Securing Biometric Template using Double Hill Cipher with Self-Invertible Key and Random Permutation of Pixels Locations

被引:0
作者
Lakhera, Manmohan [1 ]
Rauthan, M. M. S. [2 ]
Agarwal, Amit [3 ]
机构
[1] UTU, Dehra Dun, Uttar Pradesh, India
[2] HNB Garhwal Univ, HOD Comp Sci, Srinagar, Uttarakhand, India
[3] UPES, Dehra Dun, Uttar Pradesh, India
来源
PROCEEDINGS ON 2016 2ND INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT) | 2016年
关键词
Biometric; Self-Invertible; Permutation; Hill cipher; Encryption; Decryption;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
biometric could play an essential role in the future authentication system. So the security of biometric data is becoming a challenging problem now a days. We are proposing a cryptographic algorithm for securing biometric template using double hill cipher with the random permutation of pixels locations and self-invertible key matrix. The random permutation creates diffusion by permuting the location of image pixels and self-invertible key matrix creates a confusion. The proposed technique improve the biometric template security and solves the drawbacks of conventional hill algorithm and advance hill algorithm.
引用
收藏
页码:814 / 817
页数:4
相关论文
共 14 条
  • [1] Acharya B., INT J SECUR, V1, P14
  • [2] Privacy Protection of Biometric Traits using Modified Hill Cipher with Involutory Key and Robust Cryptosystem
    Acharya, Bibhudendra
    Sharma, Mukul Dhar
    Tiwari, Sourabh
    Minz, Vinay Kumar
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE AND EXHIBITION ON BIOMETRICS TECHNOLOGY, 2010, 2 : 242 - 247
  • [3] Eisenberg M., 1999, HILL CIPHERS M UNPUB, P1
  • [4] Comments on Saeednia's improved scheme for the hill cipher
    Lin, CH
    Lee, CY
    Lee, CY
    [J]. JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2004, 27 (05) : 743 - 746
  • [5] Mahmoud AhmedY., 2009, Proceedings of the 2nd international conference on Security of information and networks, P164, DOI DOI 10.1145/1626195.1626237
  • [6] Melorose J., 2015, STATEW AGR L USE BAS, V1, P306
  • [7] Saeednia S, 2000, CRYPTOLOGIA, V24, P353, DOI 10.1080/01611190008984253
  • [8] Sastry V. U. K., 2007, Journal of Computer Sciences, V3, P854, DOI 10.3844/jcssp.2007.854.859
  • [9] Schneier B., APPL CRYPTOGRAPHY
  • [10] COMMUNICATION THEORY OF SECRECY SYSTEMS
    SHANNON, CE
    [J]. BELL SYSTEM TECHNICAL JOURNAL, 1949, 28 (04): : 656 - 715