Abstract
These days, Biometric technologies are used to analyze human characteristics for security purposes. The most common physical biometric patterns analyzed for security purposes are the fingerprint, hand, eye, face and voice. The advantages of using biometrics to verify a person’s identity over using passwords or token have been broadly presented in many research papers. However recent research has revealed that biometric technologies can be defeated with low –tech and cheap materials. This provides a new challenge when people are encouraged to use biometrics as a means to enhance network security. In this paper many approaches have been discussed to counteract security threats. We have also proposed a new method called Biometric Encryption which uses fingerprint and cryptography for enhanced security
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Jain, A.K., Ross, A.: Multibiometric systems. Communications of the ACM, Special Issue on Multimodal Interfaces 47(1), 34–40 (2004)
Ross, A., Jain, A.K.: Multimodal biometrics: An overview. In: Proc. of 12th European Signal Processing Conference, pp. 1221–1224 (September 2004)
Indovina, M., Uludag, U., Snelick, R., Mink, A., Jain, A.K.: Multimodal biometric authentication methods: A COTS approach. In: Proc. of Workshop on Multimodal User Authentication, Santa Barbara, CA, pp. 99–106 (December 2003)
Jain, A.K., Uldang, U.: Attacks on biometric system: A case study in fingerprints. In: Proc.SPIE-EI(January 2004)
Qiughan Security Issues in Biometric Authentication. Proc. of the IEEE (2005)
Cavoukian, A., Stoianov, A.: Biometric Encryption: A Positive-Sum Technology that Achieves Strong Authentication, Security and Privacy (March 2007), http://www.ipca.on.ca/images/resources/up-1bio-encypt
Biometric Encryption FAQ, http://www.ipca.on.ca
Webb, J.: The myth of fingerprints. New Scientist 2517(3) (September 2005)
Maltoni, D., Jain, A.K.: Handbook of Fingerprint Recognition. Springer, Heidelberg (2003)
Bazen, M., Gerez, S.H.: Methods for the computation of the directional fields and singular points of fingerprints. IEEE Transactions on Pattern Analysis (July 2002)
Bolle, R.M., Connell, J.A., Pankanti, S., Ratha, N.K., Senior, A.W.: Guide to Biometrics. Springer, Heidelberg (2004)
Coetzee, L., Botha, E.C.: Fingerprint recognition in low quality images. Pattern Recognition 26(10), 1441–1460 (1993)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ahuja, M.S., Chabbra, S. (2011). Biometric Encryption: Combining Fingerprints and Cryptography. In: Mantri, A., Nandi, S., Kumar, G., Kumar, S. (eds) High Performance Architecture and Grid Computing. HPAGC 2011. Communications in Computer and Information Science, vol 169. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22577-2_69
Download citation
DOI: https://doi.org/10.1007/978-3-642-22577-2_69
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22576-5
Online ISBN: 978-3-642-22577-2
eBook Packages: Computer ScienceComputer Science (R0)