Call for Paper - June 2019 Edition
IJCA solicits original research papers for the June 2019 Edition. Last date of manuscript submission is May 20, 2019. Read More

A Dominant Cryptosystem using Biometric Trait and Multiparty Cipher

Print
PDF
IJCA Proceedings on National Seminar on Recent Trends in Cloud Computing
© 2014 by IJCA Journal
NSRCC
Year of Publication: 2014
Authors:
Shriram D. Raut
Rajivkumar Mente
Ashok Shinde

Shriram D Raut, Rajivkumar Mente and Ashok Shinde. Article: A Dominant Cryptosystem using Biometric Trait and Multiparty Cipher. IJCA Proceedings on National Seminar on Recent Trends in Cloud Computing NSRCC:3-5, May 2014. Full text available. BibTeX

@article{key:article,
	author = {Shriram D. Raut and Rajivkumar Mente and Ashok Shinde},
	title = {Article: A Dominant Cryptosystem using Biometric Trait and Multiparty Cipher},
	journal = {IJCA Proceedings on National Seminar on Recent Trends in Cloud Computing},
	year = {2014},
	volume = {NSRCC},
	pages = {3-5},
	month = {May},
	note = {Full text available}
}

Abstract

The biometric is science of recognizing person based on physiological and behavioral characteristics. The cryptographic system assures our data during transmission and tends to form a secure message. This paper discusses about concatenation of biometric trait and multiparty cipher. A message needs a security mechanism that keeps data protected from security attacks. This paper is a stepping stone towards prominent security services; an approach is to use human as token of authorization. A biometric trait may be palm, face; finger etc. and multiparty cipher consist of chaining of symmetric ciphers. The fusion of such characteristic leads us a much dominant cryptosystem and using this we can make messaging or communication quite secure.

References

  • Stalling, W. (2011). Network Security Essentials. Pearson publication. Fifth Edition. ISBN: 0133370437
  • Jain, A. K. , Ross, A. and Prabhakar S. (2004). An Introduction to Biometric Recognition. IEEE Transaction on Circuits and System for Video Technology, vol. 14, Pp. 4-20.
  • Kartalopoulos, S. V. (2008). Differentiating Data Security and Network Security. Communications, 2008. ICC '08. IEEE International Conference on, pp. 1469?1473, 19?23.
  • Raut, S. D. , Patil, S. H. , Shinde, A. R. and Humbe, V. T. (2014). A Multiparty Cryptographic Cipher for Network Security Model. Indian Stream Journals.
  • Prabhakar, S. , Pankanti, S. and Jain, A. K. (2003). Biometric Recognition: Security and Privacy Concerns. IEEE Security and Privacy, pp. 33-42.
  • Krutz, Ronald L. , and Russell Dean Vines. (2010). Cloud Computing Security Architecture. Wiley.
  • Zhang, D. (2004). Palm Print Authentication. Kluwer Publication.
  • Ajay Kumar, Zhang, D. (2005). Personal authentication using multiple palm print representation. Pattern Recognition Society.