verifier attacks, and perfect forward secrecy. The results demonstrate that the enhanced chaos-based encryption algorithm for FTP improves its encryption time, which is 0.24 seconds faster than the selected benchmark study. The enhanced FTP scheme also achieved security, revocability, diversity, and matching/recognition performance properties. The matching/recognition performance evaluation produced higher verification rates and a low false rejection rate. The rates were 99.10 % and 0.90%, respectively. The equal error rate decreased from 2.10% to 1.05%. As a conclusion, the enhanced FTP scheme could be an alternative to the existing FTP for embedded system authentication to withstand various possible attacks and provides the desired security features. The scheme also can be a reference to comprehensive security analysis

    Bukti korespondensi smart oil well monitoring

    Get PDF

    Prototye locker security turnitin

    Get PDF

    Bukti korespondensi prosiding 2

    Get PDF

    Implementation FAS poster

    Get PDF

    Perbandingan enkripsi korespendensi

    Get PDF
    • …
    corecore