2022
DOI: 10.11591/ijeecs.v28.i3.pp1697-1708
|View full text |Cite
|
Sign up to set email alerts
|

Cryptography based on retina information

Abstract: The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances be… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 25 publications
0
1
0
Order By: Relevance
“…Weaknesses in key creation and utilization Standard RC4 algorithm vulnerabilities. Alrifaee and Ismaeel [18] Three types of keys generated from retina vessel's Keys based on DCE, RCE, and DRCE distances in retina.…”
Section: Reference Description Performancementioning
confidence: 99%
See 1 more Smart Citation
“…Weaknesses in key creation and utilization Standard RC4 algorithm vulnerabilities. Alrifaee and Ismaeel [18] Three types of keys generated from retina vessel's Keys based on DCE, RCE, and DRCE distances in retina.…”
Section: Reference Description Performancementioning
confidence: 99%
“…Retinal biometric features offer high precision due to their stability over a lifetime [20]. Previous work, such as Tajuddin and Nandini [15], Mazher and Waleed [16], Salih and Mahdawi [17], Alrifaee and Ismaeel [18], has demonstrated the use of retinal biometric data for cryptographic key generation and key management, leveraging the uniqueness and stability of the retinal blood vessel patterns. The proposed algorithms and techniques aim to enhance the security and reliability of cryptographic systems by utilizing the retinal biometric modality.…”
Section: Zhao Et Al [14]mentioning
confidence: 99%
“…This interest could yield a torrent of unintellectual data utilizing amorphous stylistic communication commonly available to the public. The security investigators may be ethical white hat hackers assembling Internet communities to harmonize discovery schemes [3]- [5]. Here, in this scheme, specialists find vulnerabilities presented in the security applications and information to the manufacturer.…”
Section: Introductionmentioning
confidence: 99%