scispace - formally typeset
Search or ask a question
Book ChapterDOI

A Novel Biometric Template Encryption Scheme Using Sudoku Puzzle

TL;DR: An attempt has been made to secure the biometric data using sudoku puzzle to combat ID theft and impart higher levels of security when appropriately integrated into applications requiring user authentication.
Abstract: Identity theft is a growing concern in the digital era. As per the US Federal Trade Commission, millions of people got victimized in each year [1]. Traditional authentication methods such as passwords and identity documents are not sufficient to combat ID theft or ensure security. Such representations of identity can easily be forgotten, lost, guessed, stolen, or shared. On the contrary, biometric systems recognize individuals based on their anatomical traits (e.g., fingerprint, face, palm print, iris, and voice) or behavioral traits (e.g., signature, gait). As such traits are physically linked to the user, biometric recognition is a natural and more reliable mechanism for ensuring that only legitimate or authorized users are able to enter a facility, access a computer system, or cross international borders. Biometric systems also offer unique advantages such as deterrence against repudiation and the ability to detect whether an individual has multiple identity cards (e.g., passports) under different names. Thus, biometric systems impart higher levels of security when appropriately integrated into applications requiring user authentication. In this paper, an attempt has been made to secure the biometric data using sudoku puzzle.
Citations
More filters
Proceedings ArticleDOI
01 Aug 2016
TL;DR: A novel protocol for biometrics authentication on stolen token based on cancelable is presented, aimed at addressing problems and rising public confidence in cloud computing.
Abstract: Cloud computing is introducing several immense changes to people's life style and dealing pattern recently for its innumerous advantages. However, potential security issues are often the barrier for its widespread applications. Modern biometric technologies such as fingerprints claim to produce a different answer to cloud security. Even though there are areas which biometrics method provides benefits, it is at risk of attacks. Towards addressing these problems and rising public confidence, a novel protocol for biometrics authentication on stolen token based on cancelable is presented.

4 citations


Cites background from "A Novel Biometric Template Encrypti..."

  • ...The design is a robust key to protect the original biometrics from being shared, copied or distributed across a network [5] [6] [7] [8] [9]....

    [...]

Book ChapterDOI
01 Jan 2021
TL;DR: In this paper, a permuted backtracking-based methodology was developed to solve different 3D Sudoku instances, which can solve an n × n× n Sudoku having n2 faces and provide all possible solutions for a valid Sudoku instance.
Abstract: Sudoku matrix is a unique Latin square-based mathematical structure, which may have several dimensions like 2D, 3D, etc. This structure has several applications in different domains of computer science. So, solving Sudoku and finding all its possible solutions are very important. Since 3D Sudoku has one extra dimension over 2D, it may give an edge to different applications of this puzzle game. Therefore, in this work, an effort has been made to explore all possible solutions of 3D Sudoku matrix. We have developed a permuted backtracking-based methodology to solve different 3D Sudoku instances. This method can solve an n × n× n Sudoku having n2 faces and provide all possible solutions for a valid Sudoku instance.

4 citations

Book ChapterDOI
TL;DR: In this paper, the authors developed algorithms for creating numerous Sudoku instances of varying levels of difficulty, where the number of possible solutions of a Sudoku puzzle is checked and then based on the results, the instance that has been generated is further classified.
Abstract: Sudoku puzzles have become popular worldwide among many players of different intellectual levels. In this paper, we develop algorithms for creating numerous Sudoku instances of varying levels of difficulty. There are several ways to generate a Sudoku instance. The most popular one is to consider one solved Sudoku puzzle and remove some of the numbers from the cells based on the required difficulty level. Although all Sudoku puzzle creators assume that there is a single solution for a generated puzzle, we notice that a Sudoku puzzle may have multiple solutions. None of the instance generation techniques are able to find how many different solutions are present for a generated Sudoku instance. Here in this paper, we have devised one novel approach that can generate a Sudoku instance and check for its number of possible solutions, and then based on the number of solutions we further categorize the instance that has been generated. This approach is entirely novel and comprehensive for generating Sudoku instances.

3 citations

Journal ArticleDOI
TL;DR: In this article , the authors have proposed two different solvers for solving 3D Sudoku puzzles of size 9×9×9 and 9 × 9×10×10, respectively.
Abstract: Sudoku is a complicated multidimensional mathematical structure with several applications in various computer science domains. 3D Sudoku, compared to 2D, has one more dimension that can potentially provide an extra edge to the different applications of this puzzle game. Various researchers have developed various types of 2D Sudoku solver using different methodologies. But there is very limited research in the area of developing 3D Sudoku solver.We have proposed two different solvers for solving 3D Sudoku puzzles of size 9×9×9. Both the solvers providing all possible solutions for a 3D Sudoku instance. 2D Sudoku puzzles are applied in different research domains with different purposes. Recently 3D structure of Sudoku is also applying in several areas to achieve more effectiveness compared to 2D Sudoku. As well as it can also be used to solve problem in 3D space. Again, solving an NP-complete puzzle by considering its 3D structure is a challenging job. Thus, we have endeavoured to achieve all possible solutions for a 3D Sudoku instance in this work. In the first version of our proposed algorithm all probable values for each blank cell have been computed and stored. Subsequently, few elimination-based methods have been used to reduce the number of probable values (if possible) for each blank cell. Finally, the solutions have been computed using the backtracking method. In the second version of our proposed algorithm, the nine 2D Sudoku puzzles lying in the xz-plane one above the other, which form the 3D puzzle, have been fed as the input. All possible solutions have been obtained for each of the nine puzzles. Then, the obtained solutions have been mapped to achieve one or more solutions for the 3D Sudoku instance. Thus, our proposed techniques provide a new approach for solving 3D Sudoku. In addition, applying the obtained solutions provides us with an advantage over 2D Sudoku, in solving problem of 3D space and where more data is required.
Journal ArticleDOI
TL;DR: In this article , two different solvers for solving 3D Sudoku puzzles of size $9\times 9 \times 9$ are proposed in this work, and both solvers provide all possible solutions for solving a three-dimensional Sudoku puzzle.
Abstract: Sudoku is a complicated multidimensional mathematical structure with several applications in various computer science domains. 3D Sudoku, compared to 2D, has one more dimension that can potentially provide an extra edge in the field of different application areas. Several researchers have developed various types of 2D Sudoku solvers using different methodologies. However, there is very limited research in the area of developing 3D Sudoku solvers. Thus, two different solvers for solving 3D Sudoku puzzles of size $9\times 9 \times 9$ are proposed in this work. Both solvers provide all possible solutions for solving a 3D Sudoku puzzle. 2D Sudoku puzzles are applied in different research domains with different purposes. Recently, 3D structure of Sudoku has been applied in several areas to achieve more effectiveness compared to 2D Sudoku. Additionally, it can also be used to solve problems in 3D space. Again, solving an NP-complete puzzle by considering its 3D structure is a challenging job. Thus, we endeavoured to achieve all probable solutions for a 3D Sudoku instance in this work. In the first version of our proposed algorithm, all possible values for each blank cell are computed and stored. Subsequently, a few elimination-based methods are used to reduce the number of probable values (if possible) for each blank cell. Finally, the solutions are computed using the backtracking method. In the second version of our proposed algorithm, the nine 2D Sudoku puzzles, lying in the $xz$ -plane one above the other, which form the 3D puzzle are fed as the input. All possible solutions are obtained for each of the nine puzzles. Then, the obtained solutions are mapped to achieve one or more solutions for the 3D Sudoku instance. Thus, our proposed techniques provide a new approach for solving 3D Sudoku. In addition, applying the obtained solutions provides us with an advantage over 2D Sudoku, in solving problems in the 3D space and where more data is required.
References
More filters
Book
10 Mar 2005
TL;DR: This unique reference work is an absolutely essential resource for all biometric security professionals, researchers, and systems administrators.
Abstract: A major new professional reference work on fingerprint security systems and technology from leading international researchers in the field Handbook provides authoritative and comprehensive coverage of all major topics, concepts, and methods for fingerprint security systems This unique reference work is an absolutely essential resource for all biometric security professionals, researchers, and systems administrators

3,821 citations

Journal ArticleDOI
TL;DR: An overview of biometrics is provided and some of the salient research issues that need to be addressed for making biometric technology an effective tool for providing information security are discussed.
Abstract: Establishing identity is becoming critical in our vastly interconnected society. Questions such as "Is she really who she claims to be?," "Is this person authorized to use this facility?," or "Is he in the watchlist posted by the government?" are routinely being posed in a variety of scenarios ranging from issuing a driver's license to gaining entry into a country. The need for reliable user authentication techniques has increased in the wake of heightened concerns about security and rapid advancements in networking, communication, and mobility. Biometrics, described as the science of recognizing an individual based on his or her physical or behavioral traits, is beginning to gain acceptance as a legitimate method for determining an individual's identity. Biometric systems have now been deployed in various commercial, civilian, and forensic applications as a means of establishing identity. In this paper, we provide an overview of biometrics and discuss some of the salient research issues that need to be addressed for making biometric technology an effective tool for providing information security. The primary contribution of this overview includes: 1) examining applications where biometric scan solve issues pertaining to information security; 2) enumerating the fundamental challenges encountered by biometric systems in real-world applications; and 3) discussing solutions to address the problems of scalability and security in large-scale authentication systems.

1,067 citations

Journal ArticleDOI
18 May 2004
TL;DR: This work presents various methods that monolithically bind a cryptographic key with the biometric template of a user stored in the database in such a way that the key cannot be revealed without a successful biometric authentication.
Abstract: In traditional cryptosystems, user authentication is based on possession of secret keys; the method falls apart if the keys are not kept secret (i.e., shared with non-legitimate users). Further, keys can be forgotten, lost, or stolen and, thus, cannot provide non-repudiation. Current authentication systems based on physiological and behavioral characteristics of persons (known as biometrics), such as fingerprints, inherently provide solutions to many of these problems and may replace the authentication component of traditional cryptosystems. We present various methods that monolithically bind a cryptographic key with the biometric template of a user stored in the database in such a way that the key cannot be revealed without a successful biometric authentication. We assess the performance of one of these biometric key binding/generation algorithms using the fingerprint biometric. We illustrate the challenges involved in biometric key generation primarily due to drastic acquisition variations in the representation of a biometric identifier and the imperfect nature of biometric feature extraction and matching algorithms. We elaborate on the suitability of these algorithms for digital rights management systems.

942 citations

Journal ArticleDOI
TL;DR: This paper seeks to present a broader and more practical view of biometric system attack vectors, placing them in the context of a risk-based systems approach to security and outlining defences.

224 citations

Proceedings Article
01 Sep 2005
TL;DR: The various threats that can be encountered by a biometric system are described and experimental results pertaining to a hybrid system combining biometrics with cryptography, that converts traditional fingerprint templates into novel cryptographic structures are provided.
Abstract: A biometric system is vulnerable to a variety of attacks aimed at undermining the integrity of the authentication process. These attacks are intended to either circumvent the security afforded by the system or to deter the normal functioning of the system. We describe the various threats that can be encountered by a biometric system. We specifically focus on attacks designed to elicit information about the original biometric data of an individual from the stored template. A few algorithms presented in the literature are discussed in this regard. We also examine techniques that can be used to deter or detect these attacks. Furthermore, we provide experimental results pertaining to a hybrid system combining biometrics with cryptography, that converts traditional fingerprint templates into novel cryptographic structures.

203 citations