2020
DOI: 10.30684/etj.v38i3b.652
|View full text |Cite
|
Sign up to set email alerts
|

Key Generation from Multibiometric System Using Meerkat Algorithm

Abstract: Biometrics are short of revocability and privacy while cryptography cannot adjust the user’s identity.  By obtaining cryptographic keys using biometrics, one can obtain the features such as revocability, assurance about user’s identity, and privacy. Multi-biometrical based cryptographic key generation approach has been proposed, subsequently, left and right eye and ear of a person are uncorrelated from one to other, and they are treated as two independent biometrics and combine them in our system. None-the-les… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(9 citation statements)
references
References 14 publications
0
7
0
Order By: Relevance
“…The subtleties of biometrics vary from one person to the next, making it difficult to construct a security system that relies on them; however, when the biometric system is used, it is important to be aware of the risks involved, such as what happens if the reference template is exposed by a meddler [18,19]. This issue is addressed by cryptography, the encrypted data security is reliant upon (2) factors: The cryptographic algorithm robustness and the key secrecy and how a secret key method being distributed [11,20]. This categorises the crypto-systems as either private-type (symmetric) key or public-type (asymmetric) key.…”
Section: Image Encryptionmentioning
confidence: 99%
See 1 more Smart Citation
“…The subtleties of biometrics vary from one person to the next, making it difficult to construct a security system that relies on them; however, when the biometric system is used, it is important to be aware of the risks involved, such as what happens if the reference template is exposed by a meddler [18,19]. This issue is addressed by cryptography, the encrypted data security is reliant upon (2) factors: The cryptographic algorithm robustness and the key secrecy and how a secret key method being distributed [11,20]. This categorises the crypto-systems as either private-type (symmetric) key or public-type (asymmetric) key.…”
Section: Image Encryptionmentioning
confidence: 99%
“…On the other hand, the expanded key presents several challenges, such as a higher risk of forgetting and a higher barrier to storage. The external nature of the key also introduces a security risk into the encryption algorithm [5,10,11], and the present research is centred on the encrypting patient x-ray images, so they could be securely transmitted over a network. To do this, the diffusion principle has been followed which is applied to the pixels of the original images to generate the secret key, tested its randomness, and then used it to encrypt the image.…”
Section: Introductionmentioning
confidence: 99%
“…Consequently, sensitive information or data will be more secure [28,29]. To establish trust, the blockchain employs cryptography [30,31]. Cryptography is used to store information on the blockchin on the ledger.…”
Section: Fig 2 Block Chain Implementationmentioning
confidence: 99%
“…Except for the inclusion of a circular key element to combine key bits for each clock, the design principle of output generation and input functions is almost retained. Therefore, the cost of an area stream cipher is approximately 800 GE, while Grain requires 1162 GE for the equivalent 80-bit security standard [47] [48].…”
Section: T-sproutmentioning
confidence: 99%