2019
DOI: 10.30534/ijeter/2019/327112019
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient and Secured Biometric Authentication for IoT

Abstract: The Internet of Things (IoT) is that the ability to produce everyday devices with the way of identification and otherwise for communication with one nother. The spectrum of IoT application domains is extremely massive together with sensible homes, sensible cities, wearable's, e-health, etc. Consequently, tens and even many billions of devices are going to be connected. Such devices can have sensible capabilities to gather, analyze and even create selections with none human interaction. Security may be a suprem… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 12 publications
(15 reference statements)
0
3
0
Order By: Relevance
“…The content involved in the process is that the voting system with the dactylogram (i.e. ).The fingerprint [22] of each user is captured and then the obtained image is stored in the dataset where all the images of the fingerprint of the user are stored. These images are then encrypted Encrypt (image [I]) where I represents each user, the encryption algorithm preferred is Triple DES algorithm using three keys.…”
Section: Proposed Systemmentioning
confidence: 99%
“…The content involved in the process is that the voting system with the dactylogram (i.e. ).The fingerprint [22] of each user is captured and then the obtained image is stored in the dataset where all the images of the fingerprint of the user are stored. These images are then encrypted Encrypt (image [I]) where I represents each user, the encryption algorithm preferred is Triple DES algorithm using three keys.…”
Section: Proposed Systemmentioning
confidence: 99%
“…We tend to win this aim by exploiting and unambiguously combining techniques of attribute-based secret writing. [29][30][31][32][33]…”
Section: Related Workmentioning
confidence: 99%
“…Not only can cloud store that data efficiently but it can use cloud computing to decrease the hardware and software demand form the user. This allows for a system with weak processor of Raspberry Pi to perform deep learning tasks as facial recognition [11] [12].…”
Section: Introductionmentioning
confidence: 99%