Conventional cryptography uses encryption key, which are long bit strings and are very hard to memorize such a long random numbers. Also it can be easily attacked by using the brute force search or technique. Instead of traditional cryptography, biometric e.g. fingerprint, iris, face, voice etc uniquely identifies a person and a secure method for stream cipher, because Biometric characteristics are ever living and unstable in nature (with respect to recognition). In this paper we used the idea of bio chaotic stream cipher which encrypts the images over the electronic media by using a biometric key and a bio-chaotic function. It enhances the security of the images and it should not be compromised. The idea also gives birth to a new kind of s...
We propose the first practical and secure way to integrate the iris biometric into cryptographic app...
Securing information is a key issue in the field of network security and cryptography is one of the ...
Due to the vast using of digital images and the fast evolution in computer science and especially th...
Conventional cryptography uses encryption key, which are long bit strings and are very hard to memor...
Conventional cryptography uses encryption key, which are long bit strings and are very hard to memor...
Conventional cryptography uses encryption key, which are long bit strings and are very hard to memor...
ABSTRACT-Conventional cryptography uses encryption key, which are long bit strings and are very hard...
Due to dramatic enhancement in computers and communications and due to huge use of electronic media,...
The classification of the iris image under the fake or real and also adding security to it by encryp...
Generally, a stream cipher is a symmetric key cipher where plaintext bits are combined with a pseudo...
Biometric cryptography is a technique using biometric features to encrypt data, which can improve th...
The patent describes systems and methods to improve cryptosystems, which in one implementation provi...
The Biometric-Gaussian-Stream (BGS) cryptosystem was extended by extensive research experimentation....
The Biometric-Gaussian-Stream(BGS) cryptosystem was extended by extensive research experimentation. ...
Generally, a stream cipher is a symmetric key cipher where plaintext bits are combined with a pseudo...
We propose the first practical and secure way to integrate the iris biometric into cryptographic app...
Securing information is a key issue in the field of network security and cryptography is one of the ...
Due to the vast using of digital images and the fast evolution in computer science and especially th...
Conventional cryptography uses encryption key, which are long bit strings and are very hard to memor...
Conventional cryptography uses encryption key, which are long bit strings and are very hard to memor...
Conventional cryptography uses encryption key, which are long bit strings and are very hard to memor...
ABSTRACT-Conventional cryptography uses encryption key, which are long bit strings and are very hard...
Due to dramatic enhancement in computers and communications and due to huge use of electronic media,...
The classification of the iris image under the fake or real and also adding security to it by encryp...
Generally, a stream cipher is a symmetric key cipher where plaintext bits are combined with a pseudo...
Biometric cryptography is a technique using biometric features to encrypt data, which can improve th...
The patent describes systems and methods to improve cryptosystems, which in one implementation provi...
The Biometric-Gaussian-Stream (BGS) cryptosystem was extended by extensive research experimentation....
The Biometric-Gaussian-Stream(BGS) cryptosystem was extended by extensive research experimentation. ...
Generally, a stream cipher is a symmetric key cipher where plaintext bits are combined with a pseudo...
We propose the first practical and secure way to integrate the iris biometric into cryptographic app...
Securing information is a key issue in the field of network security and cryptography is one of the ...
Due to the vast using of digital images and the fast evolution in computer science and especially th...