Abstract – In most of the real time scenario, authentication is required very much so as to enable the person to access a private database of any type. Researchers have started using biometric traits for the authenticity of a person. The various biometrics traits available are face, iris, palm print, hand geometry, fingerprint, ear etc., But the application that uses a single biometric trait often have to challenge with noisy data, restricted degrees of autonomy, non-universality of the biometric trait and intolerable error rates. Multi biometric systems seem to lighten these drawbacks by providing multiple verification of the same personality. Biometric fusion is the use of multiple biometric inputs or methods of processing to improve performance. In this paper, a novel combination of Multi biometric fusion, Symmetric Cryptography and Asymmetric Cryptography is proposed. A fused biometric image is encrypted using Advanced Encryption Standard whose secret key is in turn encrypted using elliptic curve cryptography which is considered as one of the efficient Asymmetric cryptographic algorithms. As the symmetric cryptographic algorithms involve in key exchange mechanism, the secret key is proposed to be secured by using ECC. Hence, the system proposed is expected to be more secured to store the biometric traits of an individual.
Biometric Hashing technique for AuthenticationAnIsh Kumar
This document summarizes a student project on bio-hashing authentication techniques. It includes an outline of topics to be covered such as types of cryptography, image encryption methods, cellular automata techniques like Langton's ant, and algorithms like Blowfish. The project is mentored by Dr. Debasis Giri and includes four students - Ankit Agarwal, Tuhin Kundu, Bachu Paul, and Anish Kumar. It aims to introduce bio-hashing authentication, discuss related work, and propose improvements such as generating a visually meaningful encrypted image.
Security remains to be an important aspect in the current age that is characterized with heavy internet usage. People as well as organizations are moving away from ancient authentication schemes like passwords to biometric authentication schemes as they provide better confidentiality and integrity of authentication information. Although biometrics are unique to an individual, they are still susceptible to attacks thus the need to secure them. Several techniques such as encryption, steganography, have been proposed with aim of achieving the security need brought about their use. This paper reviewed some proposed models for biometric template security and their limitation as well as provide recommendation to address some of the limitations outlined.
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
11.biometric data security using recursive visual cryptographyAlexander Decker
This document summarizes a research paper on using recursive visual cryptography and biometric authentication to securely store biometric data. The paper proposes a scheme where secrets can be recursively embedded within image shares created by visual cryptography. Additionally, biometric authentication is used to securely access the shares. The scheme involves creating shares of secrets, embedding those shares as additional secrets within other shares, and authenticating users through iris recognition before revealing embedded secrets. This allows for multiple secrets to be hidden and revealed securely through the visual cryptography and biometric authentication methods combined.
A New Approach of Cryptographic Technique Using Simple ECC & ECFIJAEMSJORNAL
Cryptography is the technique in which usually a file is converted into unreadable format by using public key and private key system called as public key cryptosystem. Then as per the user requirement that file is send to another user for secure data transmission. In this paper we purposed an image based cryptography that Elliptic Curve Function (ECF) techniques and pseudo random encoding technique on images to enhance the security of RFID communication. In the ECF approach, the basic idea is to replace the Elliptic Curve Function (ECF) of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The ECF based technique is the most challenging one as it is difficult to differentiate between the cover object and Crypto object if few ECF bits of the cover object are replaced. In Pseudo Random technique, a random key is used as seed for the Pseudo Random Number Generator in needed in the embedding process. Both the techniques used a Crypto key while embedding messages inside the cover image. By using the key, the chance of getting attacked by the attacker is reduced.
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemIJMER
ABSTRACT: Multibiometrics is the combination of one or more biometrics (e.g., Fingerprint, Iris, and Face). Researchers
are focusing on how to provide security to the system, the template which was generated from the biometric need to be
protected. The problems of unimodal biometrics are solved by multibiometrics. The main objective is to provide a security to
the biometric template by generating a secure sketch by making use of multibiometric cryptosystem and which is stored in a
database. Once the biometric template is stolen it becomes a serious issue for the security of the system and also for user
privacy. In the existing approach, feature level fusion is used to combine the features securely with well-known biometric
cryptosystems namely fuzzy vault and fuzzy commitment. The drawbacks of existing system include accuracy of the biometric
need to be improved and the noises in the biometrics also need to be reduced. The proposed work is to enhance the security
using multibiometric cryptosystem in distributed system applications like e-commerce transactions, e-banking and ATM.
Keywords: Biometric Cryptosystem, Error correcting code, Fingerprint, Iris, Multibiometrics, Unimodal biometrics.
Performance Evaluation of Hybrid Method for Securing and Compressing ImagesMangaiK4
Abstract—Security is a most important field of research work for sending and receiving of data in secret way over the network.Cryptographyis a method for securing transformation like image, audio, video, text without any hacking problem.Encryption and Decryption are two methods used to secure the data. Image compression technique used to reducing the size of an image for effective data communication. There are variety of algorithms has been proposed in the literature for securing images using encryption/decryption techniques and reduce the size of images using image compression techniques. These techniques still need improvement to overcome issues, challenges and its limitations. Hence in this research work a hybrid method which combines securing image using RSA, hill cipher and 2bit rotation and compressing of images using lossless compression algorithm has been proposed. This method compared to execution time of existing method. This method secures the image and reduces the size of the image for data communication over the internet. This method is suitable for various applications uses images like remote sensing, medical and Spatio-temporal.
At Softroniics we provide job oriented training for freshers in IT sector. We are Pioneers in all leading technologies like Android, Java, .NET, PHP, Python, Embedded Systems, Matlab, NS2, VLSI etc. We are specializiling in technologies like Big Data, Cloud Computing, Internet Of Things (iOT), Data Mining, Networking, Information Security, Image Processing, Mechanical, Automobile automation and many other. We are providing long term and short term internship also.
We are providing short term in industrial training, internship and inplant training for Btech/Bsc/MCA/MTech students. Attached is the list of Topics for Mechanical, Automobile and Mechatronics areas.
MD MANIKANDAN-9037291113,04954021113
softroniics@gmail.com
www.softroniics.com
Biometric Hashing technique for AuthenticationAnIsh Kumar
This document summarizes a student project on bio-hashing authentication techniques. It includes an outline of topics to be covered such as types of cryptography, image encryption methods, cellular automata techniques like Langton's ant, and algorithms like Blowfish. The project is mentored by Dr. Debasis Giri and includes four students - Ankit Agarwal, Tuhin Kundu, Bachu Paul, and Anish Kumar. It aims to introduce bio-hashing authentication, discuss related work, and propose improvements such as generating a visually meaningful encrypted image.
Security remains to be an important aspect in the current age that is characterized with heavy internet usage. People as well as organizations are moving away from ancient authentication schemes like passwords to biometric authentication schemes as they provide better confidentiality and integrity of authentication information. Although biometrics are unique to an individual, they are still susceptible to attacks thus the need to secure them. Several techniques such as encryption, steganography, have been proposed with aim of achieving the security need brought about their use. This paper reviewed some proposed models for biometric template security and their limitation as well as provide recommendation to address some of the limitations outlined.
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
11.biometric data security using recursive visual cryptographyAlexander Decker
This document summarizes a research paper on using recursive visual cryptography and biometric authentication to securely store biometric data. The paper proposes a scheme where secrets can be recursively embedded within image shares created by visual cryptography. Additionally, biometric authentication is used to securely access the shares. The scheme involves creating shares of secrets, embedding those shares as additional secrets within other shares, and authenticating users through iris recognition before revealing embedded secrets. This allows for multiple secrets to be hidden and revealed securely through the visual cryptography and biometric authentication methods combined.
A New Approach of Cryptographic Technique Using Simple ECC & ECFIJAEMSJORNAL
Cryptography is the technique in which usually a file is converted into unreadable format by using public key and private key system called as public key cryptosystem. Then as per the user requirement that file is send to another user for secure data transmission. In this paper we purposed an image based cryptography that Elliptic Curve Function (ECF) techniques and pseudo random encoding technique on images to enhance the security of RFID communication. In the ECF approach, the basic idea is to replace the Elliptic Curve Function (ECF) of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The ECF based technique is the most challenging one as it is difficult to differentiate between the cover object and Crypto object if few ECF bits of the cover object are replaced. In Pseudo Random technique, a random key is used as seed for the Pseudo Random Number Generator in needed in the embedding process. Both the techniques used a Crypto key while embedding messages inside the cover image. By using the key, the chance of getting attacked by the attacker is reduced.
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemIJMER
ABSTRACT: Multibiometrics is the combination of one or more biometrics (e.g., Fingerprint, Iris, and Face). Researchers
are focusing on how to provide security to the system, the template which was generated from the biometric need to be
protected. The problems of unimodal biometrics are solved by multibiometrics. The main objective is to provide a security to
the biometric template by generating a secure sketch by making use of multibiometric cryptosystem and which is stored in a
database. Once the biometric template is stolen it becomes a serious issue for the security of the system and also for user
privacy. In the existing approach, feature level fusion is used to combine the features securely with well-known biometric
cryptosystems namely fuzzy vault and fuzzy commitment. The drawbacks of existing system include accuracy of the biometric
need to be improved and the noises in the biometrics also need to be reduced. The proposed work is to enhance the security
using multibiometric cryptosystem in distributed system applications like e-commerce transactions, e-banking and ATM.
Keywords: Biometric Cryptosystem, Error correcting code, Fingerprint, Iris, Multibiometrics, Unimodal biometrics.
Performance Evaluation of Hybrid Method for Securing and Compressing ImagesMangaiK4
Abstract—Security is a most important field of research work for sending and receiving of data in secret way over the network.Cryptographyis a method for securing transformation like image, audio, video, text without any hacking problem.Encryption and Decryption are two methods used to secure the data. Image compression technique used to reducing the size of an image for effective data communication. There are variety of algorithms has been proposed in the literature for securing images using encryption/decryption techniques and reduce the size of images using image compression techniques. These techniques still need improvement to overcome issues, challenges and its limitations. Hence in this research work a hybrid method which combines securing image using RSA, hill cipher and 2bit rotation and compressing of images using lossless compression algorithm has been proposed. This method compared to execution time of existing method. This method secures the image and reduces the size of the image for data communication over the internet. This method is suitable for various applications uses images like remote sensing, medical and Spatio-temporal.
At Softroniics we provide job oriented training for freshers in IT sector. We are Pioneers in all leading technologies like Android, Java, .NET, PHP, Python, Embedded Systems, Matlab, NS2, VLSI etc. We are specializiling in technologies like Big Data, Cloud Computing, Internet Of Things (iOT), Data Mining, Networking, Information Security, Image Processing, Mechanical, Automobile automation and many other. We are providing long term and short term internship also.
We are providing short term in industrial training, internship and inplant training for Btech/Bsc/MCA/MTech students. Attached is the list of Topics for Mechanical, Automobile and Mechatronics areas.
MD MANIKANDAN-9037291113,04954021113
softroniics@gmail.com
www.softroniics.com
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...CSCJournals
In this article, the security performance and quality for image encryption and decryption based on filter bank and the combination between XOR and addition modulo 28 have been studied and assessed. The most common security parameters for image encryption and decryption have been employed. The parameters have been used to examine the proposed image encryption scheme with one and two rounds. The parameters include histogram, correlation coefficient, global entropy, block entropy, avalanche effect, number of pixel change rate (NPCR), unified average change intensity (UACI), exhaustive key analysis, and key sensitivity test. The simulation results proved that, the image encryption process passes all these tests. Moreover, it reaches or excels the current state of the arts. So the encrypted image becomes random-like from the statistical point of views after encryption.
Secure Data Storage on Cloud System for Privacy PreservingIRJET Journal
The document describes a proposed system for secure data storage on cloud systems using elliptic curve cryptography and Shamir's secret sharing algorithm. It discusses how ECC and secret sharing can be used to encrypt data before storing it on the cloud to preserve privacy. The system aims to provide security services like confidentiality. It generates keys using ECC and secret sharing that are shared with authenticated users to allow access to encrypted data stored on the cloud. The system reduces storage and computational overhead for the customer and cloud storage server.
Photography Capture and Encryption on Smart Phones with Android Operating SystemIJRES Journal
This paper presents the development of an application for the encryption of photographs on Smartphones with
the Android operating system, understanding how that image captured by the camerawithin the device , in order
to ensure the privacy of this content to the user. The significance lies that the image data are encrypted before
stored, improving the level of safety. The encryption algorithm used to encrypt the photographs is AES with a
key of 256 bits. The results show that encryption time is imperceptible for the user and the decoded image is not
at least changed from the original.
Unified Approach With Neural Network for Authentication, Security and Compres...CSCJournals
The Present demands of scientific and social life forced image processing based applications to have a tremendous growth. This growth at the same time has given numbers of challenges to researcher to meet the desired objectives of either users or from solution perspectives. Among the various challenges, the most dominating areas are: reduction in required memory spaces for storage or taken transmission time from one location to other, protection of image contents to maintain the privacy and to facilitate the mechanism to identify the malicious modification if there is any either in storage or in transmission channel. Even though there are number of methods proposed by various researchers and are existed as solutions, questions are remain open in terms of quality, cost and complexity. In this paper we have proposed the concept based on neural network to achieve the quality of compression, protection and authentication all together using the ability of universal approximation by learning, one way property and one to one mapping characteristics correspondingly. With the proposed methods not only we can authenticate the image but also positions of malicious activity given in the image can be located with high precision. Proposed methods are very efficient in performance as well as carry the features of simplicity and cost effectiveness.
High Security Cryptographic Technique Using Steganography and Chaotic Image E...IOSR Journals
This document summarizes a proposed cryptographic technique that combines steganography and chaotic image encryption to provide high security. Steganography is used to hide a message within a cover image by embedding it in the least significant bits of pixel values without affecting image quality. The resulting stego-image is then encrypted using triple-key chaotic image encryption based on the logistic map, making the encrypted data highly sensitive to changes in the initial encryption keys. The technique provides four layers of security to securely transmit hidden messages within digital images.
From the last several years data and Security has become a main concern for anyone who connected to the internet. Data security prevents any modification in our data and ensures that our data is only accessible by the intended receiver. We have redeveloped methods and algorithm to achieve this level of security. Cryptography Is a technique for securing data, information and communication using some algorithms that make the data unreadable for human eye. We can decrypt the data using algorithm that is predefined by the sender. Devendra Kumar Meena | Dr. A. Rengarajan "Cryptography Methodologies" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-6 , October 2022, URL: https://www.ijtsrd.com/papers/ijtsrd52232.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/52232/cryptography-methodologies/devendra-kumar-meena
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...IJEACS
In current scenario the entire world is moving towards digital communication for fast and better communication. But in this a problem rises with security i.e. when we have to store information (either data or image) at any casual location or transmit information through internet. As internet is an open transmission medium, security of data becomes very important. To defend our information from piracy or from hacking we use a technique and i.e. known as Encryption Technique. In this paper, we use image as information and use an advance approach of well-known encryption techniques like AES, Genetic Algorithm, and RSA algorithm to encrypt it and keep our information safe from hackers or intruders making it highly difficult and time consuming to decipher the image without using the key.
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEIJNSA Journal
In this paper, a new image encryption scheme using a secret key of 144-bits is proposed. In the substitution process of the scheme, image is divided into blocks and subsequently into color components. Each color component is modified by performing bitwise operation which depends on secret key as well as a few most significant bits of its previous and next color component. Three rounds are taken to complete substitution process. To make cipher more robust, a feedback mechanism is also applied by modifying used secret key after encrypting each block. Further, resultant image is partitioned into several key based dynamic sub-images. Each sub-image passes through the scrambling process where pixels of sub-image are reshuffled within itself by using a generated magic square matrix. Five rounds are taken for scrambling process. The propose scheme is simple, fast and sensitive to the secret key. Due to high order of substitution and permutation, common attacks like linear and differential cryptanalysis are infeasible. The experimental results show that the proposed encryption technique is efficient and has high security features.
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...IRJET Journal
This document summarizes various methods for generating cryptographic keys from biometric traits. It discusses generating keys from fingerprints, iris images, and faces. For fingerprints, minutiae points are extracted from images and used to generate binary strings as keys. For iris images, Scale-Invariant Feature Transform is used to extract features, which are then encrypted using a bio-chaotic algorithm and quantum cryptography to generate keys. Face biometrics employs an entropy-based extraction and Reed-Solomon error correction to generate deterministic bit sequences as keys of suitable length for AES encryption. The document concludes that incorporating biometrics with cryptography provides stronger security by linking keys to users' biometric traits, eliminating the need to store or remember keys separately.
Using image stitching and image steganography security can be provided to any image which has to be sent over the network or transferred using any electronic mode. There is a message and a secret image that has to be sent. The secret image is divided into parts.The first phase is the Encrypting Phase, which deals with the process of converting the actual secret message into ciphertext using the AES algorithm. In the second phase which is the Embedding Phase, the cipher text is embedded into any part of the secret image that is to be sent. Third phase is the Hiding Phase, where steganography is performed on the output image of Embedding Phase and other parts of the image where the parts are camouflaged by another image using least significant bit replacement. These individual parts are sent to the concerned receiver. At the receivers end decryption of Hiding phase and Embedding Phase takes place respectively. The parts obtained are stitched together using k nearest method. Using SIFT features the quality of the image is improved.
Using image stitching and image steganography security can be provided to any image which has to be
sent over the network or transferred using any electronic mode. There is a message and a secret image that
has to be sent. The secret image is divided into parts.The first phase is the Encrypting Phase, which deals
with the process of converting the actual secret message into ciphertext using the AES algorithm. In the
second phase which is the Embedding Phase, the cipher text is embedded into any part of the secret image
that is to be sent. Third phase is the Hiding Phase, where steganography is performed on the output image
of Embedding Phase and other parts of the image where the parts are camouflaged by another image using
least significant bit replacement. These individual parts are sent to the concerned receiver. At the
receivers end decryption of Hiding phase and Embedding Phase takes place respectively. The parts
obtained are stitched together using k nearest method. Using SIFT features the quality of the image is
improved.
Encryption-Decryption RGB Color Image Using Matrix Multiplicationijcsit
An enhanced technique of color image encryption based on random matrix key encoding is proposed. To
encrypt the color image a separation into Red Green and Blue (R, G, B) channels will applied. Each
channel is encrypted using a technique called double random matrix key encoding then three new coding
image matrices are constructed. To obtain the reconstructed image that is the same as the original image
in the receipted side; simple extracted and decryption operations can be maintained. The results shown
that the proposed technique is powerful for color image encryption and decryption and a MATLAB and
simulations were used to get the results.
The proposed technique has high security features because each color component is separately treated
using its own double random matrix key which is generated randomly and make the process of hacking the
three keys very difficult.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
This document summarizes an article from the International Journal of Engineering Inventions that proposes a method for image authentication and ensuring data integrity based on discrete wavelet transform. The method integrates message authentication codes and encryption such that the hashed value of an encrypted image is the same as the hashed value of the original unencrypted image, allowing authenticity to be proven without decrypting or revealing the actual data. It applies a digital watermark and signature to the original image using cryptography before transmission. The encryption is used to securely transmit the data over open networks by encrypting the image with a public key and decrypting it with a private key. The document outlines the objectives, introduction, and methodology of applying digital signatures, watermarking, and
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...ijcisjournal
Securing data storage using biometrics is the current trend. Different physiological as well as behavioral biometrics like face, fingerprint, iris, Gait, voice etc.. is used in providing security to the data. The proposed work explains about the biometric encryption technology which will securely generate a digital key using two biometric modalities. Iris is encrypted using Fingerprint ID of 32-bit as the key in this work.
For encryption Blowfish algorithm is used and the encrypted template is stored in the database and one is given to the user. During the authentication time user input the template and the fingerprint. This template is then decrypted and verified with the original template taken from the database to check whether the user is genuine or an imposter. Hamming distance is used to measure the matching of the templates. CASIA Iris
database is used for experimentation and fingerprint images read through the R303 - fingerprint reader.
This document discusses a proposed approach to fuse iris and fingerprint images for multimodal biometrics identification and cryptographic key generation. It involves extracting features from the iris and fingerprint images, fusing the features to create a multimodal biometric template, and then generating a cryptographic key from the fused features for added security. The approach aims to improve accuracy over unimodal biometrics and protect the biometric template from being hacked by an intruder.
This document summarizes a research paper that proposes a novel image encryption approach for addressing security issues. The approach has two stages: 1) data encryption where biometric data like face and knuckle images are converted to binary then run length encoded for encryption. 2) Matching encrypted data where encrypted samples are stored and matched for authentication. Experiments on face and knuckle datasets showed the approach performed well, encrypting biometric data with precision and recall over 80% for matching. The simple encryption method effectively provided security for biometric identification systems.
This document proposes a method for preventing cheating of messages based on block cipher using a digital envelope. It begins with an introduction to the need for data security during storage and transmission. It then discusses the AES encryption algorithm and related work involving encryption for wireless devices. The proposed method uses AES key expansion techniques to generate multiple keys for encryption and decryption of messages using a digital envelope, packing the encrypted message and key into a single packet. It claims this prevents attackers from accessing sensitive data. Future work could expand this to image encryption and decryption applications.
Prevention of Cheating Message based on Block Cipher using Digital Envelopeiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...MangaiK4
This document summarizes a research paper on applying ancient Indian agricultural practices in a cloud computing environment. Some key points:
- The paper proposes an "Agri cloud" model to provide Indian farmers access to digital farming services through cloud computing, allowing improved productivity and livelihoods.
- It discusses establishing "Village Innovation Centers" to provide digital literacy training and resources to farmers to help them access the cloud services.
- The proposed cloud model would offer on-demand services like expert advice, weather data, soil information, training, and marketing assistance to empower farmers.
- The researchers believe this approach can help modernize Indian agriculture using a combination of ancient practices and new technologies.
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...MangaiK4
This document summarizes research on sparse representation techniques and optimal algorithms for computer vision tasks. It discusses how sparse representation can provide efficient encoding of images and signals. Two key computer vision problems discussed are face recognition and human pose estimation. The document proposes a model that uses sparse representation and parallel processing algorithms to recognize faces, estimate poses, and convert that information into voice signals to assist visually impaired users in understanding images.
More Related Content
Similar to Multi-Biometric Authentication through Hybrid Cryptographic System
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...CSCJournals
In this article, the security performance and quality for image encryption and decryption based on filter bank and the combination between XOR and addition modulo 28 have been studied and assessed. The most common security parameters for image encryption and decryption have been employed. The parameters have been used to examine the proposed image encryption scheme with one and two rounds. The parameters include histogram, correlation coefficient, global entropy, block entropy, avalanche effect, number of pixel change rate (NPCR), unified average change intensity (UACI), exhaustive key analysis, and key sensitivity test. The simulation results proved that, the image encryption process passes all these tests. Moreover, it reaches or excels the current state of the arts. So the encrypted image becomes random-like from the statistical point of views after encryption.
Secure Data Storage on Cloud System for Privacy PreservingIRJET Journal
The document describes a proposed system for secure data storage on cloud systems using elliptic curve cryptography and Shamir's secret sharing algorithm. It discusses how ECC and secret sharing can be used to encrypt data before storing it on the cloud to preserve privacy. The system aims to provide security services like confidentiality. It generates keys using ECC and secret sharing that are shared with authenticated users to allow access to encrypted data stored on the cloud. The system reduces storage and computational overhead for the customer and cloud storage server.
Photography Capture and Encryption on Smart Phones with Android Operating SystemIJRES Journal
This paper presents the development of an application for the encryption of photographs on Smartphones with
the Android operating system, understanding how that image captured by the camerawithin the device , in order
to ensure the privacy of this content to the user. The significance lies that the image data are encrypted before
stored, improving the level of safety. The encryption algorithm used to encrypt the photographs is AES with a
key of 256 bits. The results show that encryption time is imperceptible for the user and the decoded image is not
at least changed from the original.
Unified Approach With Neural Network for Authentication, Security and Compres...CSCJournals
The Present demands of scientific and social life forced image processing based applications to have a tremendous growth. This growth at the same time has given numbers of challenges to researcher to meet the desired objectives of either users or from solution perspectives. Among the various challenges, the most dominating areas are: reduction in required memory spaces for storage or taken transmission time from one location to other, protection of image contents to maintain the privacy and to facilitate the mechanism to identify the malicious modification if there is any either in storage or in transmission channel. Even though there are number of methods proposed by various researchers and are existed as solutions, questions are remain open in terms of quality, cost and complexity. In this paper we have proposed the concept based on neural network to achieve the quality of compression, protection and authentication all together using the ability of universal approximation by learning, one way property and one to one mapping characteristics correspondingly. With the proposed methods not only we can authenticate the image but also positions of malicious activity given in the image can be located with high precision. Proposed methods are very efficient in performance as well as carry the features of simplicity and cost effectiveness.
High Security Cryptographic Technique Using Steganography and Chaotic Image E...IOSR Journals
This document summarizes a proposed cryptographic technique that combines steganography and chaotic image encryption to provide high security. Steganography is used to hide a message within a cover image by embedding it in the least significant bits of pixel values without affecting image quality. The resulting stego-image is then encrypted using triple-key chaotic image encryption based on the logistic map, making the encrypted data highly sensitive to changes in the initial encryption keys. The technique provides four layers of security to securely transmit hidden messages within digital images.
From the last several years data and Security has become a main concern for anyone who connected to the internet. Data security prevents any modification in our data and ensures that our data is only accessible by the intended receiver. We have redeveloped methods and algorithm to achieve this level of security. Cryptography Is a technique for securing data, information and communication using some algorithms that make the data unreadable for human eye. We can decrypt the data using algorithm that is predefined by the sender. Devendra Kumar Meena | Dr. A. Rengarajan "Cryptography Methodologies" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-6 , October 2022, URL: https://www.ijtsrd.com/papers/ijtsrd52232.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/52232/cryptography-methodologies/devendra-kumar-meena
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...IJEACS
In current scenario the entire world is moving towards digital communication for fast and better communication. But in this a problem rises with security i.e. when we have to store information (either data or image) at any casual location or transmit information through internet. As internet is an open transmission medium, security of data becomes very important. To defend our information from piracy or from hacking we use a technique and i.e. known as Encryption Technique. In this paper, we use image as information and use an advance approach of well-known encryption techniques like AES, Genetic Algorithm, and RSA algorithm to encrypt it and keep our information safe from hackers or intruders making it highly difficult and time consuming to decipher the image without using the key.
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEIJNSA Journal
In this paper, a new image encryption scheme using a secret key of 144-bits is proposed. In the substitution process of the scheme, image is divided into blocks and subsequently into color components. Each color component is modified by performing bitwise operation which depends on secret key as well as a few most significant bits of its previous and next color component. Three rounds are taken to complete substitution process. To make cipher more robust, a feedback mechanism is also applied by modifying used secret key after encrypting each block. Further, resultant image is partitioned into several key based dynamic sub-images. Each sub-image passes through the scrambling process where pixels of sub-image are reshuffled within itself by using a generated magic square matrix. Five rounds are taken for scrambling process. The propose scheme is simple, fast and sensitive to the secret key. Due to high order of substitution and permutation, common attacks like linear and differential cryptanalysis are infeasible. The experimental results show that the proposed encryption technique is efficient and has high security features.
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...IRJET Journal
This document summarizes various methods for generating cryptographic keys from biometric traits. It discusses generating keys from fingerprints, iris images, and faces. For fingerprints, minutiae points are extracted from images and used to generate binary strings as keys. For iris images, Scale-Invariant Feature Transform is used to extract features, which are then encrypted using a bio-chaotic algorithm and quantum cryptography to generate keys. Face biometrics employs an entropy-based extraction and Reed-Solomon error correction to generate deterministic bit sequences as keys of suitable length for AES encryption. The document concludes that incorporating biometrics with cryptography provides stronger security by linking keys to users' biometric traits, eliminating the need to store or remember keys separately.
Using image stitching and image steganography security can be provided to any image which has to be sent over the network or transferred using any electronic mode. There is a message and a secret image that has to be sent. The secret image is divided into parts.The first phase is the Encrypting Phase, which deals with the process of converting the actual secret message into ciphertext using the AES algorithm. In the second phase which is the Embedding Phase, the cipher text is embedded into any part of the secret image that is to be sent. Third phase is the Hiding Phase, where steganography is performed on the output image of Embedding Phase and other parts of the image where the parts are camouflaged by another image using least significant bit replacement. These individual parts are sent to the concerned receiver. At the receivers end decryption of Hiding phase and Embedding Phase takes place respectively. The parts obtained are stitched together using k nearest method. Using SIFT features the quality of the image is improved.
Using image stitching and image steganography security can be provided to any image which has to be
sent over the network or transferred using any electronic mode. There is a message and a secret image that
has to be sent. The secret image is divided into parts.The first phase is the Encrypting Phase, which deals
with the process of converting the actual secret message into ciphertext using the AES algorithm. In the
second phase which is the Embedding Phase, the cipher text is embedded into any part of the secret image
that is to be sent. Third phase is the Hiding Phase, where steganography is performed on the output image
of Embedding Phase and other parts of the image where the parts are camouflaged by another image using
least significant bit replacement. These individual parts are sent to the concerned receiver. At the
receivers end decryption of Hiding phase and Embedding Phase takes place respectively. The parts
obtained are stitched together using k nearest method. Using SIFT features the quality of the image is
improved.
Encryption-Decryption RGB Color Image Using Matrix Multiplicationijcsit
An enhanced technique of color image encryption based on random matrix key encoding is proposed. To
encrypt the color image a separation into Red Green and Blue (R, G, B) channels will applied. Each
channel is encrypted using a technique called double random matrix key encoding then three new coding
image matrices are constructed. To obtain the reconstructed image that is the same as the original image
in the receipted side; simple extracted and decryption operations can be maintained. The results shown
that the proposed technique is powerful for color image encryption and decryption and a MATLAB and
simulations were used to get the results.
The proposed technique has high security features because each color component is separately treated
using its own double random matrix key which is generated randomly and make the process of hacking the
three keys very difficult.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
This document summarizes an article from the International Journal of Engineering Inventions that proposes a method for image authentication and ensuring data integrity based on discrete wavelet transform. The method integrates message authentication codes and encryption such that the hashed value of an encrypted image is the same as the hashed value of the original unencrypted image, allowing authenticity to be proven without decrypting or revealing the actual data. It applies a digital watermark and signature to the original image using cryptography before transmission. The encryption is used to securely transmit the data over open networks by encrypting the image with a public key and decrypting it with a private key. The document outlines the objectives, introduction, and methodology of applying digital signatures, watermarking, and
MULTIMODAL BIOMETRIC AUTHENTICATION: SECURED ENCRYPTION OF IRIS USING FINGERP...ijcisjournal
Securing data storage using biometrics is the current trend. Different physiological as well as behavioral biometrics like face, fingerprint, iris, Gait, voice etc.. is used in providing security to the data. The proposed work explains about the biometric encryption technology which will securely generate a digital key using two biometric modalities. Iris is encrypted using Fingerprint ID of 32-bit as the key in this work.
For encryption Blowfish algorithm is used and the encrypted template is stored in the database and one is given to the user. During the authentication time user input the template and the fingerprint. This template is then decrypted and verified with the original template taken from the database to check whether the user is genuine or an imposter. Hamming distance is used to measure the matching of the templates. CASIA Iris
database is used for experimentation and fingerprint images read through the R303 - fingerprint reader.
This document discusses a proposed approach to fuse iris and fingerprint images for multimodal biometrics identification and cryptographic key generation. It involves extracting features from the iris and fingerprint images, fusing the features to create a multimodal biometric template, and then generating a cryptographic key from the fused features for added security. The approach aims to improve accuracy over unimodal biometrics and protect the biometric template from being hacked by an intruder.
This document summarizes a research paper that proposes a novel image encryption approach for addressing security issues. The approach has two stages: 1) data encryption where biometric data like face and knuckle images are converted to binary then run length encoded for encryption. 2) Matching encrypted data where encrypted samples are stored and matched for authentication. Experiments on face and knuckle datasets showed the approach performed well, encrypting biometric data with precision and recall over 80% for matching. The simple encryption method effectively provided security for biometric identification systems.
This document proposes a method for preventing cheating of messages based on block cipher using a digital envelope. It begins with an introduction to the need for data security during storage and transmission. It then discusses the AES encryption algorithm and related work involving encryption for wireless devices. The proposed method uses AES key expansion techniques to generate multiple keys for encryption and decryption of messages using a digital envelope, packing the encrypted message and key into a single packet. It claims this prevents attackers from accessing sensitive data. Future work could expand this to image encryption and decryption applications.
Prevention of Cheating Message based on Block Cipher using Digital Envelopeiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Similar to Multi-Biometric Authentication through Hybrid Cryptographic System (20)
Application of Ancient Indian Agricultural Practices in Cloud Computing Envir...MangaiK4
This document summarizes a research paper on applying ancient Indian agricultural practices in a cloud computing environment. Some key points:
- The paper proposes an "Agri cloud" model to provide Indian farmers access to digital farming services through cloud computing, allowing improved productivity and livelihoods.
- It discusses establishing "Village Innovation Centers" to provide digital literacy training and resources to farmers to help them access the cloud services.
- The proposed cloud model would offer on-demand services like expert advice, weather data, soil information, training, and marketing assistance to empower farmers.
- The researchers believe this approach can help modernize Indian agriculture using a combination of ancient practices and new technologies.
A Study on Sparse Representation and Optimal Algorithms in Intelligent Comput...MangaiK4
This document summarizes research on sparse representation techniques and optimal algorithms for computer vision tasks. It discusses how sparse representation can provide efficient encoding of images and signals. Two key computer vision problems discussed are face recognition and human pose estimation. The document proposes a model that uses sparse representation and parallel processing algorithms to recognize faces, estimate poses, and convert that information into voice signals to assist visually impaired users in understanding images.
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationMangaiK4
Abstract - High speed low power viterbi decoders for trellis code modulation is well known for the delay consumption in underwater communication. In transmission system wireless communication is the transfer of information between two or more points that are not connected by an electrical conductor. WiMAX is the wireless communication standard designed to provide 30 to 40 Mega bits per second data rates. WiMAX as a standards based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL. WiMAX can provide at home or mobile internet access across whole cities or countries. The address generation of WiMAX is carried out by interleaver and deinterleaver. Interleaving is used to overcome correlated channel noise such as burst error or fading. The interleaver/deinterleaver rearranges input data such that consecutive data are spaced apart. The interleaved memory is to improve the speed of access to memory. The viterbi technique reduces the bit error rate and delay using wimax.
Relation Extraction using Hybrid Approach and an Ensemble AlgorithmMangaiK4
Abstract: The amount of information stored in the form of digital has a gigantic growth in this electronic era. Extraction of heterogeneous entities from biomedical documents is being a big challenge as achieving high f-score is still a problem. Text Mining plays a vital role for extracting different types of entities and finding relationship between the entities from huge collection of biomedical documents. We have proposed hybrid approach which includes a Dictionary based approach and a Rule based approach to reduce the number of false negatives and the Random Forest Algorithm to improve f-score measure.
Saturation Throughput and Delay Aware Asynchronous Noc Using Fuzzy LogicMangaiK4
Abstract-Due to scaling in recent trends in modern semiconductor industries, critical instance such as voltage spikes, temperature, interlink between IC circuits has been improvised under the design. The saturation throughput and average message delay are used as performance metrics to evaluate the throughput. We introduced the fuzzy logic based asynchronous NoC to attain the high throughput and diminish the delay between the inter logic circuits aim to select the less congested paths to produce load balance in the network especially under realistic traffic loads. Our Fuzzy logic based routing algorithm is an adaptive, low cost, and scalable. It outperforms against different adaptive routing algorithms in the average delay and saturation throughput for various traffic patterns. STDR can achieve up to 12%–32% average message delay lower than that of other routing algorithms. Moreover, the proposed scheme yields improvements in saturation throughput by up to 11%–82% compared with other adaptive routing algorithms
Abstract - A password is a sequence of characters used to determine whether the user is authenticated or not. Nowadays most of the password is text-based. Since text based password is hard to remember people try to use simple memorable password such as pet names, phone number, etc. which are easy to break by intruders. The main idea behind the paper is to replace the text-based passwords by image based password and encrypt using RSA algorithm. Our experimental result shows that image passwords are easy to remember, better than the text.
A Framework for Desktop Virtual Reality Application for EducationMangaiK4
This document discusses the development of a virtual reality (VR) application for educational purposes. It begins by outlining the benefits of field visits for students but also notes the limitations of physical access. To address this, the document proposes a desktop VR application that can integrate different sources of information about the real world. It reviews literature on educational VR applications and design principles. The proposed application aims to link various types of information within a single screen to promote better learning compared to conventional materials. The document discusses evaluating the application for usability and learning effectiveness. Overall, the VR application is intended to provide students with an interactive virtual field visit experience while integrating multiple information sources for enhanced learning.
Smart Security For Data Sharing In Cloud ComputingMangaiK4
Abstract-- In these computational world security is the major Problem. Because the hackers are growing day by day. Here majorly attacker’s attacks mostly while sharing or sending the data. So here we are using PAAS i.e. windows azure as the storage which is one of the service in cloud. So to provide the security for the data here we come up with an RSA (encryption and decryption) algorithm. This is one of the security mechanism to protect the private data over the cloud.
BugLoc: Bug Localization in Multi Threaded Application via Graph Mining ApproachMangaiK4
This document summarizes a research paper that proposes a new algorithm called BugLoc for detecting bugs in multi-threaded software applications via graph mining. The algorithm uses an object template to store graph data from a sample dataset in order to reduce complexity. It then calculates threshold values and identifies frequent subgraphs to detect the exact location of software bugs. The experimental results showed that the BugLoc algorithm is efficient, accurate and scalable for large graph datasets in bug localization.
Motion Object Detection Using BGS TechniqueMangaiK4
Abstract--- The detection of moving object is an important in many applications such as a vehicle identification in a traffic monitoring system,human detection in a crime branch.In this paper we identify a vehicle in a video sequence.This paper briefly explain the detection of moving vehicle in a video.We introduce a new algorithm BGS for idntifying vehicle in a video sequence.First, we differentiate the foreground from background in frames by learning the background.Then, the image is divided into many small nonoverlapped frames. The candidates of the vehicle part can be found from the frames if there is some change in gray level between the current image and the background.The extracted background subtraction method is used in subsequent analysis to detect a vehicle and classify moving vehicle
Encroachment in Data Processing using Big Data TechnologyMangaiK4
Abstract—The nature of big data is now growing and information is present all around us in different kind of forms. The big data information plays crucial role and it provides business value for the firms and its benefits sectors by accumulating knowledge. This growth of big data around all the concerns is high and challenge in data processing technique because it contains variety of data in enormous volume. The tools which are built on the data mining algorithm provides efficient data processing mechanisms, but not fulfill the pattern of heterogeneous, so the emerging tools such like Hadoop MapReduce, Pig, SPARK, Cloudera, Impala and Enterprise RTQ, IBM Netezza and Apache Giraphe as computing tools and HBase, Hive, Neo4j and Apache Cassendra as storage tools useful in classifying, clustering and discovering the knowledge. This study will focused on the comparative study of different data processing tools, in big data analytics and their benefits will be tabulated.
A Review on - Data Hiding using Cryptography and SteganographyMangaiK4
Abstract - Security and privacy for a data transmission become a major concern due to rise of internet usage. Many developers are working continuously to make an internet safe environment, but the intruders are very smart to hack the information. For that, two entities communicating need to communicate in a way which is not susceptible to listen in or interception. So every organization uses many data encryption techniques to secure their communication. There are two security mechanisms called, Cryptography and Steganography are being applied. By merging these techniques, two level of information security is achieved. This paper discuss about the way of working Cryptography and Steganography and their different approaches.
Modeling Originators for Event Forecasting Multi-Task Learning in Mil AlgorithmMangaiK4
Abstract - Multiple-instance learning (MIL) is a speculation of supervised learning which tends to the order of bags. Like customary administered adapting, the greater part of the current MIL work is proposed in light of the suspicion that a delegate preparing set is accessible for a legitimate learning of the classifier. To manage this issue, we propose a novel Sphere-Description-Based approach for Multiple-Instance Learning (SDB-MIL). SDB-MIL takes in an ideal circle by deciding a substantial edge among the examples, and in the meantime guaranteeing that every positive sack has no less than one occasion inside the circle and every negative bags are outside the circle. In genuine MIL applications, the negative information in the preparation set may not adequately speak to the dispersion of negative information in the testing set. Thus, how to take in a proper MIL classifier when a delegate preparing set isn't accessible turns into a key test for genuine MIL applications. From the viewpoint of human examiners and approach producers, determining calculations must influence precise expectations as well as give to sup porting proof, e.g., the causal components identified with the occasion of intrigue. We build up a novel different example learning based approach that mutually handles the issue of recognizing proof based originators and conjectures occasions into what's to come. In particular, given a gathering of spilling news articles from different sources we build up a settled various occurrence learning way to deal with figure noteworthy societal occasions, for example, protests. Substantial investigates the benchmark and true MIL datasets demonstrate that SDB-MIL gets measurably preferable arrangement execution over the MIL strategies thought about.
Abstract: The common challenge for machine learning and data mining tasks is the curse of High Dimensionality. Feature selection reduces the dimensionality by selecting the relevant and optimal features from the huge dataset. In this research work, a clustering and genetic algorithm based feature selection (CLUST-GA-FS) is proposed that has three stages namely irrelevant feature removal, redundant feature removal, and optimal feature generation. The performance of the feature selection algorithms are analyzed using the parameters like classification accuracy, precision, recall and error rate. Recently, an increasing attention is given to the stability of feature selection algorithms which is an indicator that requires that similar subsets of features are selected every time the algorithm is executed on the same dataset. This work analyzes the stability of the algorithm on four publicly available dataset using stability measurements Average normal hamming distance(ANHD), Dices coefficient, Tanimoto distance, Jaccards index and Kuncheva index.
The Relationship of Mathematics to the Performance of SHCT it Students in Pro...MangaiK4
Abstract—This correlational study investigates whether Mathematics has a role in the performance of the students in their programming courses. Students’ grade points from their basic mathematics and programming courses were collected and correlated, specifically the grade points of the exiting Advanced-Diploma students from Semester 1 of Academic year 2016-2017 of Shinas College of Technology in Oman. Determining the relationship was analyzed through the use of Pearson r. Hypothesis is tested and the results of the correlation were established.
A Tentative analysis of Liver Disorder using Data Mining Algorithms J48, Deci...MangaiK4
Abstract — Nowadays healthcare field has additional data mining process became a crucial role to use for disease prediction. Data mining is that the process of investigate up info from the huge information sets. The medical information is extremely voluminous. Therefore the investigator is extremely difficult to predict the disease is challenging. To overcome this issue the researchers use data mining processing technique like classification, clustering, association rules so on. The most objective of this analysis work is to predict disease supported common attributes intake of alcohol, smoking, obesity, diabetes, consumption of contaminated food, case history of liver disease using classification algorithm. The algorithms employed in this analysis work are J48, Naive Bayes. These classification algorithms are compared base on the performance factors accuracy and execution time. The investigational results could be a improved classifier for predict the liver disease.
Marine Object Recognition using Blob AnalysisMangaiK4
Abstract: In this paper, a new method of marine object recognition using blob analysis has been proposed, which is suitable to general objects recognition. A powerful foreground blob analysis is proposed to classify frontal areas. Conventionally, the main focus of the objects is recognized by prepared researchers through towed nets and human perception, which make much cost and hazard administrators and animals. Specific marine objects, box jellyfish and ocean snake, are effectively recognized in this work. Experiments conducted on picture datasets gathered by the Australian Institute of Marine Science (AIMS) demonstrate the adequacy of the proposed strategy.
Implementation of High Speed OFDM Transceiver using FPGAMangaiK4
Abstract - Proficient, multi mode and re-configurable architecture of interleaver/de-interleaver for multiple standards, like DVB, OFDM and WLAN is presented. Interleaver plays vital role in 4G technologies to recover symbols from burst errors. The aim of our work is to design a reconfigurable modulation technique called Adaptive modulation scheme uses QAM, QPSK and BPSK modulation that adapt themselves based on channel Signal to Noise ratio. Subcarrier allocation algorithm specifically used to focus on utilizing channels with high gains. Our proposed model can achieves a data rate of min 2.5 Gbps as per 3GPP standard by adaptive modulation technique using QAM, BPSK and QPSK.
Renewable Energy Based on Current Fed Switched Inverter for Smart Grid Applic...MangaiK4
Abstract - Renewable energy is used in the current fed switched inverter for high power production. High voltage support, wide yield ranges of operation, shoot-through resistance are a portion of the desired properties of an inverter for a reliable, versatile and less ripple AC inversion. This paper proposes a single stage, high boost inverter with buck-boost capacity which has a few particular advantages over traditional voltage source inverters (VSI) like better EMI noise, wide input and output voltage range of operation, and so on. The proposed inverter is named as Current-Fed Switched Inverter (CFSI). A renewable energy based converter structure of CFSI has been created which supplies both AC and DC loads, at the same time, from a single DC supply which makes it reasonable for DC smart grid application. This paper proposes the operation and control of a CFSI based converter which directs the AC and DC conversion voltages at their reference. The advancement of the proposed converter from essential current fed DC/DC topology is explained. The closed loop controller is verified by using the MATLAB/ Simulink environment.
Detection of Nutrient Deficiencies in Plant Leaves using Image ProcessingMangaiK4
Abstract—In this paper, we suggest a model for the automatic detection and classification of nutrient deficiencies in plant leaves. In an agricultural country like India, farmers are facing lot of problems in detecting the causes for the diseases in plants. Only when the causes are sorted out, the solution can be found to treat them. With naked-eye observation it is difficult to classify the deficiency present in leaves. So with the help of image processing algorithms, we have proposed a model to detect the type of deficiencies in the leaves. The color and texture features are used to recognize and classify the deficiencies. The combinations of features prove to be very effective in deficiency detection. This paper presents an effective method for detection of nutrient deficiencies in leaves using color-texture analysis and k-means clustering.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
Liberal Approach to the Study of Indian Politics.pdf
Multi-Biometric Authentication through Hybrid Cryptographic System
1. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 04 Issue: 01 June 2015 Pages:19-21
ISSN: 2278-2397
19
Multi-Biometric Authentication through Hybrid
Cryptographic System
M.Gobi,1
R.Sridevi2
1
Assistant Professor in Computer Science, Chikkanna Government Arts College, Tiruppur, India
2
Research Scholar in Computer Science, Government Arts College, Udumalpet, India
Email: mgobimail@yahoo.com, srinashok@gmail.com
Abstract – In most of the real time scenario, authentication is required
very much so as to enable the person to access a private database of
any type. Researchers have started using biometric traits for the
authenticity of a person. The various biometrics traits available are
face, iris, palm print, hand geometry, fingerprint, ear etc., But the
application that uses a single biometric trait often have to challenge
with noisy data, restricted degrees of autonomy, non-universality of
the biometric trait and intolerable error rates. Multi biometric systems
seem to lighten these drawbacks by providing multiple verification of
the same personality. Biometric fusion is the use of multiple biometric
inputs or methods of processing to improve performance. In this
paper, a novel combination of Multi biometric fusion, Symmetric
Cryptography and Asymmetric Cryptography is proposed. A fused
biometric image is encrypted using Advanced Encryption Standard
whose secret key is in turn encrypted using elliptic curve
cryptography which is considered as one of the efficient Asymmetric
cryptographic algorithms. As the symmetric cryptographic algorithms
involve in key exchange mechanism, the secret key is proposed to be
secured by using ECC. Hence, the system proposed is expected to be
more secured to store the biometric traits of an individual.
Keywords—Biometric Images; Image Fusion; Elliptic Curve
Cryptography; Security; Privacy.
I. INTRODUCTION
Private data in real time applications which involve financial
transactions and highly regulated to information zone are
portrayed to be very confidential to make it available to the
authenticated person. This data tend to be kept very secret so as
to measure the identity of an individual. So many methods
were proposed to keep this information confidential. Private
databases were proposed which can be accessed using ID
numbers or password that amounts to knowledge based
security. Sometimes the intruders or hackers may well infringe
the flap of security. Many cryptographic algorithms are
available to protect the private data of an individual. Both
symmetric and asymmetric algorithms ensure the
confidentiality and privacy of data in different ways.
Symmetric algorithms are proved to be better for large data
when asymmetric stands for smaller one. Even though one
algorithm outperforms the other algorithm, it is always
necessary to identify the right algorithm for the right
application. Elliptic curve cryptography is one such public key
cryptographic algorithm based on the elliptic curves and uses
the location of base points on an elliptic curve to secure
information. ECC make use of a relatively short encryption key
to decode an encrypted message because the short key is
comparatively faster and involves less computing power than
other asymmetric cryptographic algorithms. Biometric systems
were also proposed to provide knowledge based security
enhancement over the years of research scenario. Biometric
technologies are the automated methods of classifying or
authenticating the identity of a person based on a biological or
social characteristic. There are various biometric traits like
face, fingerprint, iris, palm print, hand geometry and ear etc., in
which some of them can be, used for security systems[1-3].
Uni-model biometric systems support one biometric trait taken
for recognizing or identifying an individual wherein
multimodal biometric systems enable the fusion of two or more
biometric images with various levels of integration. In this
paper, a multimodal biometric fusion [4] [5] which hides a
person’s fingerprint under the face image is considered.
Though these two biometric traits perform better individually,
they fail under certain conditions when used as a uni-modal
trait. The problem arises at the time of acquisition of
fingerprint images with low quality. Poor quality face image
may also create problem of identifying a right person.
Therefore these two traits are fused together to make a person’s
identity better than before. The fused image is encrypted to
increase the privacy of the data stored in the private database.
II. METHODOLOGIES
A. Biometric Image Fusion
Biometrics is programmed methods of identifying a person
based on a physiological or behavioral characteristic.
Biometric features normally stated are face, fingerprints, hand
geometry, iris, retina, vein, and voice. Since Biometric data are
distinct from personal information, these cannot be reverse-
engineered to refabricate personal information. They cannot be
whipped and used to access the personal information. Although
biometric technology has been popular for many years, modern
developments in this incipient technology, attached with other
security algorithms, now make biometrics efficiently used for
security reasons [6]. Image fusion is a technique that can be
done in many ways. A simple method of image fusion is
followed in this work, where the two images are taken as such
they both have same pixel dimensions. Then the fusion of these
images is done as follows:
Step 1: Read two input images, fingerprint and face images in a
buffered image array.
Step 2: Load the images onto the input array.
Step 3: Measure the width and height of each image to check
for the same dimensions.
Step 4: Draw each of the input images onto the output image.
Step 5: Create the output image file and write the output image
to it.
Step 6: Display the output image.
B. Advanced Encryption Standard Algorithm
AES is a block cipher with a block length of 128 bits. AES
allows for three different key lengths: 128, 192, or 256 bits.
2. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 04 Issue: 01 June 2015 Pages:19-21
ISSN: 2278-2397
20
Encryption consists of 10 rounds of processing for 128-bit
keys, 12 rounds for 192-bit keys, and 14 rounds for 256-bit
keys. Except for the last round in each case, all other rounds
are identical. Each round of processing includes one single-
byte based substitution step, a row-wise permutation step, a
column-wise mixing step, and the addition of the round key.
The order in which these four steps are executed is different for
encryption and decryption. Although, overall, the same steps
are used in encryption and decryption, the order in which the
steps are carried out is different, as mentioned previously[7].
The overall structure of AES encryption/decryption is shown in
Fig 1.
Fig 1. AES Encryption and Decryption
C. Elliptic Curve Cryptography Algorithm
1) Key Generation:
Key generation is an important part where we have to generate
both public key and private key. Here, Elliptic curve
cryptography algorithm is used to generate both of these keys.
The encryption of the fused image is done using a public key
and the same will be decrypted using the corresponding private
key. For this key pair generation, select a number d, within the
range of ‘n’, which is the random number representing the
maximum limit. Using the following equation, the public key,
Q can be generated.
Q = d * P (1)
d = the random number that we have selected within the range
of (1 to n-1).
P is the point on the curve.
Q is the public key
D is the private key.
2) Encryption & Decryption:
The Elliptic Curve Integrated Encryption Scheme is as follows
[12].To encrypt the AES Secret Key,
Step 1: Select a random integer r in [1, n– 1]
Step 2: Compute R = rG
Step 3: Compute K = hrQB = (Kx, Ky), checks that K ≠ 0
Step 4: Compute keys k1||k2 = KDF(Kx)
Where KDF is a key derivation function.
Step 5: Compute c = ENCk1(m)
Where m is the text file of fused image
Step 6: Compute t = MACk2(c)
Where MAC is message authentication code
Step 7: Store (R, c, t) in the database for decryption.
To decrypt AES Secret Key,
Step 1: Perform a partial key validation on R
(Check if R ≠ 0, check if the coordinates of R
are properly represented elements in Fq and
Check if R lies on the elliptic curve defined by
a and b)
Step 2: Compute KB = h.dB.R = (Kx, Ky ) ,
Check K ≠ 0
Step 3: Compute k1, k2 = KDF (Kx)
Step 4: Verify that t = MACk2(c)
Step 5: Compute m = ENCK1-1(c)
K = KB, since K = h.r.QB = h.r.dB.G
= h.dB.r.G = h.dB.R = KB
III. PROPOSED SYSTEM
A system is proposed to enhance the privacy, confidentiality
and integrity of an individual with the biometric traits to access
the private data stored in the database. It also verifies the
authentication by checking biometric traits with the previously
stored biometrics in the database. The system of Image
Processing and Cryptography join hands together to intensify
the secrecy of private data which is to be kept confidential [8].
This includes
A. Multi biometric Image Fusion
B. Fused Image Encryption using AES
C. Encryption of AES Key using ECC
D. Decryption of AES Key
E. Decryption of Fused Image.
The biometric images after encryption along with the encrypted
AES key are sent to the receiver. At the receiver end, the
encrypted key is first decrypted to get the secret key. Then this
secret key is used to decrypt the biometric images. To access
the confidential information like bank account details, patient
history or health insurance details, biometric images are to be
scanned for authentication. They are compared with the images
already stored. This allows no other than the authenticated
person to access the private and confidential details [9] [10].
The system is explained in Fig 2.
Fig 2.Proposed System of Hybrid Cryptography
A. Multi Biometric Image Fusion
Biometrics proposes the ability to rapidly capture real-time data
and provide authentication. The significant purposes for
biometric fusion are to improve system precision, competency,
applicability, and robustness. Some types of fusion have been
used successfully for years in large scale applications. Any two
3. Integrated Intelligent Research (IIR) International Journal of Computing Algorithm
Volume: 04 Issue: 01 June 2015 Pages:19-21
ISSN: 2278-2397
21
biometric images like fingerprint image, iris, face or palm print
images can be taken for consideration [11] [12]. Both of the
images are taken in .png format and preferably in equal size. An
image fusion program is implemented to create a new layered
image out of these two biometric images. The output image will
have two layers one lying on the background and the other as
foreground.
Figure 3. Image Fusion of Fingerprint under Face Image
B. Fused Image Encryption using AES
The biometric images after fusion undergo encryption phase in
which Advanced Encryption Standard is used. AES is
considered to be one of the efficient and secure secret key
cryptographic algorithms for encrypting larger data
comparatively with other cryptographic algorithms. It is widely
used for encryption and authentic applications. In a scenario of
encryption, the following steps are carried out to encrypt a
128-bit block:
1. Derive the set of round keys from the cipher key.
2. Initialize the state array with the block data (plaintext).
3. Add the initial round key to the starting state array.
4. Perform nine rounds of state manipulation.
5. Perform the tenth and final round of state manipulation.
6. Copy the final state array out as the encrypted data
(cipher text).
This ensures the confidentiality of private data over the
network transmission of data. In authentication applications,
the sender encrypts the data using the secret key, which is to be
decrypted at the receiver end.
C. Encryption of AES Key using ECC
Since the AES Key is required to be sent to the receiver to
decrypt the fused image, and this key exchange mechanism
should ensure at most security. To attain this security, Elliptic
Curve Cryptography is used to encrypt the AES secret key.
Public key cryptographic techniques are proved for high
security environment using smaller key sizes[13]. Though,
various public key algorithms are outperforming each other,
Elliptic Curve Cryptography is even more better than other
public key cryptographic system. Hence, the proposed system
eventually uses ECC for encrypting AES Secret Key. ECC
uses the receiver’s public key for encryption, which is made
available in the public key ring. The encrypted AES Key along
with the encrypted image is sent to the receiver through
unprotected public media.
D. Decryption of AES Key
The receiver after receiving the encrypted key and the
encrypted image initially decrypts the secret key using ECC
private key. The AES Key is obtained through this and this key
is in return used to decrypt the fused image.
E. Decryption of Fused Image
Decryption of the fused image is decrypted using AES
decryption for which Secret key derived from the previous step
is used. The output is the fused image in which the fingerprint
is hidden behind the face image. This makes the system more
reliable, robust and authentic.
IV. CONCLUSION
In this paper, a system proposing a new hybrid cryptographic
system is proposed. Since, both symmetric and asymmetric
have their own advantages and drawbacks, this system
proposed made use of both the type of cryptographic
algorithms taking the advantages of each type. As implied AES
algorithm ensures the secrecy of the delicate images. And ECC
is used to securely exchange the AES key to the receiver. As
combined together, hybrid cryptography is expected to achieve
more security, robust and confidentiality. The system
proposed is limited to the following constraints. These
limitations can be overcome in future by identifying new
technologies and innovative modifications. Biometric images
should be scanned and stored as .png images so as to support
the image fusion code which is written; the two biometric
images, fingerprint and face images should be taken in equal
dimensions, in pixels for the images to be fused. The unequal
dimension images cannot be fused.
REFERENCES
[1] KarthikNandakumar,Yi Chen, SaratC.Dass, and Anil K.Jain, “Likelihood
ratio- based biometric score fusion”, IEEE T PATTERN ANAL, vol.30,
pp.342-347, February 2008.
[2] Unsang Park, Raghavender Reddy Jillele, Arun Ross, and Anil K
.Jain,“Periocular biometrics in the visible spectrum”, IEEE T INF FOREN
SEC, vol 6,no.1, pp 96-106, March 2011.
[3] [3] N. K. Ratha, J. H. Connell, and R. M. Bolle, “Enhancing security and
privacy in biometrics-based authentication systems”, IBM SYST J, vol 40,
pp 614-634, 2001.
[4] Dong Han, ZhenhuaGuo, and David Zhang, “Multispectral palmprint
recognition using wavelet-based image fusion,In International Conference
on Software Process, 10-11 May 2008, Leipzig, Germany,pp 2074 – 2077.
[5] KarthikNandakumar, “Multibiometric systems: fusion strategies and
template security,” Ph.D.dissertation, Michigan State University, Dept.of
Computer Science and Engineering, 2008.
[6] Kamlesh Gupta and Sanjay Silakari, “Performance analysis for image
encryption using ECC”, in International Conference on Computational
Intelligence and Communication Networks, pp. 79-82, 2010.
[7] Zeghid, Medien, et al. "A modified AES based algorithm for image
encryption", International Journal of Computer Science and
Engineering, vol 1, 2007, pp 70-75.
[8] ShahriarMohammadi and SanazAbedi, “ECC based biometric signature: a
new approach in electronic banking security”, in International Symposium
on Electronic Commerce and Security, 2008.
[9] Shanthini. B and S. Swamynathan, “Multimodal biometric-based secured
authentication system using steganography”, Journal of Computer
Science, pp. 1012-1021, 2012.
[10]Mahalakshmi. U and Shankar Sriram V.S, “An ECC based multibiometric
system for enhancing security”, Indian Journal of Science and
Technology, vol 6, April 2013.
[11] Norman and Josef Kittler, “A unified framework for biometric expert
fusion incorporating quality measures”, IEEE T PATTERN ANAL, pp 3-
18, January 2012.
[12]Ajay Kumar and SumitShekhar, “Personal identification using
multibiometrics rank-level fusion”, IEEE T SYST MAN CY C, vol 41,
pp.743-752, 2010.
[13]K.Brindha, G.Ramya and RajpalAmitJayantila, “ Secured data transfer in
wireless networks using hybrid cryptography”, International Journal of
Advanced Research in Computer Science and Software Engineering, Vol
3, October 2013.