Two Factor Biometric Key for Secure Wireless Networks

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 7

Abstract

The applications of wireless networks is steadily increasing through out the world. Wireless transactions are now appening in highly secure banking networks. To have more reliable networks, security of wireless networks is to be strengthened. Various Encryption algorithms are employed for this purpose. With standard key size and format, they are vulnerable to attacks. A key generated from biometric feature is unique and it is hard to break it. If the biometric key is based on key generated from two biometric features, it is highly reliable. In this paper, one such attempt is made to generate key for standard encryption algorithm from keys generated from face and fingerprint with the application of a unique algorithm.

Authors and Affiliations

P. Muthu Kannan, , V. Palanisamy

Keywords

Related Articles

Content Based Image Retrieval using Density Distribution and Mean of Binary Patterns of Walsh Transformed Color Images

This paper introduces a novel idea of Binary Pattern observation of column wise and Row wise Walsh transformed color images for feature vector generation. The density distribution of Sal, Cal components of Binary Pattern...

AHP and Group Decision Making for Access Network Selection in Multi-Homed Mobile Terminals

The evolving fourth generation wireless networks provide heterogeneous wireless access. This feature enables the multi homed mobile devices to seamlessly roam across various wireless access technologies and to connect al...

A Survey On Coding Algorithms In Medical Image Compression

In medical imaging, lossy compression schemes are not used due to possible loss of useful clinical information and as operations like enhancement may lead to further degradations in the lossy compression. Hence there is...

Graph based Approach and Clustering of Patterns (GACP) for Sequential Pattern Mining

The sequential pattern mining generates the sequential patterns. It can be used as the input of another program for retrieving the information from the large collection of data. It requires a large amount of memory as we...

Classification and Evaluation the Privacy Preserving Data Mining Techniques by using a Data Modification–based Framework

In recent years, the data mining techniques have met a serious challenge due to the increased concerning and worries of the privacy, that is, protecting the privacy of the critical and sensitive data. Different technique...

Download PDF file
  • EP ID EP139743
  • DOI -
  • Views 95
  • Downloads 0

How To Cite

P. Muthu Kannan, , V. Palanisamy (2010). Two Factor Biometric Key for Secure Wireless Networks. International Journal on Computer Science and Engineering, 2(7), 2457-2460. https://europub.co.uk/articles/-A-139743