• Corpus ID: 19456086

A Survey On Network Security In Biometrics

@article{Priya2017ASO,
  title={A Survey On Network Security In Biometrics},
  author={nbspD.Sathiya Priya and nbspDr.S.Manju Priya},
  journal={International Journal of Engineering Development and Research},
  year={2017},
  volume={5},
  pages={61-64}
}
-In this present era, system and network technology is considered as a key tool for a wide variety of applications. Network security affects many organizations, and it becomes one of the major tasks. Biometric is one of the most secure and suitable authentication tools. By using biometrics in a correct way, many problems can be solved by using user identification and passwords. This paper analyses the security related issues, security threats and challenges in biometrics. Keywords--Network… 

Tables from this paper

References

SHOWING 1-10 OF 13 REFERENCES
Fingerprint-based crypto-biometric system for network security
TLDR
This work proposes an approach to generate cryptographic key from cancelable fingerprint template of both communicating parties and shows that minimum, average, and maximum Hamming distances between genuine key and impostor's key are 80, 128, and 168 bits, respectively, with 256-bit cryptographic key.
Authentication Using Minutiae Based Fingerprint Matching Scheme for Smart Phones
TLDR
In this paper, a method is proposed for secure authentication using minutiae based fingerprint matching scheme that is easy to carry out, natural to use, and invulnerable to forgery.
Data Encryption Algorithm using Asymmetric Key Derived from Fingerprint Biometric Features
TLDR
The security is enhanced in this paper by using fingerprint encryption technique, which depend on the distribution of the hells and valleys of the finger print since this distribution differs from one finger to another and from one person to another.
A Conceptual Technique for Deriving Encryption Keys from Fingerprints to Secure Fingerprint Templates in Unimodal Biometric Systems
TLDR
There is no reliable, efficacious and foolproof technique that assures diversity, revocability, security and optimal performance as is required of an ideal biometric template security scheme, so an approach that derives biometric encryption keys from biometric fingerprint templates is contrivance.
Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security
TLDR
This paper will discuss the concept off biometrics and biometric system, multimodal biometric fusion techniques, crypto-biometricrics and an algorithm for session key generation for secure communication of data.
A Survey on Network Security Attacks and Prevention Mechanism
TLDR
This paper would analyze different types of attacks and available mechanism to protect the network and the history of security allows a better understanding of the emergence of security technology.
Asymptotics of fingerprinting and group testing: capacity-achieving log-likelihood decoders
TLDR
Study of large-coalition asymptotics of fingerprinting and group testing and derive explicit decoders that provably achieve capacity for many of the considered models, and makes the distinction between informed decoding and uninformed decoding.
Names, "Data Encryption Algorithm using Asymmetric Key Derived from Fingerprint Biometric Features",International
  • Journal of Advanced Research in Computer and Communication Engineering
  • 2015
Raj , ” Reliable Biometric Data Encryption Using Chaotic Map ”
  • International Journal of Advanced Research in Computer and Communication Engineering
...
...