CFP last date
22 April 2024
Reseach Article

A Biometric Solution To Cryptographic Key Management Problem Using Iris Based Fuzzy Vault

by Mrunal Fatangare, K.N.Honwadkar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 15 - Number 5
Year of Publication: 2011
Authors: Mrunal Fatangare, K.N.Honwadkar
10.5120/1942-2594

Mrunal Fatangare, K.N.Honwadkar . A Biometric Solution To Cryptographic Key Management Problem Using Iris Based Fuzzy Vault. International Journal of Computer Applications. 15, 5 ( February 2011), 42-46. DOI=10.5120/1942-2594

@article{ 10.5120/1942-2594,
author = { Mrunal Fatangare, K.N.Honwadkar },
title = { A Biometric Solution To Cryptographic Key Management Problem Using Iris Based Fuzzy Vault },
journal = { International Journal of Computer Applications },
issue_date = { February 2011 },
volume = { 15 },
number = { 5 },
month = { February },
year = { 2011 },
issn = { 0975-8887 },
pages = { 42-46 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume15/number5/1942-2594/ },
doi = { 10.5120/1942-2594 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:03:23.426439+05:30
%A Mrunal Fatangare
%A K.N.Honwadkar
%T A Biometric Solution To Cryptographic Key Management Problem Using Iris Based Fuzzy Vault
%J International Journal of Computer Applications
%@ 0975-8887
%V 15
%N 5
%P 42-46
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Reliable information security mechanisms are required in the today’s era of cyber theft. Traditional Cryptography is a powerful mechanism to achieve information security. Current cryptographic algorithms (e.g., Advanced Encryption Standard (AES), Data Encryption Standard (DES), RSA) have a very high proven security but they suffer from the key management problem. Human identification is also a challenging field. That is why if we can make a blend of cryptography and biometric then it becomes a upcoming security tool. Using unique biometric identity of a person the keys for cryptosystem can be made secure. Iris is one of the proven and accurate means to identify person and it does not change throughout life of a person. This paper presents a biometric solution to cryptographic key management problem using iris based fuzzy vault.

References
  1. A. Bodo, Method for producing a digital signature with aid of biometric feature, German Patent DE 42 43 908 Al, 1994
  2. Juels, and M. Wattenberg, "A fuzzy commitment scheme", Proc. of sixth ACM Conf. on Computer and Communication Security, pp. 28-36, 1999
  3. N. K. Ratha, J. H. Connell, and R. M. Bolle, “An Analysis of Minutiae Matching Strength,” in Proceedings of Third International Conference on Audio- and Video-Based Biometric Person Authentication (AVBPA), Halmstad, Sweden, June 2001,pp. 223–228.
  4. Jules and M. Sudan, “A fuzzy vault scheme”, in Proc. IEEE Int. Symp. Inform. Theory, Lausanne, Switzerland, 2002, p. 408.
  5. U. Uludag, S. Pankanti, S. Prabhakar, and A. K. Jain, “Biometric cryptosystems: Issues and challenges,” Proc. IEEE (Special Issue Multimedia Security for Digital Rights Management), vol. 92, no. 6, pp. 948–960, Jun. 2004
  6. Y J. Chang, W. Zhang, and T. Chen, "Biometrics-based cryptographic key generation", Proc. of IEEE Int. conf. on Multi-media and Expo, pp. 2203-2206, 2004
  7. Anil K.Jain, Sharath Pankanti,Umut Uludag Department of Computer Science and Engineering, “Fuzzy vault for fingerprint”, Michigan State University, East Lansing, MI, 48824 2.Exploratory Computer Vision Group, IBM T.J. Watson Research Center, Yorktown Heights, NY, 10598
  8. Ari Juels RSA laboratories, 174 middlesex turnpike, bedford, ma 01730, USA ,Madhu Sudan Massachusetts Institute of Technology, 32 Vassar street, Cambridge, MA 02139, USA, “A Fuzzy Vault Scheme” , RSA Lab, Received November 27, 2002; Revised January 12, 2005; Accepted February 16, 2005
  9. Karthik Nandakumar, Student Member, IEEE, Anil K. Jain, Fellow, IEEE, and Sharath Pankanti, Senior Member, IEEE, “Fingerprint-Based Fuzzy Vault: Implementation and Performance”, IEEE transactions on information forensics and security, vol. 2, no. 4, December 2007.
  10. Karthik Nandakumar, Abhishek Nagar and Anil K. Jain, “Hardening Fingerprint Fuzzy Vault using Password”, International Conference on Biometrics, pp.927-938, 2007.
  11. Anil K. Jain, Karthik Nandakumar and Abhishek Nagar, “Biometric Template Security”, EURASIP Journal on Advances in Signal Processing, Special Issue on Biometrics, January 2008
  12. E. Srinivasa Reddy, Ramesh Babu; “Performance of Iris Based Hard Fuzzy Vault” IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.1, January 2008
  13. E. Srinivasa Reddy, Ramesh Babu; “authentication using fuzzy vault based on iris texture” Second Asia international Conference on Modeling & Simulation 2008, pp 361-368
  14. Khin Sint Sint Kyaw “iris recognition system using statistical features for Biometric identification”, international conference on electronic computer technology, pp 554 – 556, 2009
  15. Book- digital Image Processing – Rafael C. Gonzalez, Richard E.Woods, Pearson Education. Pg.no.522
Index Terms

Computer Science
Information Sciences

Keywords

Biometrics cryptosystem fuzzy vault encoding decoding chaff points polynomial projection Lagrange interpolation