Survey of Biometric Based Key Generation to Enhance Security of Cryptosystems

被引:0
作者
Sadkhan, Sattar B. [1 ]
AL-Shukur, Baheeja K. [1 ]
Mattar, Ali K. [1 ]
机构
[1] Univ Babylon, Comp Software Dept, Babylon, Iraq
来源
2016 AL-SADIQ INTERNATIONAL CONFERENCE ON MULTIDISCIPLINARY IN IT AND COMMUNICATION TECHNIQUES SCIENCE AND APPLICATIONS (AIC-MITCSA) | 2016年
关键词
Key Generation; Key Binding; Biometric Cryptography; Biometric based-key generation; Biometric Security;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Security of cryptosystems became more important issues in several applications, and need to be focused. Traditional cryptosystem used traditional ways to secure the data (pin, password,..etc.) while biometric features extracted from single biometric model or from merging more than one biometric features to produce strong keys for security. This paper provides a survey we tried to explore different method to construct keys (that's lead to a secure cryptosystem) with more resistance against attackers and how the system react with it.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] A novel biometric crypto system based on cryptographic key binding with user biometrics
    Asthana, Rajesh
    Walia, Gurjit Singh
    Gupta, Anjana
    MULTIMEDIA SYSTEMS, 2021, 27 (05) : 877 - 891
  • [32] A Novel Secret Key Generation Method in OFDM System for Physical Layer Security
    Wang Dong
    Hu Aiqun
    Peng Linning
    INTERNATIONAL JOURNAL OF INTERDISCIPLINARY TELECOMMUNICATIONS AND NETWORKING, 2016, 8 (01) : 21 - 34
  • [33] Efficient private key generation from iris data for privacy and security applications
    Dash, Priyabrata
    Pandey, Fagul
    Sarma, Monalisa
    Samanta, Debasis
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 75
  • [34] Potential Development of AES 128-bit Key Generation for LoRaWAN Security
    Hayati, Nur
    Suryanegara, Muhammad
    Ramli, Kalamullah
    Suryanto, Yohan
    PROCEEDINGS OF 2019 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION ENGINEERING AND TECHNOLOGY (ICCET 2019), 2019, : 57 - 61
  • [35] A survey on secret key generation mechanisms on the physical layer in wireless networks
    Shehadeh, Youssef El Hajj
    Hogrefe, Dieter
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (02) : 332 - 341
  • [36] Semantic key generation based on natural language
    Wu, Zhendong
    Kang, Jie
    Jiang, Qian
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (07) : 4041 - 4064
  • [37] A Method of Automatic Key Generation Based on Handwriting
    Yin, Chunyong
    Sun, Ruxia
    Bi, Shuoben
    SNPD 2009: 10TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCES, NETWORKING AND PARALLEL DISTRIBUTED COMPUTING, PROCEEDINGS, 2009, : 213 - 214
  • [38] Key Generation Based on Large Scale Fading
    Zhang, Junqing
    Ding, Ming
    Li, Guyue
    Marshall, Alan
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (08) : 8222 - 8226
  • [39] A Novel Efficient Hybrid Encryption Algorithm Based on Twofish and Key Generation Using Optimization for Ensuring Data Security in Cloud
    Maddila, Suresh Kumar
    Vadlamani, Nagalakshmi
    JOURNAL OF INFORMATION & KNOWLEDGE MANAGEMENT, 2023, 22 (06)
  • [40] A Hybrid Template Protection Approach using Secure Sketch and ANN for Strong Biometric Key Generation with Revocability Guarantee
    Tran-Khanh Dang
    Van-Quoc-Phuong Huynh
    Hai Truong
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2018, 15 (02) : 331 - 340