Secure VoIP Network by Fusion of Irises
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 127 , Downloads: 109 | CTR: 86 % | Weekly Popularity: ⮙1

Research Paper | Computer Science & Engineering | India | Volume 6 Issue 9, September 2017

Secure VoIP Network by Fusion of Irises

S. Bhuvaneshwari, Dr. P. Arul

In a world that is more digitally connected than ever before faces an inevitable problem of securing our most integrated data and message. Currently, Voice over Internet Protocol (VoIP) becomes one of the most dominant and attracting technologies in the world of telecommunications. The chief problem is to protect our data in a unique way that could only be worked upon by the sender and the recipient. Using biometric we can generate an exclusive key that will be unique for each and every individual. Here we propose to make a mutual contribution of the participants (sender and receiver) to share their biometrics to have very secured VoIP communication. After generating the keys from the irises of the two participants, this will be combined with the pseudo random numbers, to produce a strong encryption keys. And the resulting key can be used for encrypting our message. This method is proposed because even if one the iris biometric is stolen, the attacker cant access the data unless the data encrypted with multimodal biometric key. And for more security Therefore billions of unique keys can be generated, making VoIP technology hard for an attacker to guess the key. This key act as a symmetric key for both encryption and decryption. This proposed system is composed of two modules 1) Feature extraction of Iris 2) Cryptographic key generation. 3) Fusion of iris 4) Fusion of PNRG with Fused iris key.

Keywords: Biometrics, Cryptosystem, Iris Extraction, Minutiae point, Fusion

Edition: Volume 6 Issue 9, September 2017

Pages: 1445 - 1449

Share this Article

How to Cite this Article?

S. Bhuvaneshwari, Dr. P. Arul, "Secure VoIP Network by Fusion of Irises", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20176832, Volume 6 Issue 9, September 2017, 1445 - 1449

127 PDF Views | 109 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Biometrics'

Views: 79 , Downloads: 63 | CTR: 80 % | Weekly Popularity: ⮙8

Research Paper, Computer Science & Engineering, Congo, Volume 10 Issue 3, March 2021

Pages: 61 - 70

Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution

Bopatriciat Boluma Mangata, Eugene Mbuyi Mukendi, Jean-Didier Batubenga

Share this Article

Views: 154 , Downloads: 81 | CTR: 53 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 165 - 167

Statistical Analysis of DCT Coefficients for Ascertaining Ears Biometrics

Nisha, Jatinder Kansal, JPS Raina

Share this Article

Views: 118 , Downloads: 103 | CTR: 87 % | Weekly Popularity: ⮙4

Research Paper, Computer Science & Engineering, Iraq, Volume 5 Issue 11, November 2016

Pages: 1654 - 1660

An Adaptive Use of Deffie Hellman Algorithm by Digital Images for Generating Secure Shared Key

Zainalabideen Abdullsamd Rasheed

Share this Article

Views: 143 , Downloads: 105 | CTR: 73 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1979 - 1982

Palm Vein Authentication: A Review

Gitanjali Sikka, Er. Vikas Wasson

Share this Article

Views: 144 , Downloads: 105 | CTR: 73 % | Weekly Popularity: ⮙5

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 7, July 2017

Pages: 1670 - 1675

Experimental Study of a Person Identification Framework Based on Combining Left and Right Palmprint Images

Mane Bhagyashri, Kalyankar Pravin

Share this Article

Similar Articles with Keyword 'Cryptosystem'

Views: 134 , Downloads: 97 | CTR: 72 % | Weekly Popularity: ⮙6

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Views: 136 , Downloads: 100 | CTR: 74 % | Weekly Popularity: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1232 - 1234

A Review on Data Sharing Across Cloud Storage Using Key Aggregate Cryptosystem

Rashmi Khawale, Omprakash Tembhurne

Share this Article

Views: 130 , Downloads: 102 | CTR: 78 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2223 - 2228

Survey on Wireless Sensor Network for Message Authentication and Source Privacy

Vaishali Kisanrao Gulhane, S. N. Shelke

Share this Article

Views: 141 , Downloads: 103 | CTR: 73 % | Weekly Popularity: ⮙3

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2369 - 2374

Cryptoshare: Cryptosystem for Scalable Data Sharing in Cloud Storage

Ghilby Varghese Jaison

Share this Article

Views: 129 , Downloads: 105 | CTR: 81 % | Weekly Popularity: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1493 - 1496

Achieving Constant-Size Aggregate Key for Efficient and Secured Data Sharing

Sakkubai M Horatti, Gopal B

Share this Article

Similar Articles with Keyword 'Minutiae point'

Views: 138 , Downloads: 104 | CTR: 75 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1216 - 1220

Finger Vein Weightage Calculation of Imaginary Curve between Minutiae Points for Person Recognition

Reetika, Kiran Gupta

Share this Article

Views: 131 , Downloads: 108 | CTR: 82 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 12, December 2016

Pages: 1298 - 1302

A Novel Approach for Palm Print Recognition Using Minutiae Points with BFOA

Ridhima Prothia, Jatinder Kumar

Share this Article

Views: 136 , Downloads: 109 | CTR: 80 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2428 - 2433

Perspective of Fingerprint Recognition Using Robust Local Feature

Pratibha H. Saini, Prof. Rakesh Suryawanshi

Share this Article

Views: 127 , Downloads: 109 | CTR: 86 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 9, September 2017

Pages: 1445 - 1449

Secure VoIP Network by Fusion of Irises

S. Bhuvaneshwari, Dr. P. Arul

Share this Article

Views: 184 , Downloads: 113 | CTR: 61 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 2103 - 2106

Minutiae Based Fingerprint Matching for Identification and Verification

Deepika Sahu, Rashmi Shrivas

Share this Article

Similar Articles with Keyword 'Fusion'

Views: 144 , Downloads: 97 | CTR: 67 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 528 - 532

Knowledge Fusion Technique Using Classifier Ensemble by Combining the Sets of Classification Rules

Jaydeep B. Patil, Vaishali Nandedkar

Share this Article

Views: 129 , Downloads: 100 | CTR: 78 % | Weekly Popularity: ⮙6

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 872 - 877

Ranking and Clustering of Software Cost Estimation Models

Vijaya Wable, S. M. Shinde

Share this Article

Views: 138 , Downloads: 100 | CTR: 72 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1054 - 1058

Colour Extended Visual Cryptography based on MKGED

T. Anuradha, Dr. K. Usha Rani

Share this Article

Views: 134 , Downloads: 101 | CTR: 75 % | Weekly Popularity: ⮙4

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1526 - 1530

A New Meaningful Adaptive Region Incrementing Visual Secret Sharing Based on Error Diffusion and Permutation Encoding with Cheating Prevention

Anju Mohan

Share this Article

Views: 142 , Downloads: 104 | CTR: 73 % | Weekly Popularity: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1879 - 1884

A Defense Security Approach against Hacking Using Trusted Graphs

D. N. Rewadkar, Harshal A. Kute

Share this Article
Top