CFP last date
20 December 2024
Reseach Article

A Dominant Cryptosystem using Biometric Trait and Multiparty Cipher

Published on May 2014 by Shriram D. Raut, Rajivkumar Mente, Ashok Shinde
National Seminar on Recent Trends in Cloud Computing
Foundation of Computer Science USA
NSRCC - Number 1
May 2014
Authors: Shriram D. Raut, Rajivkumar Mente, Ashok Shinde
4bd491ed-37d6-4435-bd7f-3e075ed56bb8

Shriram D. Raut, Rajivkumar Mente, Ashok Shinde . A Dominant Cryptosystem using Biometric Trait and Multiparty Cipher. National Seminar on Recent Trends in Cloud Computing. NSRCC, 1 (May 2014), 3-5.

@article{
author = { Shriram D. Raut, Rajivkumar Mente, Ashok Shinde },
title = { A Dominant Cryptosystem using Biometric Trait and Multiparty Cipher },
journal = { National Seminar on Recent Trends in Cloud Computing },
issue_date = { May 2014 },
volume = { NSRCC },
number = { 1 },
month = { May },
year = { 2014 },
issn = 0975-8887,
pages = { 3-5 },
numpages = 3,
url = { /proceedings/nsrcc/number1/16481-1402/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Seminar on Recent Trends in Cloud Computing
%A Shriram D. Raut
%A Rajivkumar Mente
%A Ashok Shinde
%T A Dominant Cryptosystem using Biometric Trait and Multiparty Cipher
%J National Seminar on Recent Trends in Cloud Computing
%@ 0975-8887
%V NSRCC
%N 1
%P 3-5
%D 2014
%I International Journal of Computer Applications
Abstract

The biometric is science of recognizing person based on physiological and behavioral characteristics. The cryptographic system assures our data during transmission and tends to form a secure message. This paper discusses about concatenation of biometric trait and multiparty cipher. A message needs a security mechanism that keeps data protected from security attacks. This paper is a stepping stone towards prominent security services; an approach is to use human as token of authorization. A biometric trait may be palm, face; finger etc. and multiparty cipher consist of chaining of symmetric ciphers. The fusion of such characteristic leads us a much dominant cryptosystem and using this we can make messaging or communication quite secure.

References
  1. Stalling, W. (2011). Network Security Essentials. Pearson publication. Fifth Edition. ISBN: 0133370437
  2. Jain, A. K. , Ross, A. and Prabhakar S. (2004). An Introduction to Biometric Recognition. IEEE Transaction on Circuits and System for Video Technology, vol. 14, Pp. 4-20.
  3. Kartalopoulos, S. V. (2008). Differentiating Data Security and Network Security. Communications, 2008. ICC '08. IEEE International Conference on, pp. 1469?1473, 19?23.
  4. Raut, S. D. , Patil, S. H. , Shinde, A. R. and Humbe, V. T. (2014). A Multiparty Cryptographic Cipher for Network Security Model. Indian Stream Journals.
  5. Prabhakar, S. , Pankanti, S. and Jain, A. K. (2003). Biometric Recognition: Security and Privacy Concerns. IEEE Security and Privacy, pp. 33-42.
  6. Krutz, Ronald L. , and Russell Dean Vines. (2010). Cloud Computing Security Architecture. Wiley.
  7. Zhang, D. (2004). Palm Print Authentication. Kluwer Publication.
  8. Ajay Kumar, Zhang, D. (2005). Personal authentication using multiple palm print representation. Pattern Recognition Society.
Index Terms

Computer Science
Information Sciences

Keywords

Network Security Cipher Text Biometrics Image Processing Palm Print Pattern Recognition.