Open Access   Article Go Back

Generating Secure Key for VoIP Network by Fusion of Irises

S. Bhuvaneshwari1 , P. Arul2

Section:Review Paper, Product Type: Journal Paper
Volume-06 , Issue-11 , Page no. 142-146, Dec-2018

Online published on Dec 31, 2018

Copyright © S. Bhuvaneshwari, P. Arul . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. Bhuvaneshwari, P. Arul, “Generating Secure Key for VoIP Network by Fusion of Irises,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.11, pp.142-146, 2018.

MLA Style Citation: S. Bhuvaneshwari, P. Arul "Generating Secure Key for VoIP Network by Fusion of Irises." International Journal of Computer Sciences and Engineering 06.11 (2018): 142-146.

APA Style Citation: S. Bhuvaneshwari, P. Arul, (2018). Generating Secure Key for VoIP Network by Fusion of Irises. International Journal of Computer Sciences and Engineering, 06(11), 142-146.

BibTex Style Citation:
@article{Bhuvaneshwari_2018,
author = {S. Bhuvaneshwari, P. Arul},
title = {Generating Secure Key for VoIP Network by Fusion of Irises},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2018},
volume = {06},
Issue = {11},
month = {12},
year = {2018},
issn = {2347-2693},
pages = {142-146},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=559},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=559
TI - Generating Secure Key for VoIP Network by Fusion of Irises
T2 - International Journal of Computer Sciences and Engineering
AU - S. Bhuvaneshwari, P. Arul
PY - 2018
DA - 2018/12/31
PB - IJCSE, Indore, INDIA
SP - 142-146
IS - 11
VL - 06
SN - 2347-2693
ER -

           

Abstract

Over the year several new technologies and applications has being developed to deploy and reap the benefits of the Internet, Voice over Internet Protocol (VoIP) is one of those technologies. VoIP converts the voice signal from your telephone into a digital signal that travels over the Internet. One particular juicy offer that the VoIP provides is its cheapness and the ability to use an existing Internet connection/access to make calls. VoIP has come with both its advantages and challenges which make it yet another issue to worry about. The chief problem is to protect our data in a unique way that could only be worked upon by encrypting the voice data which run over the open network. Enforcement of using encryption is to provide confidentiality in communication channel. Using biometric we can generate an exclusive key that will be unique for each and every individual. Here we propose to make a contribution of the sender’s iris and database iris biometrics to have a secured VoIP communication. After fusing these two irises, the key will be generated. The key will be used for encrypting our data in VoIP. Thus the proposed method will provide secured VoIP communication and billions of unique keys can be generated, making VoIP technology hard for an attacker to guess the key . This key act as a symmetric key for both encryption and decryption. This proposed system is composed following modules 1) Feature extraction of Iris 2) Cryptographic key generation. 3) Fusion of irises.

Key-Words / Index Term

Biometrics, Cryptosystem, Iris Extraction, Minutiae point, Fusion

References

[1] “Voice over Internet Protocol” from http://en.wikipedia.org/wiki/Voice_over_IP
[2] Persky, D. (2007). VoIP Security Vulnerabilities. Sans Institute 2007. Retrieved July 13, 2009
[3] N. K. Ratha, J. H. Connell, and R. M. Bolle “Enhancing security and privacy in biometrics based authentication systems”, IBM Systems Journal, vol. 40, pp. 614-634, 2001.
[4] T. Zhang, X. Li, D. Tao, and J. Yang, “Multi-modal biometrics using geometry preserving projections”, Pattern Recognition, vol. 41, no. 3, pp. 805-813, 2008.
[5]Yan Yan and Yu-Jin Zhang, “Multimodal Biometrics Fusion Using Correlation Filter Bank", in proceedings of 19th International Conference on Pattern Recognition, pp. 1-4, Tampa, FL, 2008.
[6]S. C. Chong, A. B. J. Teoh, and D. C. L. Ngo, “Iris Authentication Using Privatized Advanced Correlation Filter,” in ICB, pages 382–388, 2006
[7] A. Czajka and A. Pacut, “Iris recognition with adaptive coding”,Rough Sets and Knowledge Technology, Lecture Notes in Artifical Intelligence, vol. 4481, Springer, 2007, pp. 195–202. [8]
[8] P. Balakumar and R. Venkatesan, Secure Biometric Key Generation Scheme for Cryptography using Combined Biometric Features of Fingerprint and Iris , IJCSI International Journal of Computer Science Issues, 8(5), 2011, 349-356.
[9] Feng Hao, Ross Anderson and John Daugman, "Combining Crypto with Biometrics Effectively", IEEE Transactions on Computers, vol. 55, no 9, 2006.
[10] Peter Thermos; Ari Takanen, “Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures”, Addison-Wesley Professional, August 2007, ISBN-10: 0-321-43734-9.
[11] P.Arul, Dr.A.Shanmugam, "Generate a Key for AES Using Biometric for VOIP Network Security", Journal of Theoretical and Applied Information Technology, vol. 5, no.2, 2009.
[12] Umut Uludag, Sharath Pankanti, Salil Prabhakar, Anil K.Jain,“Biometric Cryptosystems Issues and Challenges”, in Proceedings of the IEEE, vol. 92, pp. 948-960, 2004.
[13] Jain AK, Bolle R, Pankanti S. Biometrics: personal identification in network society. Kluwer Academic Publishers; 1999.
[14] Daugman John. High confidence visual recognition of persons by a test of statistical independence. IEEE Trans Pattern Anal Mach Intell 1993;15(11):1148–61.
[15] Daugman JG. Statistical richness of visual phase information: update on recognizing persons by iris patterns. Int J Comput Vision 2001;45(1):25–38.
[16]Wildes RP.Iris recognition: an emerging biometric technology. Proc IEEE 1997;85(9):1348–63.
[17] Boles WW. A wavelet transform based technique for the recognition of the human iris. In: Proceedings of the international symposium on signal processing and its application, ISSPA, Gold Coast, Australia; August 1996. p. 25–30.
[18] Debnath Bhattacharyya, Poulami Das,Samir Kumar Bandyopadhyay and Tai-hoon Kim, "IRIS Texture Analysis and Feature Extraction for Biometric Pattern Recognition", International Journal of Database Theory and Application, vol. 1, no. 1, pp. 53-60, December 2008.
[19] J. Daugman, “Statistical Richness of Visual Phase Information Update on Recognizing Persons by Iris Patterns,” International Journal of Computer Vision, vol. 45, no. 1, pp. 25-38, 2001.
[20] A. Ross and A. K. Jain, .Information Fusion, in Biometrics ,Pattern Recognition, , 24 (13), 2115-2125 (2003).
[21]S. Soviany and M. Jurian, “Multimodal biometric securing methods for informatic systems,” in Proceedings of the 34th International Spring Seminar on Electronic Technology, pp. 12– 14, Phoenix, Ariz, USA, May 2011.
[22] S. Soviany, C. Soviany, and M. Jurian, “A multimodal approach for biometric authentication with multiple classifiers,” in International Conference on Communication, Information and Network Security, pp. 28–30, 2011.
[23] F. Besbes, H. Trichili, and B. Solaiman, “Multimodal biometric system based on fingerprint identification and iris recognition,” in Proceedings of the 3rd International Conference on Information and Communication Technologies: From Theory to Applications (ICTTA ’08), pp. 1–5, Damascus, Syria, April 2008.
[24] Bremananth R and Chitra A, „An efficient biometri cryptosystem using autocorrelators‟ International Journal of SignalProcessing 2;3, pp.158-164, 2006..
[25] John Daugman, “How Iris Recognition Works”, in Proceedings of International Conference on Image Processing, vol.1, pp. I-33- I-36, 2002.
[26] Beng.A, Jin Teoh and Kar-Ann Toh, "Secure biometric-key generation with biometric helper”, in proceedings of 3rd IEEE Conference on Industrial Electronics and Applications, pp.2145-2150, Singapore, June 2008.