In Fingerprint based Biometric authentication image of the fingerprint can be scanned and can be used later on for the purpose of authentication. So this process does not provide very high security. This paper proposes another level of security by using the concept of combined key. The key is obtained by crossing over of the Session key generated from the password given by the legitimate user and the Biometric key generated from the fingerprint of the same user. The proposed approach trained the system by Artificial Neural Network in such a way that a small portion of the fingerprint is enough to generate the Biometric key which minimizes the chance of false rejection. So in this approach there is a significant improvement of the traditiona...
In the last decade of computer security, using biometrics for various types of security problems bec...
Biometrics is used for person identification and verification. Combining Private Key cryptography an...
Biometric keys are widely used in the digital identity system due to the inherent uniqueness of biom...
E-business and sensitive Internet applications are growing very fast, so the needs to protect such a...
One of Authentication technique involves the use of a secret key to generate a small fixed size bloc...
Mission critical applications uses mobile ad hoc network. Security is required to protect this data ...
This paper puts forth a fresh methodology for the se-cure storage of fingerprint template by generat...
This paper presents a new biometric encryption protocol in which encryption key is incorporated with...
Abstract: Problem statement: The main challenge in the design of a security system for high security...
The present work deals with modern computing systems security issues, focusing on biometric based as...
The present work deals with modern computing systems security issues, focusing on biometric based as...
In traditional cryptosystems, user authentication is based on possession of secret keys/tokens. Suc...
Secured data transfer is a critical issue through open networks due to attackers and intruders. This...
Currently, biometric identifiers have been used to identify or authenticate users in a biometric sys...
Security is very important in present day life. In this computer-networked world, most of the activi...
In the last decade of computer security, using biometrics for various types of security problems bec...
Biometrics is used for person identification and verification. Combining Private Key cryptography an...
Biometric keys are widely used in the digital identity system due to the inherent uniqueness of biom...
E-business and sensitive Internet applications are growing very fast, so the needs to protect such a...
One of Authentication technique involves the use of a secret key to generate a small fixed size bloc...
Mission critical applications uses mobile ad hoc network. Security is required to protect this data ...
This paper puts forth a fresh methodology for the se-cure storage of fingerprint template by generat...
This paper presents a new biometric encryption protocol in which encryption key is incorporated with...
Abstract: Problem statement: The main challenge in the design of a security system for high security...
The present work deals with modern computing systems security issues, focusing on biometric based as...
The present work deals with modern computing systems security issues, focusing on biometric based as...
In traditional cryptosystems, user authentication is based on possession of secret keys/tokens. Suc...
Secured data transfer is a critical issue through open networks due to attackers and intruders. This...
Currently, biometric identifiers have been used to identify or authenticate users in a biometric sys...
Security is very important in present day life. In this computer-networked world, most of the activi...
In the last decade of computer security, using biometrics for various types of security problems bec...
Biometrics is used for person identification and verification. Combining Private Key cryptography an...
Biometric keys are widely used in the digital identity system due to the inherent uniqueness of biom...