Efficient Hardware Design of a Secure Cancellable Biometric Cryptosystem

نویسندگان

چکیده

Biometric security is a growing trend, as it supports the authentication of persons using confidential biometric data. Most transmitted data in multimedia systems are susceptible to attacks, which affect these systems. provide sufficient protection and privacy for users. The recently-introduced cancellable recognition have not been investigated presence different types attacks. In addition, they studied on large datasets. Another point that deserves consideration hardware implementation This paper presents suggested hybrid system based 3D chaotic cryptosystem. rationale behind utilization cryptosystem guarantee strong encryption templates, hence enhance adds significant permutation diffusion encrypted templates. We introduce some sort attack analysis this prove robustness proposed against Field Programmable Gate Array (FPGA) introduced. obtained results with compared those traditional schemes, such Double Random Phase Encoding (DRPE) reveal superiority, high performance system. enhances leads better efficiency

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Finger-Vein Based Cancellable Bio-cryptosystem

Irrevocability is one major issue in existing bio-cryptosystems. In this paper, we proposed a cancellable bio-cryptosystem by taking the full advantage of cancellable and non-invertible properties of bio-hashing biometrics. Specifically, two transformed templates are generated by using the bio-hashing algorithm and applied into two different secure sketches, fuzzy commitment sketch and fuzzy va...

متن کامل

Software/Hardware Co-Design of Efficient and Secure Cryptographic Hardware

Most cryptographic systems are based on the modular exponentiation to perform the non-linear scrambling operation of data. It is performed using successive modular multiplications, which are time consuming for large operands. Accelerating cryptography needs optimising the time consumed by a single modular multiplication and/or reducing the total number of modular multiplications performed. Usin...

متن کامل

An Efficient Biometric Cryptosystem using Autocorrelators

Cryptography provides the secure manner of information transmission over the insecure channel. It authenticates messages based on the key but not on the user. It requires a lengthy key to encrypt and decrypt the sending and receiving the messages, respectively. But these keys can be guessed or cracked. Moreover, Maintaining and sharing lengthy, random keys in enciphering and deciphering process...

متن کامل

Cancellable and Privacy Preserving Biometric Recognition

Biometrics refers to the technology of recognizing or validating the identity of an individual based on the physiological and/or behavioral characteristics. It is superior to conventional knowledge or possession based methods in both security and convenience. However, there exist some inherent concerns of the technology. In the first place, biometrics cannot be easily changed or reissued if com...

متن کامل

Ear Biometric Cryptosystem

587 ISSN: 2278 – 7798 All Rights Reserved © 2014 IJSETR  Abstract— Biometrics play a important role for user authentication in distributed environment .But security is main issue so Biocryptography is an art of science which provide security and privacy by using biometric templates. Bio-Cryptography is a progressive technology that combines biometrics with cryptography. It is a method using bi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Intelligent Automation and Soft Computing

سال: 2023

ISSN: ['2326-005X', '1079-8587']

DOI: https://doi.org/10.32604/iasc.2023.031386