Double Encryption Based Secure Biometric Authentication System
|International Journal of Engineering Trends and Technology (IJETT)||
|© 2012 by IJETT Journal|
|Year of Publication : 2012|
|Authors : S.Kavin hari hara sudhan , Prof.S.Ramamoorthy|
S.Kavin hari hara sudhan , Prof.S.Ramamoorthy. "Double Encryption Based Secure Biometric Authentication System". International Journal of Engineering Trends and Technology (IJETT). V3(1):64-70 Jan-Feb 2012. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group
Nowadays bio - metric authentication systems are widely used in order to provide authenticat ion without possessing any physical materials. Bio - metric authentication systems are mainly concentrating on security, revocability, privacy, and accuracy. In this paper, we propose a provably two way secured biometric authentication system, which addresse s the concerns of user’s privacy, template protection, trust issues, network security, and accuracy. The system is two way secured in the sense, biometric details are going to be encrypted twice, the system won’t reveal any additional information about the user or biometric, to the authenticating server’s database or to the insecure network. In this system two different encryption algorithms have been used both in the client and server side. One is public key cryptography another one is private key cryptogr aphy. User’s privacy as concern it is revealing only the identity of the user. In template protection this protocol will store the template as encrypted form. Protocol will provide trust between remote user and server, while a remote user cannot be reliabl y identified without biometric information. Since network security as concern protocol is not revealing the plain biometric details while it is passed through the network. The proposed approach has no restrictions on the biometric data used and it is appli cable for multiple biometrics (face, iris, hand geometry, and finger print). Authentication by using two way encryption will give additional layer of security when comparing with existing system s .
 A. K. Jain, A. Ross, and S. Prabhakar, “An intr oduction to biometric recognition,” IEEE Trans. Circuits Syst. Video Technol. , vol. 14, no. 1,pp. 4 – 20, Jan. 2004.
 Book Understanding biometrics from http://www.griaulebiometrics.com.
 N. K. Ratha, J. H. Connell, and R. M. Bolle, “Enhancing secu rity and privacy in biometrics - based authentication systems,” IBM Syst. J. , vol.40, no. 3, pp. 614 – 634, Mar. 2001.
 in Proc. Worshop on Biometrics (CVPR) , Anchorage, AK, 2006, 07
 R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining dig ital signatures and public - key cryptosystems,” Commun. ACM , vol. 21, no.2, pp. 120 – 126, 1978.
 C. Fontaine and F. Galand, “A survey of homomorphic encryption for nonspecialists,” EURASIP , vol. 1, pp. 1 – 15, 2007.
 C. Gentry, “Fully homomorphic encr yption using ideal lattices,” STOC , pp. 169 – 178, 2009.
 A. K. Jain, K. Nandakumar, and A. Nagar, “Biometric template security,” EURASIP , vol. 8, no. 2, pp. 1 – 17, 2008.
 M. Upmanyu, A. M. Namboodiri, K. Srinathan, and C. V. Jawahar,“ Efficient biometr ic verification in the encrypted domain,” in 3rd Int.Conf. Biometrics , Jun. 2009, pp. 906 – 915.
 test data used from Biometrics ideal test website with the URL of http://biometrics.idealtest.org.
 http://www.natlawreview.com/article/israeli - biometric - data - hacked .
 http://www.theinquirer.net/inquirer/news/1009515/bri tish - biometric - passport - hacked
accuracy, authentication, biometrics, crypto sys tems, privacy, protocol, public key cryptography, revocability, security.