Click to open the HelpDesk interface
AECE - Front page banner

Menu:


FACTS & FIGURES

JCR Impact Factor: 0.800
JCR 5-Year IF: 1.000
SCOPUS CiteScore: 2.0
Issues per year: 4
Current issue: Feb 2024
Next issue: May 2024
Avg review time: 78 days
Avg accept to publ: 48 days
APC: 300 EUR


PUBLISHER

Stefan cel Mare
University of Suceava
Faculty of Electrical Engineering and
Computer Science
13, Universitatii Street
Suceava - 720229
ROMANIA

Print ISSN: 1582-7445
Online ISSN: 1844-7600
WorldCat: 643243560
doi: 10.4316/AECE


TRAFFIC STATS

2,500,313 unique visits
994,751 downloads
Since November 1, 2009



Robots online now
Applebot
bingbot


SCOPUS CiteScore

SCOPUS CiteScore


SJR SCImago RANK

SCImago Journal & Country Rank




TEXT LINKS

Anycast DNS Hosting
MOST RECENT ISSUES

 Volume 24 (2024)
 
     »   Issue 1 / 2024
 
 
 Volume 23 (2023)
 
     »   Issue 4 / 2023
 
     »   Issue 3 / 2023
 
     »   Issue 2 / 2023
 
     »   Issue 1 / 2023
 
 
 Volume 22 (2022)
 
     »   Issue 4 / 2022
 
     »   Issue 3 / 2022
 
     »   Issue 2 / 2022
 
     »   Issue 1 / 2022
 
 
 Volume 21 (2021)
 
     »   Issue 4 / 2021
 
     »   Issue 3 / 2021
 
     »   Issue 2 / 2021
 
     »   Issue 1 / 2021
 
 
  View all issues  


FEATURED ARTICLE

Application of the Voltage Control Technique and MPPT of Stand-alone PV System with Storage, HIVZIEFENDIC, J., VUIC, L., LALE, S., SARIC, M.
Issue 1/2022

AbstractPlus


SAMPLE ARTICLES

Novel Power Smoothing Technique for a Hybrid AC-DC Microgrid Operating with Multiple Alternative Energy Sources, NEMPU, P. B., SABHAHIT, J. N., GAONKAR, D. N., RAO, V. S.
Issue 2/2021

AbstractPlus

Continuous Student Knowledge Tracing Using SVD and Concept Maps, TEODORESCU, O. M., POPESCU, P. S., MOCANU, L. M., MIHAESCU, M. C.
Issue 1/2021

AbstractPlus

Simple Framework for Efficient Development of the Functional Requirement Verification-specific Language, POPIC, S., TESLIC, N., BJELICA, M. Z.
Issue 3/2021

AbstractPlus

Day-Ahead Scheduling, Simulation, and Real-Time Control of an Islanded Microgrid, IGNAT-BALACI, A., SZILAGYI, E., PETREUS, D.
Issue 4/2021

AbstractPlus

Adaptive Interval Type-2 Fuzzy Controller Based Direct Torque Control of Permanent Magnet Synchronous Motor, HENINI, N., TLEMCANI, A., BARKAT, S.
Issue 2/2021

AbstractPlus

Continuous Student Knowledge Tracing Using SVD and Concept Maps, TEODORESCU, O. M., POPESCU, P. S., MOCANU, L. M., MIHAESCU, M. C.
Issue 1/2021

AbstractPlus




LATEST NEWS

2023-Jun-28
Clarivate Analytics published the InCites Journal Citations Report for 2022. The InCites JCR Impact Factor of Advances in Electrical and Computer Engineering is 0.800 (0.700 without Journal self-cites), and the InCites JCR 5-Year Impact Factor is 1.000.

2023-Jun-05
SCOPUS published the CiteScore for 2022, computed by using an improved methodology, counting the citations received in 2019-2022 and dividing the sum by the number of papers published in the same time frame. The CiteScore of Advances in Electrical and Computer Engineering for 2022 is 2.0. For "General Computer Science" we rank #134/233 and for "Electrical and Electronic Engineering" we rank #478/738.

2022-Jun-28
Clarivate Analytics published the InCites Journal Citations Report for 2021. The InCites JCR Impact Factor of Advances in Electrical and Computer Engineering is 0.825 (0.722 without Journal self-cites), and the InCites JCR 5-Year Impact Factor is 0.752.

2022-Jun-16
SCOPUS published the CiteScore for 2021, computed by using an improved methodology, counting the citations received in 2018-2021 and dividing the sum by the number of papers published in the same time frame. The CiteScore of Advances in Electrical and Computer Engineering for 2021 is 2.5, the same as for 2020 but better than all our previous results.

2021-Jun-30
Clarivate Analytics published the InCites Journal Citations Report for 2020. The InCites JCR Impact Factor of Advances in Electrical and Computer Engineering is 1.221 (1.053 without Journal self-cites), and the InCites JCR 5-Year Impact Factor is 0.961.

Read More »


    
 

  3/2021 - 3

An Efficient Biocrypto-system Using Least Square Polynomial Curve Fitting with Interpolation Based New Chaff-Points Generation Method

TANTUBAY, N. See more information about TANTUBAY, N. on SCOPUS See more information about TANTUBAY, N. on IEEExplore See more information about TANTUBAY, N. on Web of Science, BHARTI, J. See more information about BHARTI, J. on SCOPUS See more information about BHARTI, J. on SCOPUS See more information about BHARTI, J. on Web of Science
 
View the paper record and citations in View the paper record and citations in Google Scholar
Click to see author's profile in See more information about the author on SCOPUS SCOPUS, See more information about the author on IEEE Xplore IEEE Xplore, See more information about the author on Web of Science Web of Science

Download PDF pdficon (1,792 KB) | Citation | Downloads: 815 | Views: 1,064

Author keywords
cryptography, curve fitting, information security, interpolation, least squares

References keywords
vault(12), fuzzy(12), biometric(12), fingerprint(7), scheme(6), chaff(6), security(5), generation(5), system(4), sciences(4)
Blue keywords are present in both the references section and the paper title.

About this article
Date of Publication: 2021-08-31
Volume 21, Issue 3, Year 2021, On page(s): 21 - 30
ISSN: 1582-7445, e-ISSN: 1844-7600
Digital Object Identifier: 10.4316/AECE.2021.03003
Web of Science Accession Number: 000691632000003
SCOPUS ID: 85114832016

Abstract
Quick view
Full text preview
Large cryptographic-key ensures high security and robustness of asymmetric and symmetric cryptography. The conventional Fuzzy Vault Scheme (FVS) biocrypto-system is employed to shield private or secret-key using biometric features. The strength of FVS consists in its polynomial degree and chaff-points. In FVS, the system's performance is degraded with increment in the polynomial degree to make system robust against attacks. Similarly, valid chaff-point generation is also a crucial task that needs to be considered in the conventional FVS. Therefore, an efficient and more secure Modified FVS (MFVS) using Least Square Polynomial Curve Fitting (LSPC) is proposed in this paper to enhance the security of conventional FVS. Moreover, Newtons Divided Difference Interpolation (NDDI) based new chaff-points generation method is also proposed to minimize the number of required candidate points. The proposed system demonstrations average accuracy as 100%, Genuine Acceptance Rate (GAR) as 99%, False Rejection Rate (FRR) as 1%, and False Acceptance Rate (FAR) as 0%. Security of MFVS is analyzed against brute-force attack, it evident that 10-Million more combinations are required to break the generated Fuzzy Vault as compared to prior research. Consequently, proposed chaff-point generation reduces required candidate points by 13-times than existing methods


References | Cited By  «-- Click to see who has cited this paper

[1] D. Sadhya, S. K. Singh, and B. Chakraborty, "Review of key-binding-based biometric data protection schemes," IET biom., vol. 5, no. 4, pp. 263-275, Dec. 2016,
[CrossRef] [Web of Science Times Cited 14] [SCOPUS Times Cited 17]


[2] Z. Jin, A. B. J. Teoh, B.-M. Goi, and Y.-H. Tay, "Biometric cryptosystems: A new biometric key binding and its implementation for fingerprint minutiae-based representation," Pattern Recognition, vol. 56, pp. 50-62, Aug. 2016,
[CrossRef] [Web of Science Times Cited 64] [SCOPUS Times Cited 81]


[3] Y.-L. Lai, J. Y. Hwang, Z. Jin, S. Kim, S. Cho, and A. B. J. Teoh, "Symmetric keyring encryption scheme for biometric cryptosystem," Information Sciences, vol. 502, pp. 492-509, Oct. 2019,
[CrossRef] [Web of Science Times Cited 13] [SCOPUS Times Cited 18]


[4] N. Tantubay and J. Bharti , "Multimodal Key-Binding Biocrypto-System Using Leastsquare Polynomial Curvefitting Based New Featurelevel Fusion Method," INDJCSE, vol. 12, no. 1, pp. 10-20, Feb. 2021,
[CrossRef] [SCOPUS Times Cited 1]


[5] A. Juels and M. Sudan, "A Fuzzy Vault Scheme," Des Codes Crypt, vol. 38, no. 2, pp. 237-257, Feb. 2006,
[CrossRef] [Web of Science Times Cited 425] [SCOPUS Times Cited 554]


[6] B. Tams, P. Mihailescu, and A. Munk, "Security Considerations in Minutiae-Based Fuzzy Vaults," IEEE Trans.Inform.Forensic Secur., vol. 10, no. 5, pp. 985-998, May 2015,
[CrossRef] [Web of Science Times Cited 56] [SCOPUS Times Cited 71]


[7] V. Alarcon-Aquino, J. Ramirez-Cortes, O. Starostenko, H. Garcia-Baleon, and P. Gomez-Gil, "Biometric Cryptosystem based on Keystroke Dynamics and K-medoids," IETE J Res, vol. 57, no. 4, p. 385, 2011,
[CrossRef] [Web of Science Times Cited 2] [SCOPUS Times Cited 3]


[8] D. Chang, S. Garg, M. Ghosh, and M. Hasan, "BIOFUSE: A framework for multi-biometric fusion on biocryptosystem level," Information Sciences, vol. 546, pp. 481-511, Feb. 2021,
[CrossRef] [Web of Science Times Cited 15] [SCOPUS Times Cited 20]


[9] F. Benhammadi and K. Beghdad Bey, "Password hardened fuzzy vault for fingerprint authentication system," Image and Vision Computing, vol. 32, no. 8, pp. 487-496, Aug. 2014,
[CrossRef] [Web of Science Times Cited 24] [SCOPUS Times Cited 28]


[10] T. K. Dang, Q. C. Truong, T. T. B. Le, and H. Truong, "Cancellable fuzzy vault with periodic transformation for biometric template protection," IET biom., vol. 5, no. 3, pp. 229-235, Sep. 2016,
[CrossRef] [Web of Science Times Cited 31] [SCOPUS Times Cited 37]


[11] T. C. Clancy, N. Kiyavash, and D. J. Lin, "Secure smartcardbased fingerprint authentication," in Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications - WBMA '03, Berkley, California, 2003, p. 45.
[CrossRef] [SCOPUS Times Cited 418]


[12] M. Khalil-Hani and R. Bakhteri, "Securing cryptographic key with fuzzy vault based on a new chaff generation method," in 2010 International Conference on High Performance Computing & Simulation, Caen, France, Jun. 2010, pp. 259-265.
[CrossRef] [SCOPUS Times Cited 20]


[13] M. Khalil-Hani, M. N. Marsono, and R. Bakhteri, "Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm," Future Generation Computer Systems, vol. 29, no. 3, pp. 800-810, Mar. 2013,
[CrossRef] [Web of Science Times Cited 24] [SCOPUS Times Cited 33]


[14] G. Amirthalingam and G. Radhamani, "New chaff point based fuzzy vault for multimodal biometric cryptosystem using particle swarm optimization," Journal of King Saud University - Computer and Information Sciences, vol. 28, no. 4, pp. 381-394, Oct. 2016,
[CrossRef] [Web of Science Times Cited 16] [SCOPUS Times Cited 21]


[15] G. S. Eskander, R. Sabourin, and E. Granger, "A bio-cryptographic system based on offline signature images," Information Sciences, vol. 259, pp. 170-191, Feb. 2014,
[CrossRef] [Web of Science Times Cited 25] [SCOPUS Times Cited 29]


[16] S. S. Ali, I. I. Ganapathi, S. Prakash, P. Consul, and S. Mahyo, "Securing biometric user template using modified minutiae attributes," Pattern Recognition Letters, vol. 129, pp. 263-270, Jan. 2020,
[CrossRef] [Web of Science Times Cited 21] [SCOPUS Times Cited 24]


[17] C. Rathgeb and A. Uhl, "A survey on biometric cryptosystems and cancelable biometrics," EURASIP J. on Info. Security, vol. 2011, no. 1, p. 3, Dec. 2011,
[CrossRef] [Web of Science Times Cited 416] [SCOPUS Times Cited 513]


[18] A. I. Arrahmah, Y. S. Gondokaryono, and K.-H. Rhee, "Fast non-random chaff point generator for fuzzy vault biometric cryptosystems," in 2016 6th International Conference on System Engineering and Technology (ICSET), Bandung, Indonesia, Oct. 2016, pp. 199-204.
[CrossRef]


[19] L. You, L. Yang, W. Yu, and Z. Wu, "A Cancelable Fuzzy Vault Algorithm Based on Transformed Fingerprint Features," Chin. j. electron, vol. 26, no. 2, pp. 236-243, Mar. 2017,
[CrossRef] [Web of Science Times Cited 10] [SCOPUS Times Cited 14]


[20] A. Kharab and R. Guenther, "The Method of Least-Squares," in An Introduction to Numerical Methods: A MATLAB® Approach, Fourth Edition, Boca Raton, Florida : CRC Press, [2018] CRC Press, 2018, pp. 209-234.
[CrossRef]


[21] A. K. Jaiswal and A. Khandelwal, "Curve fitting," in A textbook of computer based numerical and statistical techniques, New Delhi: New Age International Pvt. Ltd., 2009, pp. 387-424.

[22] A. P. de Camargo, "On the numerical stability of Newton's formula for Lagrange interpolation," Journal of Computational and Applied Mathematics, vol. 365, p. 112369, Feb. 2020,
[CrossRef] [Web of Science Times Cited 9] [SCOPUS Times Cited 12]


[23] R. Douaifia, S. Bendoukha, and S. Abdelmalek, "A Newton interpolation based predictor-corrector numerical method for fractional differential equations with an activator-inhibitor case study," Mathematics and Computers in Simulation, vol. 187, pp. 391-413, Sep. 2021,
[CrossRef] [Web of Science Times Cited 6] [SCOPUS Times Cited 8]


[24] L. Gupta, L. Barash, and I. Hen, "Calculating the divided differences of the exponential function by addition and removal of inputs," Computer Physics Communications, vol. 254, p. 107385, Sep. 2020,
[CrossRef] [Web of Science Times Cited 6] [SCOPUS Times Cited 8]


[25] J. Abraham, P. Kwan, and J. Gao, "Fingerprint Matching using A Hybrid Shape and Orientation Descriptor," in State of the art in Biometrics, J. Yang, Ed. InTech, 2011.
[CrossRef]


[26] T. H. Nguyen, Y. Wang, Y. Ha, and R. Li, "Performance and security-enhanced fuzzy vault scheme based on ridge features for distorted fingerprints," IET biom., vol. 4, no. 1, pp. 29-39, Mar. 2015,
[CrossRef] [Web of Science Times Cited 17] [SCOPUS Times Cited 19]


[27] T. K. Dang, M. T. Nguyen, and Q. H. Truong, "Chaff point generation mechanism for improving fuzzy vault security," IET Biometrics, vol. 5, no. 2, pp. 147-153, Jun. 2016,
[CrossRef] [Web of Science Times Cited 3] [SCOPUS Times Cited 7]


[28] D. Chitra and V. Sujitha, "Security analysis of prealigned fingerprint template using fuzzy vault scheme," Cluster Comput, vol. 22, no. S5, pp. 12817-12825, Sep. 2019,
[CrossRef] [Web of Science Times Cited 3] [SCOPUS Times Cited 6]


[29] H. Choi, Y. Chung, W. Choi, S. Lee, H. Cho, and S. Pan, "Smartcard-based Secret Distribution for Secure Fingerprint Verification," IETE J Res, vol. 57, no. 4, p. 299, 2011,
[CrossRef] [Web of Science Times Cited 2] [SCOPUS Times Cited 2]


[30] T. H. Nguyen, Y. Wang, Y. Ha, and R. Li, "Improved chaff point generation for vault scheme in bio-cryptosystems," IET biom., vol. 2, no. 2, pp. 48-55, Jun. 2013,
[CrossRef] [Web of Science Times Cited 20] [SCOPUS Times Cited 23]




References Weight

Web of Science® Citations for all references: 1,222 TCR
SCOPUS® Citations for all references: 1,987 TCR

Web of Science® Average Citations per reference: 39 ACR
SCOPUS® Average Citations per reference: 64 ACR

TCR = Total Citations for References / ACR = Average Citations per Reference

We introduced in 2010 - for the first time in scientific publishing, the term "References Weight", as a quantitative indication of the quality ... Read more

Citations for references updated on 2024-03-29 07:28 in 191 seconds.




Note1: Web of Science® is a registered trademark of Clarivate Analytics.
Note2: SCOPUS® is a registered trademark of Elsevier B.V.
Disclaimer: All queries to the respective databases were made by using the DOI record of every reference (where available). Due to technical problems beyond our control, the information is not always accurate. Please use the CrossRef link to visit the respective publisher site.

Copyright ©2001-2024
Faculty of Electrical Engineering and Computer Science
Stefan cel Mare University of Suceava, Romania


All rights reserved: Advances in Electrical and Computer Engineering is a registered trademark of the Stefan cel Mare University of Suceava. No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from the Editor. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Faculty of Electrical Engineering and Computer Science, Stefan cel Mare University of Suceava, Romania, if and only if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.

Permission for other use: The copyright owner's consent does not extend to copying for general distribution, for promotion, for creating new works, or for resale. Specific written permission must be obtained from the Editor for such copying. Direct linking to files hosted on this website is strictly prohibited.

Disclaimer: Whilst every effort is made by the publishers and editorial board to see that no inaccurate or misleading data, opinions or statements appear in this journal, they wish to make it clear that all information and opinions formulated in the articles, as well as linguistic accuracy, are the sole responsibility of the author.




Website loading speed and performance optimization powered by: 


DNS Made Easy