Affiliation:
1. Adikavi Nannaya University, Rajamahendravaram, Andhra Pradesh, India
Abstract
In this digital era, data transmission through network is essential for everyone. Users are not confident that their data is secure when it is transferred through a network. So there is a need of protecting data transferring through network in a swollen manner. Cryptography is our conventional method for protecting information and communications using some keys. But keys can be stolen or forgotten. Due to these reasons biometrics are introduced for key generation. Keys generated using biometrics are specific to that person and are generated dynamically with their biometrics. By combining cryptography with biometrics, we can develop a secure system which can be used in different applications like law enforcement, border control, consumer biometrics, financial services and also to provide access for smart devices. In this comparative study of various attacks on Biometric Cryptosystems are discussed and related techniques used in Biometric Cryptosystems for key generation like Fuzzy Extractor and key binding techniques such as Fuzzy Vault, Fuzzy Commitment are discussed and their performance is analysed.
Reference32 articles.
1. Jain, A.K.; Flynn, P.; Ross, ”A Handbook of Biometrics”; Springer: New York, NY, USA,2007.
2. Jisha Nair.B.J., Ranjith Kumari.S “A Review on Biometric Cryptosystems”, International Journal of Latest Trends in Engineering and Technology (IJLTET), Vol. 6 Issue 1 September 2015, ISSN: 2278-621X
3. Ranjith JAYAPAL ,Pramod Govindan “Biometric Encryption System For Increased Security”- Electrical Engineering, University Of North Florida, Jacksonville, Florida, USA ,IEEE-2018
4. Targoviste, RomaniaI “Enhancing Security by Combining Biometrics And Cryptography”–International Conference 9th Edition Electronics, Computers And Artificial Intelligence 29 June - 01 July, 2017, EEE-2017
5. J. L.Wayman, “Fundamentals of biometric authentication technologies,” Int. J. Image Graph., vol. 1, no. 1, pp. 93–113, 2001.