Analysis on Biometrics, Forensics Protecting Using Key Binding Mode Based Ppbss Using Fuzzy Vault
Keywords:
Biometrics,, Digital Forensic Technology, Biometric Security, fingerprint recognition,, Fuzzy Vault,, Chaff PointsAbstract
Direct storage of biometric templates in databases exposes the authentication system and legitimate users to numerous security and privacy challenges. Human beings can no longer be separated from electronic devices and the Internet technology. The need for information made available on systems and networks which are connected on the internet. It is very essential to provide an effective security measure and system that ensures the confidentiality, integrity, and availability of information system, networks, and the services and resources made available. In this paper a new way of technique is Fuzzy vault. Fuzzy Vault is one of the most promising bio-cryptographic techniques to prevent the template data from being misused. To make the fuzzy vault practically realizable in real-life applications especially for large databases, the chaff generation time needs to be reduced to greater extent. This work focuses on decreasing the chaff generation time to reduce the overall vault creation time This can be achieved using Biometric and Digital Forensic Technology.
References
] Fish JT, Miller LS, Braswell MC (2013) Crime scene investigation Routledge.
A.K Jain, P. Flynn, and A.A Ross, Handbook of Biometrics, New York, NY, USA: Spinter, 2008
A. Cavoukian and A. Stoianov, “Biometric encryption,” Encyclopedia of Cryptography and Security, New York, NY, USA: Springer, 2009.
Opdahl, A. L. and G. Sindre “Experimental comparison of attack trees and misuse cases for security threat identification.”Information and software Technology. In press, Corrected proof, 2008.
N.S.Sargur, C.Huang, S. Harish, V. Shah. “Biometric and Forensic aspects of Digital Document Processing,” 2010, PP.720-728.
G. Pangalos, C. Linoudis,and I. pagkalos.” The Importance of Cooperate Forensic Readlines in the information Security Framework,” in proceedings of IEEE Workshop on Enabling Technologies infrastructure for collaborative Enterprise “ 2010, PP.12-18
A.Juels and M.Sudan “A Fuzzy valut scheme”, in Proc IEEE int. Symp. Inf, Theory, Jul 2002, p. 408
T.C Clancy, N Kiyavash, and D.L Lin, “Secure Smartcard based fingerprint authentication, “ in Proc. ACM SIGMM workshop Biometrics Methods Appl 2003, pp 45-52.
K. Nandakumar, A.K Jain, and S.Pankanti, “Fingerprint – based fuzzy vault: implementation and performance,” IEEE Trans, Inf. Forensics, Security, vol 2, no 4, pp 744 – 757, Dec 2007.
P. Li X Yang, K Cao , X Tao, R.Wang, and J Tian, “An alignment – free fingerprint cryptosystem based onfuzzy vault schemen,: J. Netw, Comput. Appl., vol 33, pp 207-220, 2010.
A.Nagar, K. Nandakumar, A.K Jain, and S.Pankanti, “Fingerprint – based fuzzy vault: implementation and performance,” IEEE Trans, Inf. Forensics, Security, vol 2, no 4, pp 744 – 757, Dec 2008.
T.H Nguyen, Y.Wang, Y.Ha, and RLi “ Improved chaff point generation for vault scheme in bio-cryptosystems,” IET Biometrics, vol 2, no2 pp 48-55, Jun 2013.
X.Wu, N.Qi, K. Wang, and D Zhang, “A novel cryptosystem base on iris key generation,” in Proc 4th Int. conf. Natural comput. 2008, pp 53-56.
Y.Wu and B. Qiu, “Transforming a pattern identifier into biometric key generators,” in Proc. IEEE int Conf. Multimedia Expo, Jul 2010 pp 78-82.
Clancy TC, Kiyavash N, Lin Dj Secure smart-card based finger print authentication. In: proceedings of the 2003.
Nguyen TH, Wang Y, Nguyen TN, Li R, A fingerprint fuzzy valut scheme using a fast chaff point generation algorithm. IEEE 2013 International conference on Signal Processing, Communication and Computing; 5-8 August 2013
Nguyen TH, Wang Y, Nguyen TN, Li R, Improved chaff point generation for vault scheme in bio-cryptosystems. IET Biometrices 2013; 2: 48-55
Benhammadi F, Bey KB Password hardened fuzzy vault for fingerprint authentication system. Image vision comput 2014; 32: 487-496
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
