Wahiba Ben Abdessalem Karaa

Work place: Computer Science and Engineering Department, High Institute of Management, 41, Rue de la Liberté, Cité Bouchoucha 2000 Le Bardo, Tunis, TUNISIA

E-mail: wahiba.abdessalem@isg.rnu.tn


Research Interests: Applied computer science, Computational Science and Engineering, Computer systems and computational processes, Computer Architecture and Organization, Theoretical Computer Science


Wahiba Ben Abdessalem Karâa, completed her PhD in Computer Science, University of Paris, VII Jussieu. FRANCE. Currently she is an assistant professor at the High Institute of Management of Tunis. Dept. of Computer Science Applied to management. Tunisia. She has more than 50 research papers in various reputed journals and conferences.

Author Articles
Cellular Automata based Encrypted ECG-hash Code Generation: An Application in Inter-human Biometric Authentication System

By Subrata Nandi Satyabrata Roy Jayanti Dansana Wahiba Ben Abdessalem Karaa Ruben Ray Shatadru Roy Chowdhury Sayan Chakraborty Nilanjan Dey

DOI: https://doi.org/10.5815/ijcnis.2014.11.01, Pub. Date: 8 Oct. 2014

In this modern era, biometrics incorporate various mechanisms to recognize inimitable features of human beings by utilizing their biological and evident features. This paper proposes a novel technique for constructing a resilient and secure biometric recognition system. In this paper, an ECG-hash code of two distinct individuals has been formed by taking dot product of electrocardiogram (ECG) feature matrices of two persons located at two different sites at respective databases. The validity of the system increases as samples from both persons, between whom the transmission takes place, are essential. Besides, electrocardiogram is such a unique feature of an individual that could not be compromised at any circumstance as contradictory to other features like fingerprints, face recognition etc. Moreover, the ECG-hash code is encrypted using rule vector of cellular automata that gives better security in terms of randomness of generated cipher text.

[...] Read more.
Other Articles