A survey on biometric based crypto techniques
The biometric based crypto techniques extract the features from grayscale images and use those features in encryption process i.e., key will be generated from extracted features. In attribute based crypto-systems attributes of the user like email, usernames etc.…will be treated as a public key. Secr...
Saved in:
Published in | International journal of engineering & technology (Dubai) Vol. 7; no. 2.7; p. 1091 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
18.03.2018
|
Online Access | Get full text |
Cover
Loading…
Summary: | The biometric based crypto techniques extract the features from grayscale images and use those features in encryption process i.e., key will be generated from extracted features. In attribute based crypto-systems attributes of the user like email, usernames etc.…will be treated as a public key. Secret key is associated with each attribute i.e. for email there will be a secret key and for username there will be another secret key. In biometric based crypto systems, an access policy is built from the extracted biometric features. |
---|---|
ISSN: | 2227-524X 2227-524X |
DOI: | 10.14419/ijet.v7i2.7.12234 |