This paper presents a biometrics based security algorithm for transferring a file in a distributed environment using lip prints. This work is motivated by large problems arising in certain applications such as e-commerce and criminal detection applications. Biometric is one of the unique features that are used personal identification process. The main objective of the paper is the determinations of an individual identify in order to avoid threat to the security. Conventional methods do not produce satisfactory results for transferring files in a distributed environment. First, the transferred file is too converted into an encrypted format to protect the source from unauthorized users. Second, the encryption and decryption of the document is based on the public key and private key generated by the system.
Keywords: Lip Prints, Document, Public Key, Private Key, Biometrics, Key Distribution Center, Data Transfer, and Security.
[...] This technique creates an electric field with which an array of pixels can measure variations in the electric field that are caused by the ridges and valleys in the lip print. Temperature Sensors This technique makes a distinction between the temperature of the ridges and the temperature scan can be taken by simply swiping the lip over the sensor. As mentioned before, the success of biometric device lies in the acceptance of that device by the users. If the device is easy to use and does not taken too much user time, then most likely it will be accepted and used correctly. [...]
[...] Lip print-based identification has been used for a long time and is routinely used in forensic laboratories and identification units all around the world. Lip print evidence has also been accepted in courts of law for nearly a century. The population as a whole is familiar with lip print identification methods and this familiarity makes this technique have a high user acceptance rate Lip print patterns can be represented by a large number of features including the overall ridge flow pattern, ridge, frequency, location and position of singular points. [...]
[...] The user can select any file from the received file list and decode the content using the private key that is generated by the key generation module CONCLUSION This paper has presented a new approach to the provide security for the file transfer process in distributed environment. It also combines the biometrics and cryptography to provide the security for the document transmission process in the distributed environment. The biometrics technology as the security providing medium and uses the lip prints for the security system. [...]
[...] The lip print data is given as an image input to the system. The image data value is used to create the key base value. The key base value is used to generate the public key value. The public key value is transferred to the KDC with the client details. The system supports the JPEG and the GIF image formats. The image data is extracted and the pixel matrix is constructed. The key base in generated by using the image data matrix values. [...]
[...] The KDC maintains only one key entry for each client ID. The clients can change their key value and update then at any time. In case the existing key value is removed from the list and the new key value is added into the list Key Management process The key management module is designed to perform the key maintenance process. The key management module has two main tasks. They are the key receive process and key expiry management process Key Distribution Process The key distribution module is designed to handle client key requests. [...]
APA Style referenceFor your bibliography
Online readingwith our online reader
Content validatedby our reading committee