TY - GEN
T1 - A novel and efficient technique to generate secured biometric key using cryptography
AU - Mahesh, P. K.
AU - Gudigar, Anjan
PY - 2011/10/26
Y1 - 2011/10/26
N2 - This paper proposes a novel methodology to generate efficient and secured key by using cryptographic techniques for the shared data to be secure. Conventional techniques depend on biometric features like face, fingerprint, iris, signature, hand geometry, keystroke, voice and the like for the extraction of key information. If a Biometric Key is lost or stolen, it is lost forever and perhaps for every application where the biometric is used, because a biometric is enduringly linked with a user and cannot be changed. In this paper we propose a technique to produce secured and efficient key from fingerprint so as to surmount these problems. The exibility and dependability of cryptography is enhanced with the utilization of cancellable biometric features. There are several biometric systems in existence that deal with cryptography. We propose a new approach which uses the features of finger print and RSA-2 algorithm to generate Cryptographic Key.
AB - This paper proposes a novel methodology to generate efficient and secured key by using cryptographic techniques for the shared data to be secure. Conventional techniques depend on biometric features like face, fingerprint, iris, signature, hand geometry, keystroke, voice and the like for the extraction of key information. If a Biometric Key is lost or stolen, it is lost forever and perhaps for every application where the biometric is used, because a biometric is enduringly linked with a user and cannot be changed. In this paper we propose a technique to produce secured and efficient key from fingerprint so as to surmount these problems. The exibility and dependability of cryptography is enhanced with the utilization of cancellable biometric features. There are several biometric systems in existence that deal with cryptography. We propose a new approach which uses the features of finger print and RSA-2 algorithm to generate Cryptographic Key.
UR - http://www.scopus.com/inward/record.url?scp=80054815543&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=80054815543&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-24037-9_35
DO - 10.1007/978-3-642-24037-9_35
M3 - Conference contribution
AN - SCOPUS:80054815543
SN - 9783642240362
VL - 203 CCIS
T3 - Communications in Computer and Information Science
SP - 357
EP - 365
BT - Advances in Parallel, Distributed Computing - First International Conference on Parallel, Distributed Computing Technologies and Applications, PDCTA 2011, Proceedings
T2 - 1st International Conference on Parallel, Distributed Computing Technologies and Applications, PDCTA 2011
Y2 - 23 September 2011 through 25 September 2011
ER -