CFP last date
20 May 2024
Reseach Article

Secret Sharing based Secure Authentication System

by Rupali S. Patil, Sonali Patil, Sudeep D. Thepade
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 118 - Number 22
Year of Publication: 2015
Authors: Rupali S. Patil, Sonali Patil, Sudeep D. Thepade
10.5120/20875-3613

Rupali S. Patil, Sonali Patil, Sudeep D. Thepade . Secret Sharing based Secure Authentication System. International Journal of Computer Applications. 118, 22 ( May 2015), 8-11. DOI=10.5120/20875-3613

@article{ 10.5120/20875-3613,
author = { Rupali S. Patil, Sonali Patil, Sudeep D. Thepade },
title = { Secret Sharing based Secure Authentication System },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 118 },
number = { 22 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 8-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume118/number22/20875-3613/ },
doi = { 10.5120/20875-3613 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:02:24.275873+05:30
%A Rupali S. Patil
%A Sonali Patil
%A Sudeep D. Thepade
%T Secret Sharing based Secure Authentication System
%J International Journal of Computer Applications
%@ 0975-8887
%V 118
%N 22
%P 8-11
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The growth in the usage of internet has increased the demand for fast and accurate user identification and authentication. New threats, risks and vulnerabilities emphasize the need of a strong authentication system. Automated methods based on physiological characteristics of user are widely used to identify and verify the user. Biometric is the technology to deal with such methods which measures and statistically analyze the biological data. A biometric authentication system provides automatic authentication of an individual on the basis of unique features or characteristics possessed by an individual. The authentication system can be stronger using multiple factors for authentication process. The application like Aadhar Card uses multiple factors for authentication. There are some difficulties with multi-factor authentication system such as user privacy considerations, huge size databases and centralized database which may create security threats. To address such tribulations, the biometric authentication using secret sharing is proposed. Secret sharing will split the centralized database across the different locations. This will help in reducing the database size and removal of threats in centralized database. Also user privacy will be maintained due to decentralization of database.

References
  1. J. Sirdeshpande, S. Patil, "Amended Biometric Authentication using Secret Sharing", International Journal of Computer Applications, vol. 98, No. 21, 2014.
  2. R. Mukesh, V. J. Subashini, "Fingerprint based Authentication System using Threshold Visual Cryptographic Technique", International Conference on Advances in Engineering, Science and Management, pp. 16-19, IEEE, 2012.
  3. P. V. Chavan, M. Atique, L. Malik, "Signature based Authentication using Contrast Enhanced Hierarchical Visual Cryptography", Electrical, Electronics and Computer Science (SCEECS), pp. 1-5, IEEE, 2014.
  4. P. S. Revenkar, Anisa Anjum, "secure Iris Authentication using Visual Cryptography", Journal of Computer Science and Information Security, vol. 3, pp. 217-221, 2014.
  5. M. D. Dhameliye, J. P. Chaudhari, "A Multimodal Biometric Recognition System based on Fusion of Palmprint and Fingerprint", International Journal of Engineering Trends and Technology, vol. 4, Issue 5, pp. 1908-1911, 2013.
  6. P. F. Tsai, Ming-Shi Wang, "An (3, 3) – Visual Secret Sharing Scheme for Hiding Three Secret Data", JCIS, atlantis-press. com, 2006.
  7. S. Koteswari, P. John Paul, S. Indrani, "VC of IRIS Images for ATM Banking", International Journal of Computer Applications, vol. 48, No. 18, pp. 1-5, 2012.
  8. S. D. Thepade, P. Bidwai, "Iris Recognition using Fractional Coefficients of Cosine, Walsh, Haar, Slant, Kekre Transforms and Wavelet Transforms", International Journal of Emerging Technologies in Computational and Applied Sciences, pp. 141-146, 2012.
  9. M. P. Dale, M. A. Joshi, N. Gilda, "Texture based Palmprint Identification using DCT features", International Conference on Advances in Pattern Recognition, pp. 221-224, 2009.
  10. A. H. M. Al-Helali, W. A. Mahmmoud, H. A. Ali, "A Fast Personal Palmprint Authentication based on 3D-Multi Wavelet Transformation", Transactional Journal of Science and Technology, vol. 2 No. 8 pp. 1-10, 2012.
  11. Adams Wai-Kin Kong, David Zhang, "Feature-Level Fusion for Effective Palmprint Authentication", Lecture Notes in Computer Science, vol. 3072, pp. 761-767, 2004.
  12. K. P. Shashikala, K. B. Raja, "Palmprint Identification based on DWT, DCT and QPCA", International Journal of Engineering and Advanced Technology, vol. 1, Issue 5, pp. 325-331, 2012.
  13. S. D. Shirke, D. Gupta, "Iris Recognition using Gabor", International Journal of Computer Technology and Applications, vol. 4, pp. 1-7, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Biometric authentication Biometric features Secret sharing De-centralized database.