Two Factor Biometric Key for Secure Wireless Networks
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 7
Abstract
The applications of wireless networks is steadily increasing through out the world. Wireless transactions are now appening in highly secure banking networks. To have more reliable networks, security of wireless networks is to be strengthened. Various Encryption algorithms are employed for this purpose. With standard key size and format, they are vulnerable to attacks. A key generated from biometric feature is unique and it is hard to break it. If the biometric key is based on key generated from two biometric features, it is highly reliable. In this paper, one such attempt is made to generate key for standard encryption algorithm from keys generated from face and fingerprint with the application of a unique algorithm.
Authors and Affiliations
P. Muthu Kannan, , V. Palanisamy
Content Based Image Retrieval using Density Distribution and Mean of Binary Patterns of Walsh Transformed Color Images
This paper introduces a novel idea of Binary Pattern observation of column wise and Row wise Walsh transformed color images for feature vector generation. The density distribution of Sal, Cal components of Binary Pattern...
AHP and Group Decision Making for Access Network Selection in Multi-Homed Mobile Terminals
The evolving fourth generation wireless networks provide heterogeneous wireless access. This feature enables the multi homed mobile devices to seamlessly roam across various wireless access technologies and to connect al...
A Survey On Coding Algorithms In Medical Image Compression
In medical imaging, lossy compression schemes are not used due to possible loss of useful clinical information and as operations like enhancement may lead to further degradations in the lossy compression. Hence there is...
Graph based Approach and Clustering of Patterns (GACP) for Sequential Pattern Mining
The sequential pattern mining generates the sequential patterns. It can be used as the input of another program for retrieving the information from the large collection of data. It requires a large amount of memory as we...
Classification and Evaluation the Privacy Preserving Data Mining Techniques by using a Data Modification–based Framework
In recent years, the data mining techniques have met a serious challenge due to the increased concerning and worries of the privacy, that is, protecting the privacy of the critical and sensitive data. Different technique...