Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Optimal Double Layer Secret Sharing Scheme for Biometrics

View through CrossRef
Visual secret sharing (VSS) method is an encryption method to ensure the Security of secret data, that just performs the partitioning of ‘n’ shares and distributes among ‘n’ users in an ideal way so that exposing of less than ‘n’ shares is of no utilization. However, some dishonest members or hackers team up and tries to cheat other members in the group. Therefore, we have developed a dual layer secret sharing scheme based on universal share based secret sharing scheme. The dual layer is composed of threshold based secret sharing and then followed by the universal share based secret sharing. Here, the universal share is maintained by the trusted party avoids the contribution of dishonest participants. Moreover, to ensure additional security, the proposed approach employs Oppositional Artificial Fish Swarm Optimization (OAFSO) based Stream Cipher encryption technique to encrypt the shares, shows the novelty of the work. Furthermore, the confidentiality is enhanced with Biometric fingerprint authentication step, where the acknowledged users are alone allowed to get the decrypt shares with that the user can retrieve the secret data. The proposed fingerprint authentication method also makes use of Secure Hash Algorithm (SHA 1) to store the fingerprints and the matching is also done with hashed fingerprints only. So that the attackers cannot take and corrupt the stored fingerprints and the misuse of fingerprints is not possible. Finally the performance analysis is made with existing approaches in terms of PSNR and MSE. Maximum PSNR is 58.9802 and minimum MSE value is 0.6232, while the existing methods provide very less PSNR and greater MSE values than the proposed methods.
Title: Optimal Double Layer Secret Sharing Scheme for Biometrics
Description:
Visual secret sharing (VSS) method is an encryption method to ensure the Security of secret data, that just performs the partitioning of ‘n’ shares and distributes among ‘n’ users in an ideal way so that exposing of less than ‘n’ shares is of no utilization.
However, some dishonest members or hackers team up and tries to cheat other members in the group.
Therefore, we have developed a dual layer secret sharing scheme based on universal share based secret sharing scheme.
The dual layer is composed of threshold based secret sharing and then followed by the universal share based secret sharing.
Here, the universal share is maintained by the trusted party avoids the contribution of dishonest participants.
Moreover, to ensure additional security, the proposed approach employs Oppositional Artificial Fish Swarm Optimization (OAFSO) based Stream Cipher encryption technique to encrypt the shares, shows the novelty of the work.
Furthermore, the confidentiality is enhanced with Biometric fingerprint authentication step, where the acknowledged users are alone allowed to get the decrypt shares with that the user can retrieve the secret data.
The proposed fingerprint authentication method also makes use of Secure Hash Algorithm (SHA 1) to store the fingerprints and the matching is also done with hashed fingerprints only.
So that the attackers cannot take and corrupt the stored fingerprints and the misuse of fingerprints is not possible.
Finally the performance analysis is made with existing approaches in terms of PSNR and MSE.
Maximum PSNR is 58.
9802 and minimum MSE value is 0.
6232, while the existing methods provide very less PSNR and greater MSE values than the proposed methods.

Related Results

Behavioral Biometrics in the European Union: Legal Challenges and Technological Prospects
Behavioral Biometrics in the European Union: Legal Challenges and Technological Prospects
Objective: to study the historical development of the European Union legislation on behavioral biometrics; to identify the features of the European approach to the regulation of be...
Detectability of an intermediate layer by magnetotelluric sounding
Detectability of an intermediate layer by magnetotelluric sounding
Abstract The recent publication by Verma and Mallick (1979) on the detectability of an intermediate layer by time domain EM sounding provides some informative ans...
Experimental Evaluation of Consolidation Behavior of Double-Layer Soft Soil Ground
Experimental Evaluation of Consolidation Behavior of Double-Layer Soft Soil Ground
Abstract Double-layer grounds are characterized by one layer of soft soil on the top of another, which are frequently encountered in land reclamation projects in Chi...
Verifiable secret sharing based on the Chinese remainder theorem
Verifiable secret sharing based on the Chinese remainder theorem
ABSTRACTA (t,n) secret sharing scheme (SS) enables a dealer to divide a secret into n shares in such a way that (i) the secret can be recovered successfully with t or more than t s...
Compulsory and Voluntary Biometrics: Content and Distinction in Russian Law
Compulsory and Voluntary Biometrics: Content and Distinction in Russian Law
The article examines the peculiarities of separation and differentiation of two areas included in the sphere of biometric personal data processing in Russia: compulsory and volunta...
Text image secret sharing with hiding based on color feature
Text image secret sharing with hiding based on color feature
The Secret Sharing is a scheme for sharing data into n pieces using (k, n) threshold method. Secret Sharing becomes an efficient method to ensure secure data transmission. Some vis...
Single layer vs double layer intestinal anastomosis- a prospective comparative study.
Single layer vs double layer intestinal anastomosis- a prospective comparative study.
Abstract Gastrointestinal anastomosis is one of the commonest surgical procedure performed worldwide. The aim of the anastomosis is to make a sound alignment of the bowel t...
Are Joint Controllers Joint Trade Secret Owners? What EU Data Protection and US Information Privacy Law Tell Us About Trade Secret Law
Are Joint Controllers Joint Trade Secret Owners? What EU Data Protection and US Information Privacy Law Tell Us About Trade Secret Law
The article focusses on (joint) trade secret ownership as a (neglected) aspect of European Union (EU) and United States (US) Trade Secret Law. The article shows that Information Pr...

Back to Top