Survey of Biometric Based Key Generation to Enhance Security of Cryptosystems

被引:0
作者
Sadkhan, Sattar B. [1 ]
AL-Shukur, Baheeja K. [1 ]
Mattar, Ali K. [1 ]
机构
[1] Univ Babylon, Comp Software Dept, Babylon, Iraq
来源
2016 AL-SADIQ INTERNATIONAL CONFERENCE ON MULTIDISCIPLINARY IN IT AND COMMUNICATION TECHNIQUES SCIENCE AND APPLICATIONS (AIC-MITCSA) | 2016年
关键词
Key Generation; Key Binding; Biometric Cryptography; Biometric based-key generation; Biometric Security;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Security of cryptosystems became more important issues in several applications, and need to be focused. Traditional cryptosystem used traditional ways to secure the data (pin, password,..etc.) while biometric features extracted from single biometric model or from merging more than one biometric features to produce strong keys for security. This paper provides a survey we tried to explore different method to construct keys (that's lead to a secure cryptosystem) with more resistance against attackers and how the system react with it.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] Voice Interactive Personalized Security (VoIPSEC) protocol: Fortify Internet telephony by providing end-to-end security through inbound key exchange and biometric verification
    Kopsidas, Spyros
    Zisiadis, Dimitris
    Tassiulas, Leandros
    2006 1ST IEEE WORKSHOP ON HOT TOPICS IN WEB SYSTEMS AND TECHNOLOGIES, 2006, : 94 - +
  • [42] New Physical Layer Key Generation Dimensions: Subcarrier Indices/Positions-Based Key Generation
    Furqan, Haji M.
    Hamamreh, Jehad M.
    Arslan, Huseyin
    IEEE COMMUNICATIONS LETTERS, 2021, 25 (01) : 59 - 63
  • [43] An Approach of Modified IDEA with 1024 Bits Key to Enhance Security and Efficiency of Data Transmission in the Healthcare Sector
    Haldar, Bilas
    Mukherjee, Partha Kumar
    Saha, Himadri Nath
    INTERNATIONAL JOURNAL OF MATHEMATICAL ENGINEERING AND MANAGEMENT SCIENCES, 2024, 9 (06) : 1453 - 1482
  • [44] Swarm intelligence based key generation for stream cipher
    Sreelaja, N. K.
    Pai, G. A. Vijayalakshmi
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (02) : 181 - 194
  • [45] A Novel Key Generation Cryptosystem Based on Face Features
    Wu, Lifang
    Liu, Xingsheng
    Yuan, Songlong
    Xiao, Peng
    2010 IEEE 10TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS (ICSP2010), VOLS I-III, 2010, : 1675 - 1678
  • [46] Investigating the eavesdropper attack in physical layer security wireless key generation: a simulation case study
    Zoli, Marco
    Barreto, Andre N.
    Fettweis, Gerhard
    2021 IEEE 93RD VEHICULAR TECHNOLOGY CONFERENCE (VTC2021-SPRING), 2021,
  • [47] LoRa-Key: Secure Key Generation System for LoRa-Based Network
    Xu, Weitao
    Jha, Sanjay
    Hu, Wen
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (04): : 6404 - 6416
  • [48] An Improved Key Generation Scheme Based on Multipath Channel Measurements
    HAN Yuanzhi
    HU Aiqun
    Chinese Journal of Electronics, 2017, 26 (01) : 185 - 191
  • [49] A Group Secure Key Generation and Transfer Protocol Based on ICMetrics
    Tahir, Hasan
    McDonald-Maier, Klaus
    2014 9TH INTERNATIONAL SYMPOSIUM ON COMMUNICATION SYSTEMS, NETWORKS & DIGITAL SIGNAL PROCESSING (CSNDSP), 2014, : 733 - 738
  • [50] Channel Sparse Representation Based Authentication for Reconciliation of key Generation
    Wang, Ning
    Jiang, Ting
    Zhou, Zheng
    2016 16TH INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES (ISCIT), 2016, : 547 - 550