CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Robust Security Model for Biometric Template Protection Using Chaos Phenomenon

by Maithili Arjunwadkar, Dr. R. V. Kulkarni
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 3 - Number 6
Year of Publication: 2010
Authors: Maithili Arjunwadkar, Dr. R. V. Kulkarni
10.5120/737-1036

Maithili Arjunwadkar, Dr. R. V. Kulkarni . Robust Security Model for Biometric Template Protection Using Chaos Phenomenon. International Journal of Computer Applications. 3, 6 ( June 2010), 10-12. DOI=10.5120/737-1036

@article{ 10.5120/737-1036,
author = { Maithili Arjunwadkar, Dr. R. V. Kulkarni },
title = { Robust Security Model for Biometric Template Protection Using Chaos Phenomenon },
journal = { International Journal of Computer Applications },
issue_date = { June 2010 },
volume = { 3 },
number = { 6 },
month = { June },
year = { 2010 },
issn = { 0975-8887 },
pages = { 10-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume3/number6/737-1036/ },
doi = { 10.5120/737-1036 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:51:11.885207+05:30
%A Maithili Arjunwadkar
%A Dr. R. V. Kulkarni
%T Robust Security Model for Biometric Template Protection Using Chaos Phenomenon
%J International Journal of Computer Applications
%@ 0975-8887
%V 3
%N 6
%P 10-12
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Modern biometric technologies claim to provide alternative solution to traditional authentication processes. Even though there are various advantages of biometric process, it is vulnerable to attacks which can decline it’s security. Different schemes are proposed to protect from different attacks. This paper presents biometric process, attacks on biometric process, study of different protection techniques used to protect against different attacks. The authors have designed protection model of bio-hashing technique using Session key. This key is generated using Chaos phenomenon.

References
Index Terms

Computer Science
Information Sciences

Keywords

Security biometric process biometric template protection schemes chaos phenomenon