SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1387
CANCELABLE BIOMETRIC BASED KEY GENERATION FOR SYMMETRIC
CRYPTOGRAPHY: SURVEY
ASWATHY MADHU1, LASHMA K2
1M. Tech. Student, Computer Science and Engineering, Sree Buddha College of Engineering, Kerala, India.
2Assistant Professor, Computer Science and Engineering, Sree Buddha College of Engineering, Kerala, India.
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - In order to solve the problem of attacking the
data, cryptographic algorithms along with key generation
would be proposed. For symmetric cryptography the sender
and the receiver uses the same key for encryption and the
decryption process. Strength of the cryptography is based on
the hardness of the keys that are used in the cryptographic
algorithms. A key should be strong enough so that it is not
easily guessable and not feasible to break within real times.
Cryptographic keys can be generated by different methods. In
this paper, Biometrics are incorporated with cryptography to
create better security system. The cryptographic key is
generated by using the fingerprint features of the user.
Tracing any candidate biometric trait from the cryptographic
key is not feasible. One of the problem with biometrics is that
once it gets compromised it cannot be reused.
Key Words: Fingerprint Biometrics, Symmetric key
cryptography, Cryptographic key generation.
1. INTRODUCTION
These days, information travels so rapidly and the
information to deal with is really huge too. So, information
security is one of the biggest issues that are arising
nowadays and thus cryptography is used to strengthen the
fact that the volatile information does not fall into wrong
hands. Cryptographic algorithms are divided intotwo types:
symmetric keycryptography algorithmsandasymmetric key
cryptography algorithms. In symmetric key cryptography,
the sender and the receiver uses same key to encrypt and
decrypt the data with the help of encryption and decryption
algorithms whereas in asymmetric key cryptography pairof
keys are used private key and the public key. The public key
is announced publicly and the private key is set as secret.
In a public-key encryption system, the public key is used for
encryption process, while the private key i.e secret key is
used for decryption process. Symmetric algorithmssuchthat
data encryption standard(DES),3DESwhichuselongkeys of
size 56 bit, 168 bits, advanced encryption standard (AES)
uses 128,192 or 256 bits which make the user very difficult
to keep in mind such a long key. To overcome these
limitations, biometrics has been incorporated with
cryptography to create better and robust security system.
In a crypto-biometric system, cryptography provides high
level security whereas biometrics incorporates non-
repudiation so that no need to carry passwords or tokens.
Cryptographic key is generated from biometric traitsofuser
and the biometrics traits can be fingerprints, iris, retina,
palm print, speech, face etc and stored in the database so
that it is not possible to reveal the keys without biometric
authentication. Since the biometric trait used in key
generation must be private; it should not tell anythingabout
the user’s biometric data. The biometric trait are fixed in a
person and the key that is generated from thebiometrictrait
is also fixed. So, if either the biometric trait or the
cryptographic key is compromised anyway, it cannot be
reused. Different transformation parameters are used in
different applications to generate distinct transformed
templates. Thus cancelablebiometriccanberevoked easilyif
compromised.
A cancelable template is generated from the original
fingerprint template of both the communicating parties and
the original template undergoes a one-way transformation
so that it is not possible to recover from the cancelable
template and the cancelable template is exchanged between
them. The opposite communicating party by receiving the
encrypted cancelable template from the other side first
decrypts it and combined with its own cancelable template
in order to generate a master template on both side. Then
secret key is generated from master cancelable fingerprint
template. Here the generated secret key is not necessary to
store anywhere.
2. LITERATURE SURVEY
Various methods are used for generating the cryptographic
keys. Some of them are discussed below:
2.1 A matrix formulation for NTRU cryptosystem
Rakesh Nayak et al. [2]suggesta methodtogeneratethe
keys based on NTRU cryptosystem. In this system a pair of
keys i.e both public and private key isgenerated. NTRUisthe
first public key cryptosystem that uses lattice-based
cryptography to encrypt and decrypt data. NTRU uses
truncated polynomials to generate public and private keys
based on – Truncated Polynomial Ring Units R=Z[X]/(X^N-
1)) and the basic tool is the reduction of polynomials with
respect to two relatively prime moduli. First randomly
choosing two matrices X and Y, User A creates a
public/private key pair and keeps the matrices private, if
anyone knows either one of them will be able to decrypt the
messages sent to User A. Then computes matrix Xq as
inverse of X modulo q and Xp as inverse X modulo p. And
then he computes the product H = p* Xq *Y (modulo q)
where p and q are the parameters. User A’s privatekeyisthe
pair of matrices X and Xp, and his public key is the matrix H.
By using User A’s public key H, User B can send a message to
User A and for the encryption process User B first puts his
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1388
message in the form of a binary matrix M, (which is a matrix
of order as X and Y).To send a message M, User B chooses a
random matrix R (which is of same order as matrix X), and
User A’s public key H to compute the matrix ,E = R*H + M
(modulo q).The matrix E is the encrypted message which
User B sends to User A and the decryption is the reverse of
encryption process.
2.2 Classifying Iris Image Based on Feature
Extraction and Encryption using Bio-Chaotic
Algorithm
Rashmi M. Mhatre et al. [3] suggest a method to
generate secret key based on iris image feature extraction.
Iris image can be classified based on feature extraction
algorithms like SIFT i.e Scale-Invariant Feature Transform.
Macro features can be retrieved from the iris template using
SIFT algorithm. Then the iris images are stored into the
database undergoes SIFT feature extractiontechnique.Here,
iris image is used in the form of binary patternsandthenthis
binary data is divided into number of blocks and the Bio-
Chaotic Algorithm is applied to that input image.
Firstly image is classified and one block israndomly selected
to use as the secret encryption key. This key in return also
encrypted using quantum cryptographic algorithm and the
whole image is encrypted using the same key. The
authorized user only knows aboutthe randomblock then the
encrypted image is send to the receiver through e-mail, so
that decryption can be done securely at the receiver side.
The bio-chaotic stream cipher is used to encrypt the iris
images and store them securely usingbiometric key and bio-
chaotic function. Bio –chaotic algorithm is used to encrypt
the iris image. Here, the initial condition is applied to
generate the secret key by using the LFSR method. An LFSR
of length n over a finite field Pq consist of n stages (an-1, an-
2, an-3,….…, a0) with ai Є of Pq, and a polynomial.
Fig -1: System Architecture
B(x) =1+c1x1+c2x2+…. + cnxn over Pq.
The secret key and iris template is X-ored simultaneously to
generate the biometric key.
Biometric key=a1 xor b1, a2 xor b2,.…..., an xor bn.
And the generated Biometric key is then Xored with the
other blocks of the iris template which encryptstheimage in
a way that no attacker can easily decrypt the image.
2.3 Fingerprint Based Symmetric Cryptography
Subhas Barman et al. [4] suggest a method to maintain
the privacy of key by protecting it with users biometric from
unauthorized access. In this method, a cryptographic key is
combined with users fingerprint data. A string of binary
number is extracted from fingerprint template and this
binary number as cryptographic key is used to encrypt a
message. In the traditional cryptography, key is stored
somewhere else with a protection of user specified
password. If the passwordbecomescompromisedinanyway
by the attacker then the key also becomescompromised.For
that, Biometrics is combined with traditional cryptography
to improve the information security with a stronger
cryptosystem, known as crypto-biometric system (CBS). In
CBS, either cryptographic key is generated from biometric
features of the user or key is protected using biometric data.
Here, the key is generated from fingerprint template of user
so that the user does not require to store or remember the
key. As the key is generated from user's key, it can provide
non repudiation to information security.
Fingerprint features are extracted from the fingerprint
image of user A using feature extraction algorithm. Minutiae
points are detected as features from the fingerprint image.
Minutiae points are represented by the triplet of
where is the coordinatevaluesusedas
minutiae points and is the alignment angle of minutiae
points. The fingerprint template ofuserAisgenerated
from the minutiae points. At last, fingerprint template
is generated with zero and non-zero values and it is
used to generate cryptographic key.
Fig -2: Key generation and message encryption process
The key generation steps are described below:
1. User A generates fingerprint template from
fingerprint features.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1389
2. User selects an element [i] of template and puts
0 or 1 in the same location of key (i.e., K[i]).
3. User puts 1 in the first location of key vector K (i.e. K[i] =
1).
4. User puts 0 at K[i] if = 0 (i.e., K[i] = 0) and puts 1 if
(i.e., K[i] = 1).
This way, cryptographic key K is generated from fingerprint
template .
2.4 Biometric BasedCryptographicKeyGeneration
from Faces
B. Chen et al. [5] proposed a method which uses an
entropy based feature extraction process and coupled with
Reed-Solomon error correcting codes.Sothatitcangenerate
deterministic bit-sequences from the output of an iterative
one-way transform. Iterative, chaotic, and bispectral are the
one-way transform employed by the system that accepts a
one-dimensional vector input and is used to produce a
magnitude and angle pair per iteration. The output can be
converted to binary to form a very large bit matrix andthese
matrices are used to locate feature bits suitable to be used
as part of the bio-key (Borig) usinganentropybasedcriteria.
Fig -3: Biometric cryptosystem flowchart
To create a lookup table, these bio-keys are then combined
with the Reed-Solomon encoded version (Korig) of the
protected cryptographic key (korig) and that can be used to
regenerate korig given a slightly modified bio-key Bmod
presented by the user in future. The technique is evaluated
using 3D face data and produce keys of suitable length for
128-bit Advanced Encryption Standard (AES).
2.5 A Novel Algorithm towards Designing the
Protocol for Generation of Secret key with
Authentication in Collaboration (PGSAC)
Shyamasree Mukherjee et al. [6] proposed an
authentication technique for new nodes to an ad-hoc
network. Here, the request-reply messages are used to
generate a secret key at the two ends. It also estimates the
distance of a node from the power loss of a message from
node. Based on this distance, both the sender and the
receiver separately compute the same secret key.Itdoes not
use GPS and identifies location of nodes by distance and
direction only.
If a new node S with cryptographic key K want to
communicate with an existing node R in an ad hoc network
by using this key K node S encrypt message and transmits to
node R and the encrypted message by node R decryptedbyS
Using the same key k. This mechanism consists of two parts
key generation and key management.
Fig -4: Trust model
Steps for key generation:
Step 1: New node S sends request signal to node R with
power of the signal P1 and simultaneously S also sends
request signal to friend nodes A andBwithpowerP2and P3.
Step 2: R can compute the power loss L1 and the distance D1
using the given equation.
Step3: A can compute the power losses L2 and sends to R.
Similarly B can compute the power losses L3 and send to R.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1390
Step4: Using L2 and L3 node R computes the distanceD2, D3
and arranges the distances in ascending order to have the
key k.
Step5: A and B also send the same with power P2 andP3and
S can compute distances D1, D2 and D3 from power losses
L1, L2 and L3 and S arranges the distances D1, D2 and D3 in
ascending order and makes the same key itself without any
key transmission.
2.6SymmetricKeyAlgorithmUsingVernam Cipher
: VSA
Bhagyashri K. Pawar et al. [7] suggest a method to
achieve security measures for data and information. In this,
cryptosystem consists of threealgorithms:1)keygeneration
2) encryption process 3) decryption process. The key
generation is dependent on current system time. Different
keys are generated at different instances therefore time is a
major factor in this system. The key generationisdoneusing
public static long currentTimeMillis() method in java which
makes the system more secure and at every start of the
session the key will be different.
Steps for key generation:
Step1: Take current time in milliseconds.
Step2: Pass this time value to simple random number
generator.
Step3: Calculate its absolute value
Step4: Generate Key1.
Step5: Take next instant of system’s time
Step6: To generate Key2 follow step2 & 3.
For every message a new pair of keys is generated therefore
this system achieves a high level of secrecy as the system is
symmetric which makes the proposed cryptosystem more
unique.
3. CONCLUSION
The literature survey could fetch a number of different
methods to generate the cryptographic key. The limitations
of the existing methods are: key is stored somewhere else
with a protection of user specifiedpassword,ifthepassword
becomes compromised in anyway by the attacker then the
key also becomes compromised. For that, Biometrics is
combined with traditional cryptography to ensure better
security systems. Here the cryptographic key is strongly
linked with the fingerprint traits of the user and the key is
generated using cancelable fingerprint template of both the
communicating parties at their sites. This cryptographic key
is not required to be remembered and also not required to
be stored.
REFERENCES
[1] A. Sarkar and B. K. Singh, "Cancelable biometric based
key generation for symmetric cryptography," 2017
International Conference on Inventive Communication
and Computational Technologies (ICICCT), Coimbatore,
2017, pp. 404-409.
[2] R. Nayak, C. V. Sastry and J. Pradhan, "A matrix
formulation for NTRU cryptosystem," 2008 16th IEEE
International Conferenceon Networks, NewDelhi, 2008,
pp. 1-5.
[3] R. M. Mhatre and D. Bhardwaj, "Classifying Iris Image
Based on Feature Extraction and Encryption Using Bio-
Chaotic Algorithm (BCA)," 2015 International
Conference on Computational Intelligence and
Communication Networks (CICN), Jabalpur, 2015, pp.
1068-1073.
[4] S. Barman, S. Chattopadhyay and D. Samanta,
"Fingerprint based symmetric cryptography," 2014
International Conference on High Performance
Computing and Applications (ICHPCA), Bhubaneswar,
2014, pp. 1-6.
[5] B. Chen and V. Chandran, "Biometric Based
Cryptographic Key Generation fromFaces," 9thBiennial
ConferenceoftheAustralianPatternRecognitionSociety
on Digital Image Computing Techniques and
Applications (DICTA 2007), Glenelg, Australia,2007,pp.
394-401.
[6] S. Mukherjee, S. Choudhury, N. Chaki and D.
Mukhopadhyay, "A Novel Algorithm towards Designing
the Protocol for Generation of Secret-Key with
Authentication in Collaboration (PGSAC)," 2007
International Symposium on Information Technology
Convergence (ISITC 2007), Joenju, 2007, pp. 353-327.
[7] S. S. Hatkar and B. K. Pawar, "Symmetric key algorithm
using vernam cipher: VSA," 2016 International
Conference on Inventive Computation Technologies
(ICICT), Coimbatore, 2016, pp. 1-5.

More Related Content

What's hot

IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...IRJET Journal
 
Image encryption using jumbling salting
Image encryption using jumbling saltingImage encryption using jumbling salting
Image encryption using jumbling saltingMauryasuraj98
 
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextRSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextYekini Nureni
 
online payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptographyonline payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptographyShahrukh Ali
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...eSAT Publishing House
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyIJCERT
 
researchpaperfinal1
researchpaperfinal1researchpaperfinal1
researchpaperfinal1Sumit Bajaj
 
IRJET- Symmetric Cryptography using Neural Networks
IRJET-  	  Symmetric Cryptography using Neural NetworksIRJET-  	  Symmetric Cryptography using Neural Networks
IRJET- Symmetric Cryptography using Neural NetworksIRJET Journal
 
Mini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVAMini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVAchovatiyabhautik
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...IRJET Journal
 
PROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLES
PROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLESPROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLES
PROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLESIJNSA Journal
 
IRJET- Secure File Storage on Cloud using Cryptography
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using CryptographyIRJET Journal
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyeSAT Publishing House
 
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURESIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATUREijp2p
 

What's hot (19)

50120140507006
5012014050700650120140507006
50120140507006
 
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
 
Image encryption using jumbling salting
Image encryption using jumbling saltingImage encryption using jumbling salting
Image encryption using jumbling salting
 
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextRSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
 
Public key cryptography
Public key cryptographyPublic key cryptography
Public key cryptography
 
online payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptographyonline payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptography
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
 
researchpaperfinal1
researchpaperfinal1researchpaperfinal1
researchpaperfinal1
 
IRJET- Symmetric Cryptography using Neural Networks
IRJET-  	  Symmetric Cryptography using Neural NetworksIRJET-  	  Symmetric Cryptography using Neural Networks
IRJET- Symmetric Cryptography using Neural Networks
 
Mini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVAMini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVA
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
 
PROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLES
PROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLESPROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLES
PROVABLE SECURE IDENTITY BASED SIGNCRYPTION SCHEMES WITHOUT RANDOM ORACLES
 
IRJET- Secure File Storage on Cloud using Cryptography
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using Cryptography
 
581 517-525
581 517-525581 517-525
581 517-525
 
G04944851
G04944851G04944851
G04944851
 
H42063743
H42063743H42063743
H42063743
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
 
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURESIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATURE
 

Similar to IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: Survey

SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTSSYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTSacijjournal
 
Emerging Trends In Cryptography And Digital Forensics
Emerging Trends In Cryptography And Digital ForensicsEmerging Trends In Cryptography And Digital Forensics
Emerging Trends In Cryptography And Digital ForensicsIRJET Journal
 
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET Journal
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET Journal
 
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET-  	  Lossless Encryption Technique for Finger Biometric ImagesIRJET-  	  Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric ImagesIRJET Journal
 
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET-  	  Security Empowerment using QR Code and Session Tracking for Cued R...IRJET-  	  Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...IRJET Journal
 
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET Journal
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET Journal
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET Journal
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidIRJET Journal
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemIRJET Journal
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMIRJET Journal
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingIRJET Journal
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
 
Securing Mobile Data using Cryptography
Securing Mobile Data using CryptographySecuring Mobile Data using Cryptography
Securing Mobile Data using CryptographyEswar Publications
 
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET -  	  Implementation of DNA Cryptography in Cloud Computing and using S...IRJET -  	  Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...IRJET Journal
 
Stream-keys generation based on graph labeling for strengthening Vigenere en...
Stream-keys generation based on graph labeling for  strengthening Vigenere en...Stream-keys generation based on graph labeling for  strengthening Vigenere en...
Stream-keys generation based on graph labeling for strengthening Vigenere en...IJECEIAES
 
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC AlgorithmIRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC AlgorithmIRJET Journal
 

Similar to IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: Survey (20)

Mj3422172221
Mj3422172221Mj3422172221
Mj3422172221
 
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTSSYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
 
Emerging Trends In Cryptography And Digital Forensics
Emerging Trends In Cryptography And Digital ForensicsEmerging Trends In Cryptography And Digital Forensics
Emerging Trends In Cryptography And Digital Forensics
 
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
 
Jit dynamic cryptosystem
Jit dynamic cryptosystemJit dynamic cryptosystem
Jit dynamic cryptosystem
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
 
IRJET- Lossless Encryption Technique for Finger Biometric Images
IRJET-  	  Lossless Encryption Technique for Finger Biometric ImagesIRJET-  	  Lossless Encryption Technique for Finger Biometric Images
IRJET- Lossless Encryption Technique for Finger Biometric Images
 
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET-  	  Security Empowerment using QR Code and Session Tracking for Cued R...IRJET-  	  Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
 
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
Securing Mobile Data using Cryptography
Securing Mobile Data using CryptographySecuring Mobile Data using Cryptography
Securing Mobile Data using Cryptography
 
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET -  	  Implementation of DNA Cryptography in Cloud Computing and using S...IRJET -  	  Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
 
Stream-keys generation based on graph labeling for strengthening Vigenere en...
Stream-keys generation based on graph labeling for  strengthening Vigenere en...Stream-keys generation based on graph labeling for  strengthening Vigenere en...
Stream-keys generation based on graph labeling for strengthening Vigenere en...
 
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC AlgorithmIRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 

Recently uploaded (20)

DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 

IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: Survey

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1387 CANCELABLE BIOMETRIC BASED KEY GENERATION FOR SYMMETRIC CRYPTOGRAPHY: SURVEY ASWATHY MADHU1, LASHMA K2 1M. Tech. Student, Computer Science and Engineering, Sree Buddha College of Engineering, Kerala, India. 2Assistant Professor, Computer Science and Engineering, Sree Buddha College of Engineering, Kerala, India. ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - In order to solve the problem of attacking the data, cryptographic algorithms along with key generation would be proposed. For symmetric cryptography the sender and the receiver uses the same key for encryption and the decryption process. Strength of the cryptography is based on the hardness of the keys that are used in the cryptographic algorithms. A key should be strong enough so that it is not easily guessable and not feasible to break within real times. Cryptographic keys can be generated by different methods. In this paper, Biometrics are incorporated with cryptography to create better security system. The cryptographic key is generated by using the fingerprint features of the user. Tracing any candidate biometric trait from the cryptographic key is not feasible. One of the problem with biometrics is that once it gets compromised it cannot be reused. Key Words: Fingerprint Biometrics, Symmetric key cryptography, Cryptographic key generation. 1. INTRODUCTION These days, information travels so rapidly and the information to deal with is really huge too. So, information security is one of the biggest issues that are arising nowadays and thus cryptography is used to strengthen the fact that the volatile information does not fall into wrong hands. Cryptographic algorithms are divided intotwo types: symmetric keycryptography algorithmsandasymmetric key cryptography algorithms. In symmetric key cryptography, the sender and the receiver uses same key to encrypt and decrypt the data with the help of encryption and decryption algorithms whereas in asymmetric key cryptography pairof keys are used private key and the public key. The public key is announced publicly and the private key is set as secret. In a public-key encryption system, the public key is used for encryption process, while the private key i.e secret key is used for decryption process. Symmetric algorithmssuchthat data encryption standard(DES),3DESwhichuselongkeys of size 56 bit, 168 bits, advanced encryption standard (AES) uses 128,192 or 256 bits which make the user very difficult to keep in mind such a long key. To overcome these limitations, biometrics has been incorporated with cryptography to create better and robust security system. In a crypto-biometric system, cryptography provides high level security whereas biometrics incorporates non- repudiation so that no need to carry passwords or tokens. Cryptographic key is generated from biometric traitsofuser and the biometrics traits can be fingerprints, iris, retina, palm print, speech, face etc and stored in the database so that it is not possible to reveal the keys without biometric authentication. Since the biometric trait used in key generation must be private; it should not tell anythingabout the user’s biometric data. The biometric trait are fixed in a person and the key that is generated from thebiometrictrait is also fixed. So, if either the biometric trait or the cryptographic key is compromised anyway, it cannot be reused. Different transformation parameters are used in different applications to generate distinct transformed templates. Thus cancelablebiometriccanberevoked easilyif compromised. A cancelable template is generated from the original fingerprint template of both the communicating parties and the original template undergoes a one-way transformation so that it is not possible to recover from the cancelable template and the cancelable template is exchanged between them. The opposite communicating party by receiving the encrypted cancelable template from the other side first decrypts it and combined with its own cancelable template in order to generate a master template on both side. Then secret key is generated from master cancelable fingerprint template. Here the generated secret key is not necessary to store anywhere. 2. LITERATURE SURVEY Various methods are used for generating the cryptographic keys. Some of them are discussed below: 2.1 A matrix formulation for NTRU cryptosystem Rakesh Nayak et al. [2]suggesta methodtogeneratethe keys based on NTRU cryptosystem. In this system a pair of keys i.e both public and private key isgenerated. NTRUisthe first public key cryptosystem that uses lattice-based cryptography to encrypt and decrypt data. NTRU uses truncated polynomials to generate public and private keys based on – Truncated Polynomial Ring Units R=Z[X]/(X^N- 1)) and the basic tool is the reduction of polynomials with respect to two relatively prime moduli. First randomly choosing two matrices X and Y, User A creates a public/private key pair and keeps the matrices private, if anyone knows either one of them will be able to decrypt the messages sent to User A. Then computes matrix Xq as inverse of X modulo q and Xp as inverse X modulo p. And then he computes the product H = p* Xq *Y (modulo q) where p and q are the parameters. User A’s privatekeyisthe pair of matrices X and Xp, and his public key is the matrix H. By using User A’s public key H, User B can send a message to User A and for the encryption process User B first puts his
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1388 message in the form of a binary matrix M, (which is a matrix of order as X and Y).To send a message M, User B chooses a random matrix R (which is of same order as matrix X), and User A’s public key H to compute the matrix ,E = R*H + M (modulo q).The matrix E is the encrypted message which User B sends to User A and the decryption is the reverse of encryption process. 2.2 Classifying Iris Image Based on Feature Extraction and Encryption using Bio-Chaotic Algorithm Rashmi M. Mhatre et al. [3] suggest a method to generate secret key based on iris image feature extraction. Iris image can be classified based on feature extraction algorithms like SIFT i.e Scale-Invariant Feature Transform. Macro features can be retrieved from the iris template using SIFT algorithm. Then the iris images are stored into the database undergoes SIFT feature extractiontechnique.Here, iris image is used in the form of binary patternsandthenthis binary data is divided into number of blocks and the Bio- Chaotic Algorithm is applied to that input image. Firstly image is classified and one block israndomly selected to use as the secret encryption key. This key in return also encrypted using quantum cryptographic algorithm and the whole image is encrypted using the same key. The authorized user only knows aboutthe randomblock then the encrypted image is send to the receiver through e-mail, so that decryption can be done securely at the receiver side. The bio-chaotic stream cipher is used to encrypt the iris images and store them securely usingbiometric key and bio- chaotic function. Bio –chaotic algorithm is used to encrypt the iris image. Here, the initial condition is applied to generate the secret key by using the LFSR method. An LFSR of length n over a finite field Pq consist of n stages (an-1, an- 2, an-3,….…, a0) with ai Є of Pq, and a polynomial. Fig -1: System Architecture B(x) =1+c1x1+c2x2+…. + cnxn over Pq. The secret key and iris template is X-ored simultaneously to generate the biometric key. Biometric key=a1 xor b1, a2 xor b2,.…..., an xor bn. And the generated Biometric key is then Xored with the other blocks of the iris template which encryptstheimage in a way that no attacker can easily decrypt the image. 2.3 Fingerprint Based Symmetric Cryptography Subhas Barman et al. [4] suggest a method to maintain the privacy of key by protecting it with users biometric from unauthorized access. In this method, a cryptographic key is combined with users fingerprint data. A string of binary number is extracted from fingerprint template and this binary number as cryptographic key is used to encrypt a message. In the traditional cryptography, key is stored somewhere else with a protection of user specified password. If the passwordbecomescompromisedinanyway by the attacker then the key also becomescompromised.For that, Biometrics is combined with traditional cryptography to improve the information security with a stronger cryptosystem, known as crypto-biometric system (CBS). In CBS, either cryptographic key is generated from biometric features of the user or key is protected using biometric data. Here, the key is generated from fingerprint template of user so that the user does not require to store or remember the key. As the key is generated from user's key, it can provide non repudiation to information security. Fingerprint features are extracted from the fingerprint image of user A using feature extraction algorithm. Minutiae points are detected as features from the fingerprint image. Minutiae points are represented by the triplet of where is the coordinatevaluesusedas minutiae points and is the alignment angle of minutiae points. The fingerprint template ofuserAisgenerated from the minutiae points. At last, fingerprint template is generated with zero and non-zero values and it is used to generate cryptographic key. Fig -2: Key generation and message encryption process The key generation steps are described below: 1. User A generates fingerprint template from fingerprint features.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1389 2. User selects an element [i] of template and puts 0 or 1 in the same location of key (i.e., K[i]). 3. User puts 1 in the first location of key vector K (i.e. K[i] = 1). 4. User puts 0 at K[i] if = 0 (i.e., K[i] = 0) and puts 1 if (i.e., K[i] = 1). This way, cryptographic key K is generated from fingerprint template . 2.4 Biometric BasedCryptographicKeyGeneration from Faces B. Chen et al. [5] proposed a method which uses an entropy based feature extraction process and coupled with Reed-Solomon error correcting codes.Sothatitcangenerate deterministic bit-sequences from the output of an iterative one-way transform. Iterative, chaotic, and bispectral are the one-way transform employed by the system that accepts a one-dimensional vector input and is used to produce a magnitude and angle pair per iteration. The output can be converted to binary to form a very large bit matrix andthese matrices are used to locate feature bits suitable to be used as part of the bio-key (Borig) usinganentropybasedcriteria. Fig -3: Biometric cryptosystem flowchart To create a lookup table, these bio-keys are then combined with the Reed-Solomon encoded version (Korig) of the protected cryptographic key (korig) and that can be used to regenerate korig given a slightly modified bio-key Bmod presented by the user in future. The technique is evaluated using 3D face data and produce keys of suitable length for 128-bit Advanced Encryption Standard (AES). 2.5 A Novel Algorithm towards Designing the Protocol for Generation of Secret key with Authentication in Collaboration (PGSAC) Shyamasree Mukherjee et al. [6] proposed an authentication technique for new nodes to an ad-hoc network. Here, the request-reply messages are used to generate a secret key at the two ends. It also estimates the distance of a node from the power loss of a message from node. Based on this distance, both the sender and the receiver separately compute the same secret key.Itdoes not use GPS and identifies location of nodes by distance and direction only. If a new node S with cryptographic key K want to communicate with an existing node R in an ad hoc network by using this key K node S encrypt message and transmits to node R and the encrypted message by node R decryptedbyS Using the same key k. This mechanism consists of two parts key generation and key management. Fig -4: Trust model Steps for key generation: Step 1: New node S sends request signal to node R with power of the signal P1 and simultaneously S also sends request signal to friend nodes A andBwithpowerP2and P3. Step 2: R can compute the power loss L1 and the distance D1 using the given equation. Step3: A can compute the power losses L2 and sends to R. Similarly B can compute the power losses L3 and send to R.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1390 Step4: Using L2 and L3 node R computes the distanceD2, D3 and arranges the distances in ascending order to have the key k. Step5: A and B also send the same with power P2 andP3and S can compute distances D1, D2 and D3 from power losses L1, L2 and L3 and S arranges the distances D1, D2 and D3 in ascending order and makes the same key itself without any key transmission. 2.6SymmetricKeyAlgorithmUsingVernam Cipher : VSA Bhagyashri K. Pawar et al. [7] suggest a method to achieve security measures for data and information. In this, cryptosystem consists of threealgorithms:1)keygeneration 2) encryption process 3) decryption process. The key generation is dependent on current system time. Different keys are generated at different instances therefore time is a major factor in this system. The key generationisdoneusing public static long currentTimeMillis() method in java which makes the system more secure and at every start of the session the key will be different. Steps for key generation: Step1: Take current time in milliseconds. Step2: Pass this time value to simple random number generator. Step3: Calculate its absolute value Step4: Generate Key1. Step5: Take next instant of system’s time Step6: To generate Key2 follow step2 & 3. For every message a new pair of keys is generated therefore this system achieves a high level of secrecy as the system is symmetric which makes the proposed cryptosystem more unique. 3. CONCLUSION The literature survey could fetch a number of different methods to generate the cryptographic key. The limitations of the existing methods are: key is stored somewhere else with a protection of user specifiedpassword,ifthepassword becomes compromised in anyway by the attacker then the key also becomes compromised. For that, Biometrics is combined with traditional cryptography to ensure better security systems. Here the cryptographic key is strongly linked with the fingerprint traits of the user and the key is generated using cancelable fingerprint template of both the communicating parties at their sites. This cryptographic key is not required to be remembered and also not required to be stored. REFERENCES [1] A. Sarkar and B. K. Singh, "Cancelable biometric based key generation for symmetric cryptography," 2017 International Conference on Inventive Communication and Computational Technologies (ICICCT), Coimbatore, 2017, pp. 404-409. [2] R. Nayak, C. V. Sastry and J. Pradhan, "A matrix formulation for NTRU cryptosystem," 2008 16th IEEE International Conferenceon Networks, NewDelhi, 2008, pp. 1-5. [3] R. M. Mhatre and D. Bhardwaj, "Classifying Iris Image Based on Feature Extraction and Encryption Using Bio- Chaotic Algorithm (BCA)," 2015 International Conference on Computational Intelligence and Communication Networks (CICN), Jabalpur, 2015, pp. 1068-1073. [4] S. Barman, S. Chattopadhyay and D. Samanta, "Fingerprint based symmetric cryptography," 2014 International Conference on High Performance Computing and Applications (ICHPCA), Bhubaneswar, 2014, pp. 1-6. [5] B. Chen and V. Chandran, "Biometric Based Cryptographic Key Generation fromFaces," 9thBiennial ConferenceoftheAustralianPatternRecognitionSociety on Digital Image Computing Techniques and Applications (DICTA 2007), Glenelg, Australia,2007,pp. 394-401. [6] S. Mukherjee, S. Choudhury, N. Chaki and D. Mukhopadhyay, "A Novel Algorithm towards Designing the Protocol for Generation of Secret-Key with Authentication in Collaboration (PGSAC)," 2007 International Symposium on Information Technology Convergence (ISITC 2007), Joenju, 2007, pp. 353-327. [7] S. S. Hatkar and B. K. Pawar, "Symmetric key algorithm using vernam cipher: VSA," 2016 International Conference on Inventive Computation Technologies (ICICT), Coimbatore, 2016, pp. 1-5.