Shriram D Raut, Rajivkumar Mente and Ashok Shinde. Article: A Dominant Cryptosystem using Biometric Trait and Multiparty Cipher. IJCA Proceedings on National Seminar on Recent Trends in Cloud Computing NSRCC:3-5, May 2014. Full text available. BibTeX
@article{key:article, author = {Shriram D. Raut and Rajivkumar Mente and Ashok Shinde}, title = {Article: A Dominant Cryptosystem using Biometric Trait and Multiparty Cipher}, journal = {IJCA Proceedings on National Seminar on Recent Trends in Cloud Computing}, year = {2014}, volume = {NSRCC}, pages = {3-5}, month = {May}, note = {Full text available} }
Abstract
The biometric is science of recognizing person based on physiological and behavioral characteristics. The cryptographic system assures our data during transmission and tends to form a secure message. This paper discusses about concatenation of biometric trait and multiparty cipher. A message needs a security mechanism that keeps data protected from security attacks. This paper is a stepping stone towards prominent security services; an approach is to use human as token of authorization. A biometric trait may be palm, face; finger etc. and multiparty cipher consist of chaining of symmetric ciphers. The fusion of such characteristic leads us a much dominant cryptosystem and using this we can make messaging or communication quite secure.
References
- Stalling, W. (2011). Network Security Essentials. Pearson publication. Fifth Edition. ISBN: 0133370437
- Jain, A. K. , Ross, A. and Prabhakar S. (2004). An Introduction to Biometric Recognition. IEEE Transaction on Circuits and System for Video Technology, vol. 14, Pp. 4-20.
- Kartalopoulos, S. V. (2008). Differentiating Data Security and Network Security. Communications, 2008. ICC '08. IEEE International Conference on, pp. 1469?1473, 19?23.
- Raut, S. D. , Patil, S. H. , Shinde, A. R. and Humbe, V. T. (2014). A Multiparty Cryptographic Cipher for Network Security Model. Indian Stream Journals.
- Prabhakar, S. , Pankanti, S. and Jain, A. K. (2003). Biometric Recognition: Security and Privacy Concerns. IEEE Security and Privacy, pp. 33-42.
- Krutz, Ronald L. , and Russell Dean Vines. (2010). Cloud Computing Security Architecture. Wiley.
- Zhang, D. (2004). Palm Print Authentication. Kluwer Publication.
- Ajay Kumar, Zhang, D. (2005). Personal authentication using multiple palm print representation. Pattern Recognition Society.