An Implementation of Hybrid Cryptographic Protocol For Facial Image Security
Abstract
Security is a prime concern for user authentication and there are so many methods to ensure the user authentication. One of the available methods is biometric authentication. Encryption is also considered to be the better alternative to enhance the security of the biometric images. Even though, there are so many biometric traits used for user authentication, this work considers only the facial images of the user for their authentication due to its simplicity and ease of implementation. The core aim of this paper is to implement a security protocol for facial image security using both symmetric and asymmetric cryptographic techniques. This hybrid approach ensures the security of facial image while transferring through unreliable communication channel against various security attacks. Symmetric algorithms provide a simple biometric encryption. Since the key distribution in symmetric cryptographic algorithms is critical, the secret key of the symmetric algorithms can be encrypted using asymmetric cryptographic algorithms and so provide higher security. In this paper, the proposed protocol, an effective mechanism for confidentiality and authentication for facial image security system by using AES and ECC. The performance is measured considering the various factors like file size, encryption time, decryption time, throughput, False Acceptance Rate and False Rejection Rate.
References
Shah, Jolly, and Vikas Saxena, Performance Study on Image Encryption Schemes. arXiv preprint arXiv:1112.0836 (2011).
Ross, Arun, Anil Jain, and James Reisman, A hybrid fingerprint matcher, Pattern Recognition, 36(7)(2003), 1661-1673.
Shukla, Sonam, and Pradeep Mishra, A Hybrid Model of Multimodal Biometrics System using Fingerprint and Face as Traits, IJCSES 1(2)(2010).
K.Kavitha and K.Kuppusamy, A Hybrid Biometric Authentication Algorithm, International Journal of Engineering Trends and Technology, 3(3)(2012), 311319.
Kuppuswamy, Prakash, and Dr.Saeed QY Al-Khalidi, Implementation Of Security Through Simple Symmetric Key Algorithm Based On Modulo 37, International Journal of Computers & Technology, 3(2)(2012).
M.Gobi and D.Kannan, A Secured Public Key Cryptosystem for Biometric Encryption, International Journal of Computer Science & Information Technologies, 5(1)(2014).
Encryption, Biometric, et al., chapter 22 in ICSA Guide to Cryptography, edited by Randall K. Nichols, (1999).
Soni, Shraddha, H.Agrawal and M.Sharma, Analysis and comparison between AES and DES Cryptographic Algorithm, International Journal of Engineering and Innovative Technology, 2(6)(2012), 362-365.
Masram, Ranjeet, et al., Analysis and Comparison of Symmetric Key Cryptographic Algorithms based on Various File Features, International Journal of Network Security & Its Applications, 6(4)(2014).
Guru and Omkar, Implementation of cryptographic algorithms and protocols, Diss. National Institute of Technology Rourkela, (2007).
M.Seetha, Anjan K. Koundinya and C.A.Prashanth, Comparative Study and Performance Analysis of Encryption in RSA, ECC and Goldwasser-Micali Cryptosystems.
Abdurahmonov, Tursun, Eng-Thiam Yeoh, and Helmi Mohamed Hussain, The implementation of Elliptic Curve binary finite field (F 2m) for the global smart card, Research and Development (SCOReD), 2010 IEEE Student Conference on. IEEE, (2010).
Lauter and Kristin, The advantages of elliptic curve cryptography for wireless security, IEEE Wireless communications, 11(1)(2004), 62-67.
M.Gobi and R.Sridevi, Performance Analysis of Biometric Image Encryption in Transformed Formats using Public Key Cryptography, International Journal of Scientific & Engineering Research, 6(2)(2015).
Gupta, Kamlesh and Sanjay Silakari, Efficient hybrid image cryptosystem using ecc and chaotic map, International Journal of Computer Applications, 29(3)(2011).
Soutar, Colin, et al., Biometric Encryption: enrollment and verification procedures, Aerospace/Defense Sensing and Controls. International Society for Optics and Photonics, (1998).
Cavoukian, Ann and Alex Stoianov, Biometric encryption: A positive-sum technology that achieves strong authentication, security and privacy, Information and Privacy Commissioner, Ontario, (2007).
M.Gobi and R.Sridevi, Multi-Biometric Authentication through Hybrid Cryptographic System, International Conference on Computing and Intelligence Systems, 04(2015).
Prabhakar, Salil, Sharath Pankanti and Anil K. Jain, Biometric recognition: Security and privacy concerns, IEEE Security & Privacy, 1(2)(2003), 33-42.