A Secure Crypto-Biometric System Utilizing GMM Encoder and BCH

Main Article Content

Ms. Sanjeevini
Ashraya B.
Aparnika G.
Akshitha M.

Abstract

Now that cloud computing has reached maturity, a diverse array of providers and services are available in the cloud. On the other hand, security issues continue to receive a lot of focus. Despite the many benefits of cloud computing, users are hesitant to embrace the technology due to concerns about their security and privacy. While biometric technologies are rapidly becoming an integral part of many secure identification and personal verification solutions, they do pose certain challenges when stored in the cloud owing to privacy regulations and the requirement to have faith in cloud providers when handling biometric data. In this work, we offer a crypto biometric system that can be used with cloud computing to solve these issues. This system ensures that no private biometric data is revealed.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

Article Details

How to Cite
Sanjeevini, B. , A. ., G. , A., & M. , A. (2024). A Secure Crypto-Biometric System Utilizing GMM Encoder and BCH. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 15(3), 35–44. https://doi.org/10.61841/turcomat.v15i3.14776
Section
Articles

References

Balachandra Reddy Kandukuri, Ramakrishna Paturi V., Atanu Rakshit, Cloud Security Issues IEEE International Conference on Services Computing 2009, IEEE SCC 2009: 517-520, Bangalore, India, Sep 2009.

R. Chow, P. Golle, M. Jakobsson, E. Shi, J. Staddon, R. Masuoka, and J. Molina, Controlling data in the cloud: outsourcing computation without outsourcing control. In Proceedings of the 2009 ACM Workshop on Cloud Computing Security (CCSW ’09): 85-90, ACM, New York, Nov 2009.

S. Yu, C. Wang, K. Ren, and W. Lou, Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing, Proceedings of the 29th conference on Information Communications, IEEE INFOCOM 2010: 534-542, San Diego, CA, USA, Mar 2010.

C. Wang, Q. Wang, K. Ren, and W. Lou, Ensuring data storage security in cloud computing. 17th International Workshop on Quality of Service, IWQoS 2009: 1-9, Charleston, SC, USA, Jul 2009.

S. Creese, P. Hopkins, S. Pearson, and Y. Shen, Data ProtectionAware Design for Cloud Services. Proceedings of the 1st International Conference on Cloud Computing, CloudCom ’09, LNCS 5931/2009: 119-130, Beijing, China, Dec 2009.

Q. Wang, C. Wang, J. Li, K. Ren, W. Lou, Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing, Computer Security ESORICS 2009, LNCS 5789, Springer: 355-370, Saint-Malo, France, Sep 2009.

P. Tuyls, E. Verbitskiy, J. Goseling, and D. Denteneer, Privacy protecting biometric authentication systems: an overview, EUSIPCO 2004: XII European Signal Processing Conference: 1397-1400, Vienna, Austria, Sep 2004.

D. Kesavaraja, D. Sasireka, and D. Jeyabharathi, Cloud Software as a Service with Iris Authentication, Journal of Global Research in Computer Science, 1(2): 16-22 September 2010. [9] S. Suryadevara, S. Kapoor, S. Dhatterwal, R. Naaz, and A. Sharma, Tongue as a Biometric Visualizes New Prospects of Cloud Computing, 2011 International Conference on Information and Network Technology, IPCSIT 4(2011): 73-78, Chennai, India, Apr 2011.

N.K. Ratha, J.H. Connell, and R. Bolle, Enhancing Security and Privacy of Biometric-Based Authentication Systems, IBM Systems Journal, 40(3): 614–634, 2001.

A.K. Jain, K. Nandakumar, A. Nagar, Biometric Template Security, EURASIP Journal on Advances in Sign. Proc., Special Issue on Biometrics: 113:1–113:17, 2008.

A. Goh, D.C.L. Ngo, Computation of Cryptographic Keys from Face Biometrics, 7th IFIP-TC6 TC11 International Conference, CMS 2003, Lecture Notes in Computer Science, 2828/2003: 1-13, Torino, Italy, Oct 2003.

N. Ratha, S. Chikkerur J. H. Connell, R. M. Bolle, Generating Cancelable Fingerprint Templates, IEEE Transactions on Pattern Analysis and Machine Intelligence, 29(4): 561-572, 2007.

E. Maiorana, P. Campisi, J. Fierrez, J. Ortega-Garcia, and A. Neri, Cancelable templates for sequence-based biometrics with application to online signature recognition, IEEE Transactions on Systems, Man and Cybernetics Part A, 40(3): 525-538, 2010.

D.A. Reynolds, T.F. Quatieri, R.B. Dunn, Speaker verification using adapted gaussian mixture models, Digital Signal Processing, 10(1-3): 19-41, 2000.

P. Kenny, G. Boulianne, and P. Dumouchel, Eigenvoice Modeling With Sparse Training Data, IEEE Transactions on Speech and Audio Processing, 13(3): 345-354, 2005.

C. Vielhauer, R. Steinmetz, Handwriting: Feature Correlation Analysis for Biometric Hashes, EURASIP Journal on Applied Signal Processing, 2004(4): 542-558, 2004.

A. Juels, M. Wattenberg, A Fuzzy Commitment Scheme, CCS99 Sixth ACM Conference on Computer and Communication Security: 28-36 Singapore, India, Nov 1999.

P. Tuyls, A. Akkermans, T. Kevenaar, G.J. Schrijen, A. Bazen, R. Veldhuis, Practical biometric template protection system based on reliable components, Audio- and Video-Based Biometric Person Authentication (AVBPA): 436-446, Hilton Rye Town, NY, USA, Jul 2005.

M. Van der Veen, T. Kevenaar, G.-J. Schrijen, T.H. Akkermans, and F. Zuo, Face biometrics with renewable templates, SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents, 6072: 205-216 San Jose, CA, USA, Jan 2006.

F. Hao, R. Anderson, and J. Daugman, Combining crypto with biometrics effectively, IEEE Transactions on Computers, 55(9): 1081-1088, 2006. [22] K. Simoens, P. Tuyls, B. Preneel, Privacy Weaknesses in Biometric Sketches, 30th IEEE Symposium on Security and Privacy: 188-203, Oackland, CA, USA, May 2009.

S. Kanade, D. Camara, E. Krichen, D. Petrovska-Delacretaz, B. Dorizzi, ´ Three Factor Scheme for Biometric-Based Cryptographic Key Regeneration Using Iris, Biometrics Symposium, 2008. BSYM’08: 59-64, Tampa, Florida, USA, 23-25 Sept. 2008.

J.L. Alba-Castro, D. Gonzalez-Jim ´ enez, E. Argones-R ´ ua, E. Gonz ´ alez- ´ Agulla, E. Otero-Muras, Carmen Garc´ıa-Mateo, Pose-corrected face processing on video sequences for webcam-based remote biometric authentication, Journal of Electronic Imaging, 17(1): 011004, 2008.

E. Argones Rua, D. P.'erez--Pinar .'opez, , J.L. Alba-Castro, ´ Ergodic hmmubm system for on-line signature verification, Joint COST 2101 and 2102 International Conference, BioID MultiComm 2009, Lecture Notes in Computer Science, 5707/2009: 340-347, Madrid, Spain, Sep 2009.

L. E. Baum, T. Petrie, G. Soules, and N. Weiss, A Maximization Technique Occurring in the Statistical Analysis of Probabilistic Functions of Markov Chains, The Annals of Mathematical Statistics, 41(1): 164-171, 1970.