Research Article

Biometric Approach to Encrypt a File with the Help of Session Key

by  Sougata Das, Rahul Das, Ayan Mukherjee
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 65 - Issue 1
Published: March 2013
Authors: Sougata Das, Rahul Das, Ayan Mukherjee
10.5120/10886-5778
PDF

Sougata Das, Rahul Das, Ayan Mukherjee . Biometric Approach to Encrypt a File with the Help of Session Key. International Journal of Computer Applications. 65, 1 (March 2013), 6-11. DOI=10.5120/10886-5778

                        @article{ 10.5120/10886-5778,
                        author  = { Sougata Das,Rahul Das,Ayan Mukherjee },
                        title   = { Biometric Approach to Encrypt a File with the Help of Session Key },
                        journal = { International Journal of Computer Applications },
                        year    = { 2013 },
                        volume  = { 65 },
                        number  = { 1 },
                        pages   = { 6-11 },
                        doi     = { 10.5120/10886-5778 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2013
                        %A Sougata Das
                        %A Rahul Das
                        %A Ayan Mukherjee
                        %T Biometric Approach to Encrypt a File with the Help of Session Key%T 
                        %J International Journal of Computer Applications
                        %V 65
                        %N 1
                        %P 6-11
                        %R 10.5120/10886-5778
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, we have employed "Face Recognition" technique with conventional session based authentication to provide a two layer security. Different features of a human face are used for authentication. Since this scheme uses biological characteristics, this is very difficult to forge. Additionally we will be using conventional session based authentication to provide a two layer security. This method of authentication can be used to grant access to a network, important files and documents. The main objective of this work is to provide a two layer authentication system through biometric (face) and conventional session based password authentication. The encryption key for this authentication will be generated with the combination of the biometric key [7] and session based password.

References
  • Stallings William. Cryptography and Network Security. Pearson Education, 2006.
  • Bruce Schneier. Applied Cryptography. Wiley Student Edition, 2nd Edition, 1996.
  • Neal R. Wagner. The Laws of Cryptography with Java Code
  • HosseinBidgoli. Handbook of Information Security Volume 3. John Wiley and Sons, Inc.
  • David E. Goldberg: "Genetic Algorithms in Search, Optimization and Machine Learning".
  • Kalyanmoy Deb: "Multi-Objective optimization using Evolutionary Algorithm"
  • Tanmay Bhattacharya, SirshenduHore ,Ayan Mukherjee and S. R. BhadraChaudhuri. "A Novel Data Encryption Technique by Genetic Crossover of Robust Biometric Key and Session Based Password". International Journal of Network Security & Its Applications (IJNSA). Vol. 3, No. 2, March 2011.
  • Shang-Hung Lin. "An Introduction to Face Recognition Technology". Informing Science Special Issue on Multimedia Informing Technologies – Part 2. Volume 3, No. 1, 2000.
  • Xiaoguang Lu. "Image Analysis for Face Recognition".
  • YevgeniyDodis, ShafiGoldwasser, Yael Kalai, Chris Peikert, VinodVaikuntanathan. "Public-Key Encryption Schemes with Auxiliary Inputs".
  • Dan Boneh, Michael Hamburg. "Generalized Identity Based and Broadcast Encryption Schemes".
  • Rahul Das and Ayan Mukherjee. "A Secured Biometric Approach to Prevent Unauthorised Access to a Document".
  • Alasdair McAndrew. "An Introduction to Digital Image Processing with MATLAB". School of Computer Science and Mathematics, Victoria University of Technology.
  • Chia-HsuanYeh : "Graduate Course: An Introduction to Genetic Algorithms".
  • Fonscea and Fleming:"Genetic Algorithms for MultiobjectiveOptimazation:Formulation, Discussion and Generalization".
  • MitsunkiMatayoshi: "A Genetic Algorithm with the improved 2-opt method".
  • http://www. mathworks. in/ as on 2nd Jan, 2013
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Encryption Decryption Face Recognition Biometrics Genetic Crossover Genetic Mutation Evolutionary Algorithms

Powered by PhDFocusTM