Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Call For Paper : Vol. 9, Issue 5 , 2022
Secure Data by using Biometric and Image Slicing

Author : J Rajasekhar 1 E Shravan kumar 2 E Ashwini Kumari 3 G.Hima Bindu 4

Date of Publication :7th March 2016

Abstract: Secret information needs security in a multi user environment. The users no longer have physical control of the outsourced data that provides the data integrity protection in cloud computing a complex task particularly for users with constrained computing resources. Encryption alone is not sufficient in many cases. In this paper we are providing security to data by using biometric secret image (finger print), secret key generation and image slicing techniques .The encrypted image is shared using image slicing so that the image need not be stored on the single server instead it is stored on multiple servers and assigning the secret keys by splitting key into multiple parts .secret key is necessary to reconstruct the encrypted image and used for the authentication purpose.

Reference :

    1. Biham, Eli and Shamir, Adi, Differential Cryptanalysis of the Data Encryption Standard, Springer Verlag, 1993. ISBN 0-387- 97930-1, ISBN 3-540-97930-1.
    2. Biham, Eli and Alex Biryukov: An Improvement of Davies' Attack on DES. J. Cryptology 10(3): 195–206 (1997)
    3. Biham, Eli, Orr Dunkelman, Nathan Keller: Enhancing Differential-Linear Cryptanalysis. ASIACRYPT 2002: pp254–266
    4. Biham, Eli: A Fast New DES Implementation in Software
    5. Campbell, Keith W., Michael J. Wiener: DES is not a Group. CRYPTO 1992: pp512–520 of the NBS Data Encryption Standard" IEEE Computer 10(6), June 1977, pp74–84
    6. Kaliski, Burton S., Matt Robshaw: Linear Cryptanalysis Using Multiple Approximations. CRYPTO 1994: pp26–39
    7. Knudsen, Lars, John Erik Mathiassen: A Chosen-Plaintext Linear Attack on DES. Fast Software Encryption - FSE 2000: pp262–272
    8. Langford, Susan K., Martin E. Hellman: Differential-Linear Cryptanalysis. CRYPTO 1994: 17–25
    9. S. Tang, “Simple Secret Sharing and Threshold RSA Signature Schemes”, Journal of Information and Computational Science, 1, 2004, pp. 259–262
    10. Cryptography and network security by William stallings , 3rd edition, pearson education(page number 37)
    11. G. Blakley, “Safeguarding Cryptographic Keys,” AFIPS ConferenceProceedings, 48, 1979. J Rajasekhar, currently working as Assistant Professor in st.peters engineering college Hyderabad ,University of JNTUH.

Recent Article