Double Encryption Based Secure Biometric Authentication System
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2012, Vol 3, Issue 1
Abstract
Nowadays bio-metric authentication systems are widely used in order to provide authentication without possessing any physical materials. Bio-metric authentication systems are mainly concentrating on security, revocability, privacy, and accuracy. In this paper, we propose a provably two way secured biometric authentication system, which addresses the concerns of user’s privacy, template protection, trust issues, network security, and accuracy. The system is two way secured in the sense, biometric details are going to be encrypted twice, the system won’t reveal any additional information about the user or biometric, to the authenticating server’s database or to the insecure network. In this system two different encryption algorithms have been used both in the client and server side. One is public key cryptography another one is private key cryptography. User’s privacy as concern it is revealing only the identity of the user. In template protection this protocol will store the template as encrypted form. Protocol will provide trust between remote user and server, while a remote user cannot be reliably identified without biometric information. Since network security as concern protocol is not revealing the plain biometric details while it is passed through the network. The proposed approach has no restrictions on the biometric data used and it is applicable for multiple biometrics (face, iris, hand geometry, and finger print). Authentication by using two way encryption will give additional layer of security when comparing with existing systems
Authors and Affiliations
S. Kavin hari hara sudhan(1), Prof. S. Ramamoorthy (2)
Numerical Analysis of Defects in FML using Through-Transmission Mode of Active Thermography
The study mainly focuses to investigate the thermal response of defects such as delaminations and disbonds, and develop mathematical models using numerical results to obtain the optimum heat requirement and time to...
A Comparative Study of the Suitability of Dakuk, Kirkuk-Iraq and Tuz, Salahaddin-Iraq Coarse Aggregates for Construction Purposes
This paper investigates the properties of some natural coarse aggregates in Dakuk and Tuz. Two gravel samples were obtained from different locations and transported to Civil Engineering Laboratory, Technical Institute of...
A NOVEL CONTROL METHOD FOR UNIFIED POWER QUALITY CONDITIONER USING NINE-SWITCH POWER CONDITIONER
The load-reactive power compensation in most of the UPQC based power quality compensation application is done by shunt APF, whereas, the series APF is generally utilized to compensate voltage related problems. In...
Two-Diode Model Performance Analysis of Photovoltaic Panels
Using of photovoltaic systems is increasing continuously today, modeling of solar cells is very important as to design the systems more efficiently that requires for the success of simulation studies. Two-diode e...
High Frequency Power Optimized Ring Voltage Controlled Oscillator for 65nm CMOS Technology-Review
A voltage controlled oscillator (VCO) is one of the most important basic building blocks in analog and digital circuits. Like any other circuit, with a VCO there are a number of design requirements that need to be known...