Password hardening based on keystroke dynamics
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Cryptographic Key Generation from Voice
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Secure smartcardbased fingerprint authentication
WBMA '03 Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications
Enhancing security and privacy in biometrics-based authentication systems
IBM Systems Journal - End-to-end security
Competitive Coding Scheme for Palmprint Verification
ICPR '04 Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04) Volume 1 - Volume 01
PalmHashing: a novel approach for cancelable biometrics
Information Processing Letters
Combining Crypto with Biometrics Effectively
IEEE Transactions on Computers
Personal authentication using hand images
Pattern Recognition Letters
Biometrics based Asymmetric Cryptosystem Design Using Modified Fuzzy Vault Scheme
ICPR '06 Proceedings of the 18th International Conference on Pattern Recognition - Volume 04
An analysis of BioHashing and its variants
Pattern Recognition
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
Information Sciences: an International Journal
Three measures for secure palmprint identification
Pattern Recognition
Incorporating Cohort Information for Reliable Palmprint Authentication
ICVGIP '08 Proceedings of the 2008 Sixth Indian Conference on Computer Vision, Graphics & Image Processing
Personal authentication using multiple palmprint representation
Pattern Recognition
AVBPA'05 Proceedings of the 5th international conference on Audio- and Video-Based Biometric Person Authentication
Fingerprint-Based Fuzzy Vault: Implementation and Performance
IEEE Transactions on Information Forensics and Security
An introduction to biometric recognition
IEEE Transactions on Circuits and Systems for Video Technology
ICB'07 Proceedings of the 2007 international conference on Advances in Biometrics
A bio-cryptographic system based on offline signature images
Information Sciences: an International Journal
Hi-index | 0.00 |
The combination of cryptology and biometrics has emerged as promising component of information security. Despite the current popularity of palmprint biometric, there has not been any attempt to investigate its usage for the fuzzy vault. This paper therefore investigates the possible usage of palmprint in fuzzy vault to develop a user friendly and reliable crypto system. We suggest the use of both symmetric and asymmetric approach for the encryption. The ciphertext of any document is generated by symmetric cryptosystem; the symmetric key is then encrypted by asymmetric approach. Further, Reed and Solomon codes are used on the generated asymmetric key to provide some error tolerance while decryption. The experimental results from the proposed approach on the palmprint images suggest its possible usage in an automated palmprint-based key generation system.