CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Biometric Approach to Encrypt a File with the Help of Session Key

by Sougata Das, Rahul Das, Ayan Mukherjee
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 65 - Number 1
Year of Publication: 2013
Authors: Sougata Das, Rahul Das, Ayan Mukherjee
10.5120/10886-5778

Sougata Das, Rahul Das, Ayan Mukherjee . Biometric Approach to Encrypt a File with the Help of Session Key. International Journal of Computer Applications. 65, 1 ( March 2013), 6-11. DOI=10.5120/10886-5778

@article{ 10.5120/10886-5778,
author = { Sougata Das, Rahul Das, Ayan Mukherjee },
title = { Biometric Approach to Encrypt a File with the Help of Session Key },
journal = { International Journal of Computer Applications },
issue_date = { March 2013 },
volume = { 65 },
number = { 1 },
month = { March },
year = { 2013 },
issn = { 0975-8887 },
pages = { 6-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume65/number1/10886-5778/ },
doi = { 10.5120/10886-5778 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:17:30.668538+05:30
%A Sougata Das
%A Rahul Das
%A Ayan Mukherjee
%T Biometric Approach to Encrypt a File with the Help of Session Key
%J International Journal of Computer Applications
%@ 0975-8887
%V 65
%N 1
%P 6-11
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, we have employed "Face Recognition" technique with conventional session based authentication to provide a two layer security. Different features of a human face are used for authentication. Since this scheme uses biological characteristics, this is very difficult to forge. Additionally we will be using conventional session based authentication to provide a two layer security. This method of authentication can be used to grant access to a network, important files and documents. The main objective of this work is to provide a two layer authentication system through biometric (face) and conventional session based password authentication. The encryption key for this authentication will be generated with the combination of the biometric key [7] and session based password.

References
  1. Stallings William. Cryptography and Network Security. Pearson Education, 2006.
  2. Bruce Schneier. Applied Cryptography. Wiley Student Edition, 2nd Edition, 1996.
  3. Neal R. Wagner. The Laws of Cryptography with Java Code
  4. HosseinBidgoli. Handbook of Information Security Volume 3. John Wiley and Sons, Inc.
  5. David E. Goldberg: "Genetic Algorithms in Search, Optimization and Machine Learning".
  6. Kalyanmoy Deb: "Multi-Objective optimization using Evolutionary Algorithm"
  7. Tanmay Bhattacharya, SirshenduHore ,Ayan Mukherjee and S. R. BhadraChaudhuri. "A Novel Data Encryption Technique by Genetic Crossover of Robust Biometric Key and Session Based Password". International Journal of Network Security & Its Applications (IJNSA). Vol. 3, No. 2, March 2011.
  8. Shang-Hung Lin. "An Introduction to Face Recognition Technology". Informing Science Special Issue on Multimedia Informing Technologies – Part 2. Volume 3, No. 1, 2000.
  9. Xiaoguang Lu. "Image Analysis for Face Recognition".
  10. YevgeniyDodis, ShafiGoldwasser, Yael Kalai, Chris Peikert, VinodVaikuntanathan. "Public-Key Encryption Schemes with Auxiliary Inputs".
  11. Dan Boneh, Michael Hamburg. "Generalized Identity Based and Broadcast Encryption Schemes".
  12. Rahul Das and Ayan Mukherjee. "A Secured Biometric Approach to Prevent Unauthorised Access to a Document".
  13. Alasdair McAndrew. "An Introduction to Digital Image Processing with MATLAB". School of Computer Science and Mathematics, Victoria University of Technology.
  14. Chia-HsuanYeh : "Graduate Course: An Introduction to Genetic Algorithms".
  15. Fonscea and Fleming:"Genetic Algorithms for MultiobjectiveOptimazation:Formulation, Discussion and Generalization".
  16. MitsunkiMatayoshi: "A Genetic Algorithm with the improved 2-opt method".
  17. http://www. mathworks. in/ as on 2nd Jan, 2013
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Decryption Face Recognition Biometrics Genetic Crossover Genetic Mutation Evolutionary Algorithms