Abstract

Information security is concerned with the assurance of confidentiality, integrity and availability of information in all forms. Advances in the field of Information Technology also make Information Security an inseparable part of it. In biometrics, human being needs to be identified based on some characteristic physiological parameters. A wide variety of recognition schemes is used to either confirm or determine the identity of an individual requesting their services. In this work, we present various approaches to generate a unique and more secure cryptographic key from iris template. The iris images are processed to produce iris template or code to be utilized for the encryption and decryption tasks. The various cryptographic techniques such as AES, DES, Add/Subtraction operations, Reed-Solomon error-correcting algorithm, Layered order Encryption techniques and Fuzzy logic implementations are employed to directly encrypt and decrypt the data. Recently, biometric cryptosystems have been introduced as a reliable way of concealing private keys by using biometric data. A fuzzy vault refers to a biometric cryptosystem that can be used to effectively protect private keys and to release them only when legitimate users enter their biometric data. Distance metric such as hamming distance is used for the template matching identification process. Experimental results demonstrate the feasibility of the various systems and it shows that, R-S cryptographic algorithm can obtain a higher security with a low false rejection or false acceptance rate comparing to other techniques.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.