Double Encryption Based Secure Biometric Authentication System
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2012, Vol 3, Issue 1
Abstract
Nowadays bio-metric authentication systems are widely used in order to provide authentication without possessing any physical materials. Bio-metric authentication systems are mainly concentrating on security, revocability, privacy, and accuracy. In this paper, we propose a provably two way secured biometric authentication system, which addresses the concerns of user’s privacy, template protection, trust issues, network security, and accuracy. The system is two way secured in the sense, biometric details are going to be encrypted twice, the system won’t reveal any additional information about the user or biometric, to the authenticating server’s database or to the insecure network. In this system two different encryption algorithms have been used both in the client and server side. One is public key cryptography another one is private key cryptography. User’s privacy as concern it is revealing only the identity of the user. In template protection this protocol will store the template as encrypted form. Protocol will provide trust between remote user and server, while a remote user cannot be reliably identified without biometric information. Since network security as concern protocol is not revealing the plain biometric details while it is passed through the network. The proposed approach has no restrictions on the biometric data used and it is applicable for multiple biometrics (face, iris, hand geometry, and finger print). Authentication by using two way encryption will give additional layer of security when comparing with existing systems
Authors and Affiliations
S. Kavin hari hara sudhan(1), Prof. S. Ramamoorthy (2)
Analysis of ECG Data Compression Techniques
ECG (electrocardiogram) is a test that measures the electrical activity of the heart.The heart is a muscular organ that beats in rhythm to pump the blood through the body. Large amount of signal data needs to be stored a...
The Evaluation of Forecasting Methods for Sales of Sterilized Flavoured Milk in Chhattisgarh
In recent years, there has been a great deal of discussion on applications of various forecasting models and their performance in forecasting business activities. This paper discussed few of forecasting models and their...
Multilingual Person Identification
Speech conveys the word being spoken and information about the speakers. The speaker recognition is divided into two parts speaker identification and speaker verification. Present paper explores the idea to identify mult...
Multipair Public Key Cryptosystem
Cryptography mainly deals with security provided to the data access the network. Asymmetric key cryptography, also called as Public Key cryptography, uses two different keys (which forms a key pair),one key is used for e...
The Development of a Microcontroller Based LowCost Heart Rate Counter for Health Care Systems
The heart rate is one of the significant physiological parameters of the human cardiovascular system. Heart rate is the number of times the heart beats per minute. Heart rate data reflects various physiologica...