Call for Comming Issue

Volume 2, Issue 2 February 2014

S.No. Title Page No.
Providing Multi-Authentication Using Multi-Biometric Cryptosystem For Enhancing Security
Mr.V.Manogajapathi, S.Avinassh, N.Karthik and S.Chandrasekar
Abstract : Authentication schemes involving Multi Biometric System starts with several identification and verification based security. The proposed system provide safeguarded verification to incorporate this method with ECC that works two copies (i) Blending of fingerprint, Face, iris and signature and Preventing Elliptic Curve and key using ECC.. In the future method, particular portion of multi biometric traits are joined into a solo image and a curvature is created using ECC technique that adopts safeguard parameters created using Genomic Procedure. A one time password is also added to the model to provide more verification. So it is essentially a pattern recognition system that operates by acquiring biometric data from an individual, extracting a feature set from the acquired data, and comparing this feature set against the template set in the database. Multi biometric systems require storage of multiple biometric templates (e.g., fingerprint, iris, and face) for each user, which results in increased risk to user privacy and system security. The future procedure is extremely effective beside False Acceptance Rate [FAR] and False Rejection Rate [FRR].
Allocation strategies for detecting and identifying the leakage and guilty agents
Lata Dudam, Dr.Prof.Mrs.S.S.Apte
Abstract: Now a days, modern business relies on sharing of the sensitive data and email exchanges. The data leakage and email leakages have become widespread. And many severe damages caused by such leakages constitute a problem for organizations. When a distributor gives his sensitive data to set of trusted agents (third parties), some of the data distributed to agents may be leaked and found in some unauthorized place. We use the fake objects which are realistic but fake records added to original data to improve chances of detecting and identifying the leakage and guilty agent. Sample and explicit data request are two allocation strategies used for detecting and identifying the leakage. Using these strategies, data is distributed over the agents, the data is encrypted before distributing, which helps in identifying the guilty agent.





©  2010 All Rights Reserved to IPASJ