Please use this identifier to cite or link to this item: http://hdl.handle.net/10397/105733
PIRA download icon_1.1View/Download Full Text
DC FieldValueLanguage
dc.contributorDepartment of Computing-
dc.creatorKumar, A-
dc.creatorKumar, A-
dc.date.accessioned2024-04-15T07:36:18Z-
dc.date.available2024-04-15T07:36:18Z-
dc.identifier.urihttp://hdl.handle.net/10397/105733-
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineersen_US
dc.rights© 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.en_US
dc.rightsPosted with permission of the publisher.en_US
dc.rightsThe following publication A. Kumar and A. Kumar, "A Cell-Array-Based Multibiometric Cryptosystem," in IEEE Access, vol. 4, pp. 15-25, 2016 is available at https://doi.org/10.1109/ACCESS.2015.2428277.en_US
dc.subjectBCH encodingen_US
dc.subjectBiometricsen_US
dc.subjectCryptosystemen_US
dc.subjectIrisen_US
dc.subjectMultimodal cryptosystemsen_US
dc.subjectPalmprinten_US
dc.titleA cell-array-based multibiometric cryptosystemen_US
dc.typeJournal/Magazine Articleen_US
dc.identifier.spage15-
dc.identifier.epage25-
dc.identifier.volume4-
dc.identifier.doi10.1109/ACCESS.2015.2428277-
dcterms.abstractThis paper presents a new framework for a biometric cryptosystem in which a cryptographic key is concealed with biometric modalities. In this paper, the candidate biometric modality is secured using two functions: 1) BCH encoding, which delivers the parity-code stored for the alignment of the query biometric template and 2) the Hash function to compute hash-code in order to safeguard its integrity. The cryptosystem is formed by creating two different cell-arrays. The hash-code is scattered on one cell-array by a randomly chosen column position, and the secret key is distributed over the second cell-array on the same position. The other cell-array locations are filled with the randomly generated chaff vectors. The parity-code is then jumbled up using a regenerative XORCoding in order to hide it from unauthorized access. At the unlocking stage, the parity-code is regenerated using XORcode and used to align the query template to the original one. If the hashed-code computed from the aligned template can locate the correct locations of the original hashed-code from the feature-array, it can get back the secret-key from the key-array and the correspondingly secret message. The proposed algorithm is implemented and evaluated in two modes: 1) unimodal and 2) multimodal. The experimental results from publicly available databases confirm the superiority of the multimodal cryptosystems over the unimodal cryptosystems.-
dcterms.accessRightsopen accessen_US
dcterms.bibliographicCitationIEEE access, 2016, v. 4, p. 15-25-
dcterms.isPartOfIEEE access-
dcterms.issued2016-
dc.identifier.scopus2-s2.0-84979819546-
dc.identifier.eissn2169-3536-
dc.description.validate202402 bcch-
dc.description.oaVersion of Recorden_US
dc.identifier.FolderNumberCOMP-1659en_US
dc.description.fundingSourceOthersen_US
dc.description.fundingTextHong Kong Polytechnic Universityen_US
dc.description.pubStatusPublisheden_US
dc.identifier.OPUS6664945en_US
dc.description.oaCategoryPublisher permissionen_US
Appears in Collections:Journal/Magazine Article
Files in This Item:
File Description SizeFormat 
Kumar_Cell-Array-Based_Multibiometric.pdf6.65 MBAdobe PDFView/Open
Open Access Information
Status open access
File Version Version of Record
Access
View full-text via PolyU eLinks SFX Query
Show simple item record

Page views

14
Citations as of Jun 30, 2024

Downloads

1
Citations as of Jun 30, 2024

SCOPUSTM   
Citations

17
Citations as of Jul 4, 2024

WEB OF SCIENCETM
Citations

14
Citations as of Jul 4, 2024

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.