{"title":"基于人脸标记的蓝牙安全认证配对与密钥生成密码系统","authors":"Asif Ikbal Mondal, B. Mandal, Amitava Choudhury","doi":"10.1109/GCAT52182.2021.9587742","DOIUrl":null,"url":null,"abstract":"In this paper, the whole system starts with a real time picture of the sender and the receiver. The pairing is done utilizing the image of the sender and the receiver at the place of the pin used for pairing. The key generation for the encryption also utilizes the facial characteristics of the parties involved. This method will always generate a key of variable length. As the same person taking the snap of his/her face will change the coordinates every time making it is hard to predict the exact key. The text converted into ciphertext is also padded from both sides with variable bits to make it hard to identify the starting point of the ciphertext to start the actual decryption. The overall aim of this research is to develop a cryptosystem that can be used for achieving good encryption even if the length of the plain text is very small(one or two words). It is an encryption system with associated authentication. An electronic device cannot distinguish between its real users and fake one just by looking at the number which is used for the authentication process but if trained to identify the picture of the used the device up to a certain point is secure. Next thing if someone has requested a pairing merely by looking at the numbers one cannot predict that a legal connection is made but by looking at the real-time image of the person the same can be done with satisfaction. Previously used encryption used key and ciphertext of fixed length but here, a variable ciphertext and key are created in every session of transmission as the image of every sender and the receiver is different.","PeriodicalId":436231,"journal":{"name":"2021 2nd Global Conference for Advancement in Technology (GCAT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Cryptosystem using Facial Landmark for Authentication Pairing and Key Generation in Bluetooth Security\",\"authors\":\"Asif Ikbal Mondal, B. Mandal, Amitava Choudhury\",\"doi\":\"10.1109/GCAT52182.2021.9587742\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, the whole system starts with a real time picture of the sender and the receiver. The pairing is done utilizing the image of the sender and the receiver at the place of the pin used for pairing. The key generation for the encryption also utilizes the facial characteristics of the parties involved. This method will always generate a key of variable length. As the same person taking the snap of his/her face will change the coordinates every time making it is hard to predict the exact key. The text converted into ciphertext is also padded from both sides with variable bits to make it hard to identify the starting point of the ciphertext to start the actual decryption. The overall aim of this research is to develop a cryptosystem that can be used for achieving good encryption even if the length of the plain text is very small(one or two words). It is an encryption system with associated authentication. An electronic device cannot distinguish between its real users and fake one just by looking at the number which is used for the authentication process but if trained to identify the picture of the used the device up to a certain point is secure. Next thing if someone has requested a pairing merely by looking at the numbers one cannot predict that a legal connection is made but by looking at the real-time image of the person the same can be done with satisfaction. Previously used encryption used key and ciphertext of fixed length but here, a variable ciphertext and key are created in every session of transmission as the image of every sender and the receiver is different.\",\"PeriodicalId\":436231,\"journal\":{\"name\":\"2021 2nd Global Conference for Advancement in Technology (GCAT)\",\"volume\":\"2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 2nd Global Conference for Advancement in Technology (GCAT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/GCAT52182.2021.9587742\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 2nd Global Conference for Advancement in Technology (GCAT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GCAT52182.2021.9587742","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cryptosystem using Facial Landmark for Authentication Pairing and Key Generation in Bluetooth Security
In this paper, the whole system starts with a real time picture of the sender and the receiver. The pairing is done utilizing the image of the sender and the receiver at the place of the pin used for pairing. The key generation for the encryption also utilizes the facial characteristics of the parties involved. This method will always generate a key of variable length. As the same person taking the snap of his/her face will change the coordinates every time making it is hard to predict the exact key. The text converted into ciphertext is also padded from both sides with variable bits to make it hard to identify the starting point of the ciphertext to start the actual decryption. The overall aim of this research is to develop a cryptosystem that can be used for achieving good encryption even if the length of the plain text is very small(one or two words). It is an encryption system with associated authentication. An electronic device cannot distinguish between its real users and fake one just by looking at the number which is used for the authentication process but if trained to identify the picture of the used the device up to a certain point is secure. Next thing if someone has requested a pairing merely by looking at the numbers one cannot predict that a legal connection is made but by looking at the real-time image of the person the same can be done with satisfaction. Previously used encryption used key and ciphertext of fixed length but here, a variable ciphertext and key are created in every session of transmission as the image of every sender and the receiver is different.