CFP last date
20 March 2024
Call for Paper
April Edition
IJCA solicits high quality original research papers for the upcoming April edition of the journal. The last date of research paper submission is 20 March 2024

Submit your paper
Know more
Reseach Article

ElGamel Encryption for Biometric Database Protection

by M. Mani Roja, Sudhir Sawarkar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 68 - Number 6
Year of Publication: 2013
Authors: M. Mani Roja, Sudhir Sawarkar
10.5120/11582-6914

M. Mani Roja, Sudhir Sawarkar . ElGamel Encryption for Biometric Database Protection. International Journal of Computer Applications. 68, 6 ( April 2013), 10-14. DOI=10.5120/11582-6914

@article{ 10.5120/11582-6914,
author = { M. Mani Roja, Sudhir Sawarkar },
title = { ElGamel Encryption for Biometric Database Protection },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 68 },
number = { 6 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 10-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume68/number6/11582-6914/ },
doi = { 10.5120/11582-6914 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:27:05.247684+05:30
%A M. Mani Roja
%A Sudhir Sawarkar
%T ElGamel Encryption for Biometric Database Protection
%J International Journal of Computer Applications
%@ 0975-8887
%V 68
%N 6
%P 10-14
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The critical issues in biometric systems are protecting the template of a user which is stored in a data base. An attack against the stored templates constitutes a major security and privacy threat in a biometric system. Proper use of cryptography greatly reduces the threats in biometric system as the attackers have to find the decryption key and template. This paper proposes an approach for biometric database protection using ElGamel encryption technique. The algorithm was successfully tested on a binary image, gray image and a colour image.

References
  1. Chander Kant, Ranjender Nath & Sheetal Chaudhary, "Biometrics Security using Steganography", International Journal of Security, vol. 2 , no. 1,pp. 1-5,2008.
  2. Manvjeet Kaur, Deepak Saraswat, Dr. Sanjeev Sofat, "Template and Database Security in Biometrics Systems: A Challenging Task", International Journal of Computer Applications Vol 4, no. 5, pp. 1-5, July 2010.
  3. Anil K. Jain, Karthik Nandakumar, and Abhishek Nagar, "Biometric Template Security", EURASIP Journal on Advances in Signal Processing, Volume 2008, pp. 1-7, Article ID 579416.
  4. A. Adler, "Can Images be Regenerated from Biometric Templates?", in Biometrics Consortium Conference, (Arlington, VA), September 2003, pp. 1-2, http:// www. sce. carleton. Ca / faculty /adler/publications/2003/adler-2003-biometrics-conf-regenerate-templates. pdf, dated June 2012.
  5. J. Feng, and A. K. Jain, "FM Model Based Fingerprint Reconstruction from Minutiae Template", Proc. International Conference on Biometrics (ICB), pp. 544-553, June 2009.
  6. A. Vetro, S. C. Draper, S. Rane and J. Yedidia, "Distributed Source Coding: Theory, Algorithms, and Applications", P. L. Dragotti and M. Gastpar (editors), Academic Press, pp. 293-324, 2009.
  7. Y. Wang, S. Rane, S. C. Draper and P. Ishwar, "A Theoretical Analysis of Authentication, Privacy and Resuability across Secure Biometric Systems", IEEE Trans. Inform. Forensics and Security, vol. 7, no. 6, pp. 1825-1840,Dec 2012.
  8. M. Yeung and S. Pankanti, "Verification Watermarks on Fingerprint Recognition and Retrieval", in Proc. SPIE, Security and Watermarking of Multimedia Contents, vol. 3657, pp. 66–78, (San Jose, USA), January 1999.
  9. U. Uludag and A. K. Jain, "Attacks on Biometric Systems: A Case Study in Fingerprints", in Proc. SPIE, Security, Seganography and Watermarking of Multimedia Contents VI, vol. 5306, pp. 622–633, (San Jose, CA), January 2004.
  10. L. C. Ferri, A. Mayerhofer, M. Frank, C. Vielhauer, and R. Steinmetz, "Biometric Authentication for ID cards with Hologram Watermarks", in Proc. SPIE, Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 629–640, (Bellingham, WA), January 2002.
  11. A. K. Jain and U. Uludag, "Hiding Biometric Data", IEEE Trans. Pattern Anal. Mach. Intelligence, Vol. 25, No. 11, pp. 1493–1498, 2003.
  12. A. K. Mohapatra, Madhvi Sandhu, "Biometric Template Encryption", Published in International Journal of Advanced Engineering & Application, pp. 282-284, Jan. 2010.
  13. William Stallings, "Cryptography and Network Security", Pearson Education, 5th edition, 2011
  14. Trappe, Washington, "Introduction to Cryptography with coding Theory", Pearson Education, 2nd edition, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Primitive roots PN sequence ElGamel Encryption