Subhas Barman
Jalpaiguri Government Engineering College
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Subhas Barman.
international conference on information technology | 2014
Subhas Barman; Samiran Chattopadhyay; Debasis Samanta; Sujoy Bag; Goutam Show
Fingerprint matching is the main module of fingerprint-based person authentication system. Accuracy of fingerprint matching is an important objective of this type authentication system. Multiple features are used for better matching accuracy but more features add more computational complexity as well as time and space complexity. In this paper, we proposed an approach of fingerprint based authentication system where fingerprint matching is carried out using spacial information (distance) of minutiae points only. This approach is simple and it needs very small space to store templates. We have used an indexing technique to speed up the matching process. In our experiment, we have used FVC2004 fingerprint data-set as input data and investigated the false non-match ratio and false matching ratio for DB2, DB3 and DB4 also.
Multimedia Tools and Applications | 2017
Gaurang Panchal; Debasis Samanta; Subhas Barman
The traditional digital data security mechanisms follow either cryptography or authentication. The primary point of contention with these mechanisms remains either memorizing or securely storing the user’s credentials. The proposed work addresses this critical issue by presenting a fingerprint biometric-based mechanism to protect users’ digitized documents. In our approach, biometric features are extracted from the user’s fingerprint captured with a fingerprint biometric sensor. The extracted features are then used to generate a unique code utilizing the convolution coding principle. This unique code is further used to generate a cryptographic key for encryption and decryption of the user’s document. A sedulous investigation to our approach which includes experimentation with a variety of standard fingerprint images as the database starkly reveals a staggering 95.12 % true positive and 0 % as false negative. Further, the advantages of our approach are that it generates a unique key for each user and eliminates the storage of any biometric template or key. In addition, it is faster and accurate enough to develop any robust data storage security system.
ieee international conference on high performance computing data and analytics | 2014
Subhas Barman; Samiran Chattopadhyay; Debasis Samanta
Key management is an important issue in traditional symmetric cryptography. It consists of key generation, key modification and key sharing to establish a message communication between partners. In general, a randomly generated key is shared with the counter partner by transmitting it along with the message or prior to the message communication. Maintaining privacy of cryptographic key determines the security of cryptography. Biometric is the alternate to maintain the privacy of key by protecting it with users biometric from unauthorized access. In this paper, a cryptographic key is linked with users fingerprint data. A string of binary number as cryptographic key is extracted from fingerprint template and this key is used to encrypt a message. During decryption process, the user is able to generate that cryptographic key from a fresh fingerprint instance to decrypt the encrypted message.
international symposium on security in computing and communication | 2014
Subhas Barman; Samiran Chattopadhyay; Debasis Samanta
Cryptography is the most reliable tool in network and information security. The security of cryptography depends on the cryptographic key management. It consists of key generation, key storing and key sharing. A randomly generated long key (of 128, 190 or 256 bits) is difficult to remember. As a consequence, it is needed to be stored in a secured place. An additional authentication like knowledge or token based authentication is used to control the unauthorized access to the key. It is found that password is easy to break and token can be damaged or stolen. Moreover, knowledge or token based authentication does not assures the non-repudiation of a user. As an alternate, it is advocated to combine biometric with cryptography, known as crypto-biometric system (CBS), to address the above mentioned limitations of traditional cryptography as well as enhance the network security. This paper introduces a CBS to exchange a randomly generated cryptographic key with user’s fingerprint data. Cryptographic key is hidden within fingerprint data using fuzzy commitment scheme and it is extracted from the cryptographic construction with the production of genuine fingerprint data of that user. Our work also protects the privacy and security of fingerprint identity of the user using revocable fingerprint template.
Computers & Electrical Engineering | 2017
Subhas Barman; Samiran Chattopadhyay; Debasis Samanta; Gaurang Panchal
Abstract Recently, biometric data have been integrated with cryptography to make stronger cryptographic systems called crypto-biometric systems (CBSs). In a CBS, cryptographic keys are linked with users’ biometric data so that a large cryptographic key need not be memorized. In this paper, we introduce a key-exchange protocol using the biometric data of the sender and receiver. Users enroll their biometric data in a central server, and a communication session between enrolled users is established through the central server. A user generates a cryptographic key randomly and shares it with another user using a biometrics-based cryptographic construction. The cryptographic framework is constructed using the biometric data of two communicating users so that they may share a session key. In our protocol, the privacy of the biometric data is preserved for both the sender and the receiver.
International Journal of Biometrics | 2015
Subhas Barman; Debasis Samanta; Samiran Chattopadhyay
In crypto-biometric system CBS, biometric is combined with cryptography. In CBS, either accessing a cryptographic key is controlled with biometric or the key is generated from biometric features. This work is related to the latter approach in CBS. In such a system, protecting the privacy of the biometric data is an important concern. Further, there is a need to generate different cryptographic keys from the same biometric template of a user. Cancellable transformation of biometric data prior to the key generation is known as a solution. In this paper, we propose an approach to generate cryptographic key from cancellable fingerprint templates C
advances in computing and communications | 2014
Subhas Barman; Samiran Chattopadhyay; Debasis Samanta
In information and communication technology, security of information is provided with cryptography. In cryptography, key management is an important part of the whole system as the security lies on secrecy of cryptographic key. Symmetric cryptography uses same key (secret key) for message encryption as well as cipher text decryption. Distribution of the secret key is the main challenge in symmetric cryptography. In symmetric cryptography, key distribution center (KDC) takes the responsibility to distribute the secret key between the communicating parties to establish a secure communication among them. In the traditional KDC, a unique key is used between communicating parties for the purpose of distributing session keys. In this respect, our proposed approach uses fingerprint biometrics of communicating parties for the purpose of unique key generation and distribute session key with the fingerprint based key of user. As the key is generated from fingerprint of user, there is no scope of attacks to break the unique key. In this way, the unique key is associated with biometric data of communicating party and the key is not need to remember by that party. This approach converts the knowledge based authentication to biometric based authentication of KDC. At the same time, our approach protects the privacy of fingerprint identity as the identity of user is not disclosed even when the KDC is compromised.
international conference on computer communication control and information technology | 2015
Subhas Barman; Debasis Samanta; Samiran Chattopadhyay
Crypto-biometric system (CBS) is a combination of biometrie with cryptography to enhance network security. Biometrie is the most trustworthy measure to identify a person uniquely using his or her behavioral and physiological characteristics. Cryptography is an effective concern to the security of information. The security of cryptography depends on the strength of cryptographic key and strength of key depends on the length of key. In the traditional cryptography, key is generated randomly and it is very difficult to remember as the key is not linked with user. To address this limitation of cryptography, CBS uses biometrie data of user to bind key with its owner and as the key is linked with users biometrie data, user does not need to remember the key. As biometrie data is irrevocable, it becomes useless when compromised and as a result the biometrie based key becomes also useless. In this approach, fingerprint features are used to generate key for cryptographic application. The key is revocable and easy to revoke when required. In our experiment, FVC2004 fingerprint database is used to investigate the result.
computational intelligence | 2017
Somnath Rakshit; Suvojit Manna; Sanket Biswas; Riyanka Kundu; Priti Gupta; Sayantan Maitra; Subhas Barman
Diabetes is one of the most frightful diseases that is creating a terror in peoples mind all over the globe and all of them are putting tremendous efforts to search for various methods to prevent this disease at the budding stage by predicting the symptoms of diabetes. In this paper, our main aim is to predict the onset of diabetes amongst women aged at least 21 years using Two-class Neural Network and tabulate and compare our results with others results. This approach has been tested with the Pima Indians Diabetes Data Set downloaded from the UCI Machine Learning data repository. The performance of our predictive model has been measured and compared in terms of accuracy and recall. Endocrinologists, dietitians, ophthalmologists and podiatrists can use this model to predict how likely a patient is to suffer from diabetes.
Eurasip Journal on Information Security | 2015
Subhas Barman; Debasis Samanta; Samiran Chattopadhyay