IoT Securing System Using Fuzzy Commitment for DCT-Based Fingerprint Recognition
Title | IoT Securing System Using Fuzzy Commitment for DCT-Based Fingerprint Recognition |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Bentahar, A., Meraoumia, A., Bendjenna, H., Zeroual, A. |
Conference Name | 2018 3rd International Conference on Pattern Analysis and Intelligent Systems (PAIS) |
Date Published | oct |
Keywords | authentication, biometric encryption, computer network security, cryptography, Databases, DCT, DCT-based fingerprint recognition, DCT-based recognition method, discrete cosine transforms, Encryption, encryption system, error-corrector codes, FAR criteria, feature extraction, fingerprint identification, Fingerprint recognition, FRR criteria, fuzzy commitment, fuzzy commitment scheme, fuzzy set theory, Internet of Things, IoT features, IoT securing system, IoT security, Metrics, pubcrawl, resilience, Resiliency, Scalability, Servers |
Abstract | Internet of Things refers to a paradigm consisting of a variety of uniquely identifiable day to day things communicating with one another to form a large scale dynamic network. Securing access to this network is a current challenging issue. This paper proposes an encryption system suitable to IoT features. In this system we integrated the fuzzy commitment scheme in DCT-based recognition method for fingerprint. To demonstrate the efficiency of our scheme, the obtained results are analyzed and compared with direct matching (without encryption) according to the most used criteria; FAR and FRR. |
URL | https://ieeexplore.ieee.org/document/8598511 |
DOI | 10.1109/PAIS.2018.8598511 |
Citation Key | bentahar_iot_2018 |
- Fingerprint recognition
- Servers
- Scalability
- Resiliency
- resilience
- pubcrawl
- Metrics
- IoT security
- IoT securing system
- IoT features
- Internet of Things
- fuzzy set theory
- fuzzy commitment scheme
- fuzzy commitment
- FRR criteria
- authentication
- fingerprint identification
- feature extraction
- FAR criteria
- error-corrector codes
- encryption system
- encryption
- discrete cosine transforms
- DCT-based recognition method
- DCT-based fingerprint recognition
- DCT
- Databases
- Cryptography
- computer network security
- biometric encryption