Click to open the HelpDesk interface
AECE - Front page banner

Menu:


FACTS & FIGURES

JCR Impact Factor: 1.221
JCR 5-Year IF: 0.961
SCOPUS CiteScore: 2.5
Issues per year: 4
Current issue: Aug 2021
Next issue: Nov 2021
Avg review time: 88 days


PUBLISHER

Stefan cel Mare
University of Suceava
Faculty of Electrical Engineering and
Computer Science
13, Universitatii Street
Suceava - 720229
ROMANIA

Print ISSN: 1582-7445
Online ISSN: 1844-7600
WorldCat: 643243560
doi: 10.4316/AECE


TRAFFIC STATS

1,748,426 unique visits
579,661 downloads
Since November 1, 2009



Robots online now
PetalBot
YandexBot
SemanticScholar


SJR SCImago RANK

SCImago Journal & Country Rank




TEXT LINKS

Anycast DNS Hosting
MOST RECENT ISSUES

 Volume 21 (2021)
 
     »   Issue 3 / 2021
 
     »   Issue 2 / 2021
 
     »   Issue 1 / 2021
 
 
 Volume 20 (2020)
 
     »   Issue 4 / 2020
 
     »   Issue 3 / 2020
 
     »   Issue 2 / 2020
 
     »   Issue 1 / 2020
 
 
 Volume 19 (2019)
 
     »   Issue 4 / 2019
 
     »   Issue 3 / 2019
 
     »   Issue 2 / 2019
 
     »   Issue 1 / 2019
 
 
 Volume 18 (2018)
 
     »   Issue 4 / 2018
 
     »   Issue 3 / 2018
 
     »   Issue 2 / 2018
 
     »   Issue 1 / 2018
 
 
 Volume 17 (2017)
 
     »   Issue 4 / 2017
 
     »   Issue 3 / 2017
 
     »   Issue 2 / 2017
 
     »   Issue 1 / 2017
 
 
  View all issues  








LATEST NEWS

2021-Jun-30
Clarivate Analytics published the InCites Journal Citations Report for 2020. The InCites JCR Impact Factor of Advances in Electrical and Computer Engineering is 1.221 (1.053 without Journal self-cites), and the InCites JCR 5-Year Impact Factor is 0.961.

2021-Jun-06
SCOPUS published the CiteScore for 2020, computed by using an improved methodology, counting the citations received in 2017-2020 and dividing the sum by the number of papers published in the same time frame. The CiteScore of Advances in Electrical and Computer Engineering in 2020 is 2.5, better than all our previous results.

2021-Apr-15
Release of the v3 version of AECE Journal website. We moved to a new server and implemented the latest cryptographic protocols to assure better compatibility with the most recent browsers. Our website accepts now only TLS 1.2 and TLS 1.3 secure connections.

2020-Jun-29
Clarivate Analytics published the InCites Journal Citations Report for 2019. The InCites JCR Impact Factor of Advances in Electrical and Computer Engineering is 1.102 (1.023 without Journal self-cites), and the InCites JCR 5-Year Impact Factor is 0.734.

2020-Jun-11
Starting on the 15th of June 2020 we wiil introduce a new policy for reviewers. Reviewers who provide timely and substantial comments will receive a discount voucher entitling them to an APC reduction. Vouchers (worth of 25 EUR or 50 EUR, depending on the review quality) will be assigned to reviewers after the final decision of the reviewed paper is given. Vouchers issued to specific individuals are not transferable.

Read More »


    
 

  3/2021 - 3

An Efficient Biocrypto-system Using Least Square Polynomial Curve Fitting with Interpolation Based New Chaff-Points Generation Method

TANTUBAY, N. See more information about TANTUBAY, N. on SCOPUS See more information about TANTUBAY, N. on IEEExplore See more information about TANTUBAY, N. on Web of Science, BHARTI, J. See more information about BHARTI, J. on SCOPUS See more information about BHARTI, J. on SCOPUS See more information about BHARTI, J. on Web of Science
 
View the paper record and citations in View the paper record and citations in Google Scholar
Click to see author's profile in See more information about the author on SCOPUS SCOPUS, See more information about the author on IEEE Xplore IEEE Xplore, See more information about the author on Web of Science Web of Science

Download PDF pdficon (1,792 KB) | Citation | Downloads: 152 | Views: 116

Author keywords
cryptography, curve fitting, information security, interpolation, least squares

References keywords
vault(12), fuzzy(12), biometric(12), fingerprint(7), scheme(6), chaff(6), security(5), generation(5), system(4), sciences(4)
Blue keywords are present in both the references section and the paper title.

About this article
Date of Publication: 2021-08-31
Volume 21, Issue 3, Year 2021, On page(s): 21 - 30
ISSN: 1582-7445, e-ISSN: 1844-7600
Digital Object Identifier: 10.4316/AECE.2021.03003
Web of Science Accession Number: 000691632000003

Abstract
Quick view
Full text preview
Large cryptographic-key ensures high security and robustness of asymmetric and symmetric cryptography. The conventional Fuzzy Vault Scheme (FVS) biocrypto-system is employed to shield private or secret-key using biometric features. The strength of FVS consists in its polynomial degree and chaff-points. In FVS, the system's performance is degraded with increment in the polynomial degree to make system robust against attacks. Similarly, valid chaff-point generation is also a crucial task that needs to be considered in the conventional FVS. Therefore, an efficient and more secure Modified FVS (MFVS) using Least Square Polynomial Curve Fitting (LSPC) is proposed in this paper to enhance the security of conventional FVS. Moreover, Newtons Divided Difference Interpolation (NDDI) based new chaff-points generation method is also proposed to minimize the number of required candidate points. The proposed system demonstrations average accuracy as 100%, Genuine Acceptance Rate (GAR) as 99%, False Rejection Rate (FRR) as 1%, and False Acceptance Rate (FAR) as 0%. Security of MFVS is analyzed against brute-force attack, it evident that 10-Million more combinations are required to break the generated Fuzzy Vault as compared to prior research. Consequently, proposed chaff-point generation reduces required candidate points by 13-times than existing methods


References | Cited By  «-- Click to see who has cited this paper

[1] D. Sadhya, S. K. Singh, and B. Chakraborty, "Review of key-binding-based biometric data protection schemes," IET biom., vol. 5, no. 4, pp. 263-275, Dec. 2016,
[CrossRef] [Web of Science Times Cited 10] [SCOPUS Times Cited 12]


[2] Z. Jin, A. B. J. Teoh, B.-M. Goi, and Y.-H. Tay, "Biometric cryptosystems: A new biometric key binding and its implementation for fingerprint minutiae-based representation," Pattern Recognition, vol. 56, pp. 50-62, Aug. 2016,
[CrossRef] [Web of Science Times Cited 50] [SCOPUS Times Cited 59]


[3] Y.-L. Lai, J. Y. Hwang, Z. Jin, S. Kim, S. Cho, and A. B. J. Teoh, "Symmetric keyring encryption scheme for biometric cryptosystem," Information Sciences, vol. 502, pp. 492-509, Oct. 2019,
[CrossRef] [Web of Science Times Cited 2] [SCOPUS Times Cited 5]


[4] N. Tantubay and J. Bharti , "Multimodal Key-Binding Biocrypto-System Using Leastsquare Polynomial Curvefitting Based New Featurelevel Fusion Method," INDJCSE, vol. 12, no. 1, pp. 10-20, Feb. 2021,
[CrossRef] [SCOPUS Times Cited 1]


[5] A. Juels and M. Sudan, "A Fuzzy Vault Scheme," Des Codes Crypt, vol. 38, no. 2, pp. 237-257, Feb. 2006,
[CrossRef] [Web of Science Times Cited 350] [SCOPUS Times Cited 464]


[6] B. Tams, P. Mihailescu, and A. Munk, "Security Considerations in Minutiae-Based Fuzzy Vaults," IEEE Trans.Inform.Forensic Secur., vol. 10, no. 5, pp. 985-998, May 2015,
[CrossRef] [Web of Science Times Cited 40] [SCOPUS Times Cited 51]


[7] V. Alarcon-Aquino, J. Ramirez-Cortes, O. Starostenko, H. Garcia-Baleon, and P. Gomez-Gil, "Biometric Cryptosystem based on Keystroke Dynamics and K-medoids," IETE J Res, vol. 57, no. 4, p. 385, 2011,
[CrossRef] [Web of Science Times Cited 2] [SCOPUS Times Cited 3]


[8] D. Chang, S. Garg, M. Ghosh, and M. Hasan, "BIOFUSE: A framework for multi-biometric fusion on biocryptosystem level," Information Sciences, vol. 546, pp. 481-511, Feb. 2021,
[CrossRef] [Web of Science Times Cited 3] [SCOPUS Times Cited 4]


[9] F. Benhammadi and K. Beghdad Bey, "Password hardened fuzzy vault for fingerprint authentication system," Image and Vision Computing, vol. 32, no. 8, pp. 487-496, Aug. 2014,
[CrossRef] [Web of Science Times Cited 23] [SCOPUS Times Cited 27]


[10] T. K. Dang, Q. C. Truong, T. T. B. Le, and H. Truong, "Cancellable fuzzy vault with periodic transformation for biometric template protection," IET biom., vol. 5, no. 3, pp. 229-235, Sep. 2016,
[CrossRef] [Web of Science Times Cited 17] [SCOPUS Times Cited 22]


[11] T. C. Clancy, N. Kiyavash, and D. J. Lin, "Secure smartcardbased fingerprint authentication," in Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications - WBMA '03, Berkley, California, 2003, p. 45.
[CrossRef] [SCOPUS Times Cited 389]


[12] M. Khalil-Hani and R. Bakhteri, "Securing cryptographic key with fuzzy vault based on a new chaff generation method," in 2010 International Conference on High Performance Computing & Simulation, Caen, France, Jun. 2010, pp. 259-265.
[CrossRef] [SCOPUS Times Cited 20]


[13] M. Khalil-Hani, M. N. Marsono, and R. Bakhteri, "Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm," Future Generation Computer Systems, vol. 29, no. 3, pp. 800-810, Mar. 2013,
[CrossRef] [Web of Science Times Cited 23] [SCOPUS Times Cited 32]


[14] G. Amirthalingam and G. Radhamani, "New chaff point based fuzzy vault for multimodal biometric cryptosystem using particle swarm optimization," Journal of King Saud University - Computer and Information Sciences, vol. 28, no. 4, pp. 381-394, Oct. 2016,
[CrossRef] [Web of Science Times Cited 14] [SCOPUS Times Cited 20]


[15] G. S. Eskander, R. Sabourin, and E. Granger, "A bio-cryptographic system based on offline signature images," Information Sciences, vol. 259, pp. 170-191, Feb. 2014,
[CrossRef] [Web of Science Times Cited 22] [SCOPUS Times Cited 25]


[16] S. S. Ali, I. I. Ganapathi, S. Prakash, P. Consul, and S. Mahyo, "Securing biometric user template using modified minutiae attributes," Pattern Recognition Letters, vol. 129, pp. 263-270, Jan. 2020,
[CrossRef] [Web of Science Times Cited 9] [SCOPUS Times Cited 11]


[17] C. Rathgeb and A. Uhl, "A survey on biometric cryptosystems and cancelable biometrics," EURASIP J. on Info. Security, vol. 2011, no. 1, p. 3, Dec. 2011,
[CrossRef] [SCOPUS Times Cited 407]


[18] A. I. Arrahmah, Y. S. Gondokaryono, and K.-H. Rhee, "Fast non-random chaff point generator for fuzzy vault biometric cryptosystems," in 2016 6th International Conference on System Engineering and Technology (ICSET), Bandung, Indonesia, Oct. 2016, pp. 199-204.
[CrossRef]


[19] L. You, L. Yang, W. Yu, and Z. Wu, "A Cancelable Fuzzy Vault Algorithm Based on Transformed Fingerprint Features," Chin. j. electron, vol. 26, no. 2, pp. 236-243, Mar. 2017,
[CrossRef] [Web of Science Times Cited 7] [SCOPUS Times Cited 11]


[20] A. Kharab and R. Guenther, "The Method of Least-Squares," in An Introduction to Numerical Methods: A MATLAB® Approach, Fourth Edition, Boca Raton, Florida : CRC Press, [2018] CRC Press, 2018, pp. 209-234.
[CrossRef]


[21] A. K. Jaiswal and A. Khandelwal, "Curve fitting," in A textbook of computer based numerical and statistical techniques, New Delhi: New Age International Pvt. Ltd., 2009, pp. 387-424.

[22] A. P. de Camargo, "On the numerical stability of Newton's formula for Lagrange interpolation," Journal of Computational and Applied Mathematics, vol. 365, p. 112369, Feb. 2020,
[CrossRef] [Web of Science Times Cited 2] [SCOPUS Times Cited 4]


[23] R. Douaifia, S. Bendoukha, and S. Abdelmalek, "A Newton interpolation based predictor-corrector numerical method for fractional differential equations with an activator-inhibitor case study," Mathematics and Computers in Simulation, vol. 187, pp. 391-413, Sep. 2021,
[CrossRef] [Web of Science Times Cited 2] [SCOPUS Times Cited 2]


[24] L. Gupta, L. Barash, and I. Hen, "Calculating the divided differences of the exponential function by addition and removal of inputs," Computer Physics Communications, vol. 254, p. 107385, Sep. 2020,
[CrossRef] [Web of Science Times Cited 5] [SCOPUS Times Cited 4]


[25] J. Abraham, P. Kwan, and J. Gao, "Fingerprint Matching using A Hybrid Shape and Orientation Descriptor," in State of the art in Biometrics, J. Yang, Ed. InTech, 2011.
[CrossRef]


[26] T. H. Nguyen, Y. Wang, Y. Ha, and R. Li, "Performance and security-enhanced fuzzy vault scheme based on ridge features for distorted fingerprints," IET biom., vol. 4, no. 1, pp. 29-39, Mar. 2015,
[CrossRef] [Web of Science Times Cited 17] [SCOPUS Times Cited 19]


[27] T. K. Dang, M. T. Nguyen, and Q. H. Truong, "Chaff point generation mechanism for improving fuzzy vault security," IET Biometrics, vol. 5, no. 2, pp. 147-153, Jun. 2016,
[CrossRef] [Web of Science Times Cited 3] [SCOPUS Times Cited 6]


[28] D. Chitra and V. Sujitha, "Security analysis of prealigned fingerprint template using fuzzy vault scheme," Cluster Comput, vol. 22, no. S5, pp. 12817-12825, Sep. 2019,
[CrossRef] [Web of Science Times Cited 2] [SCOPUS Times Cited 4]


[29] H. Choi, Y. Chung, W. Choi, S. Lee, H. Cho, and S. Pan, "Smartcard-based Secret Distribution for Secure Fingerprint Verification," IETE J Res, vol. 57, no. 4, p. 299, 2011,
[CrossRef] [Web of Science Times Cited 2] [SCOPUS Times Cited 2]


[30] T. H. Nguyen, Y. Wang, Y. Ha, and R. Li, "Improved chaff point generation for vault scheme in bio-cryptosystems," IET biom., vol. 2, no. 2, pp. 48-55, Jun. 2013,
[CrossRef] [Web of Science Times Cited 17] [SCOPUS Times Cited 19]




References Weight

Web of Science® Citations for all references: 622 TCR
SCOPUS® Citations for all references: 1,623 TCR

Web of Science® Average Citations per reference: 20 ACR
SCOPUS® Average Citations per reference: 52 ACR

TCR = Total Citations for References / ACR = Average Citations per Reference

We introduced in 2010 - for the first time in scientific publishing, the term "References Weight", as a quantitative indication of the quality ... Read more

Citations for references updated on 2021-10-17 02:47 in 175 seconds.




Note1: Web of Science® is a registered trademark of Clarivate Analytics.
Note2: SCOPUS® is a registered trademark of Elsevier B.V.
Disclaimer: All queries to the respective databases were made by using the DOI record of every reference (where available). Due to technical problems beyond our control, the information is not always accurate. Please use the CrossRef link to visit the respective publisher site.

Copyright ©2001-2021
Faculty of Electrical Engineering and Computer Science
Stefan cel Mare University of Suceava, Romania


All rights reserved: Advances in Electrical and Computer Engineering is a registered trademark of the Stefan cel Mare University of Suceava. No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from the Editor. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Faculty of Electrical Engineering and Computer Science, Stefan cel Mare University of Suceava, Romania, if and only if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.

Permission for other use: The copyright owner's consent does not extend to copying for general distribution, for promotion, for creating new works, or for resale. Specific written permission must be obtained from the Editor for such copying. Direct linking to files hosted on this website is strictly prohibited.

Disclaimer: Whilst every effort is made by the publishers and editorial board to see that no inaccurate or misleading data, opinions or statements appear in this journal, they wish to make it clear that all information and opinions formulated in the articles, as well as linguistic accuracy, are the sole responsibility of the author.




Website loading speed and performance optimization powered by: