(IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No.

2, May 2010

A New Biometrics based Key Exchange and Deniable Authentication Protocol
K. Saraswathi
Asst.Proffessor, Department of Computer Science Govt Arts College Udumalpet, Tirupur, India dharundharsan@rediffmail.com

Dr. R. Balasubramanian
Dean Academic Affairs PPG Institute of Technology Coimbatore, India ramamurthybala2@gmail.com authentication system improves the network security. Some of most widely used biometric are hand geometry, face, fingerprint, retina, iris, DNA, signature and voice. Biometrics is the science of measuring and statistically analyzing biological data can be used to recognize different body parts like the eyes, fingerprints, facial characteristics, voice etc. Thus, it takes security to the next level by not just confining it to authenticating passwords, fingerprint matching techniques [2]. Based on the individual's biometric characteristics a biometric system recognizes an individual. The process of a biometric system can be described, in a beginner's manner, by a three-step process. The foremost step in this process is collection of the biometric data which is formally known as user registration. This step uses different sensors, to assist the user in the registration process. The second step converts and describes the observed data using a digital representation called a template. This step varies between modalities and also between vendors. In the third step, the newly acquired template is compared with one or more previously generated templates stored in a database. The result of this comparison is a “match” or a “non-match” and is used for actions such as permitting access, sounding an alarm, etc [15]. Declaring a match or non-match is based on the obtained template being analogous, but not one and the same, to the stored template. A threshold determines the measure of similarity necessary to result in a match declaration. The acceptance or rejection of biometric data is completely dependent on the match score falling above or below the threshold. The threshold is adjustable so that the biometric system can be more or less stringent, depending on the requirements of any given biometric application [15]. Among all the biometric techniques, today fingerprints are the most widely used biometric features for personal identification because of their high acceptability, Immutability and individuality. This paper proposes a technique to secure the network communication using biometric characteristics obtained from the individuals. The biometric characteristic used in this paper is fingerprint. This proposed paper utilizes image processing technique to extract the biometric measurement called minutiae from the user’s fingerprint. The user’s full finger print image is converted and stored as encrypted binary template, which is used for authentication by the server of the network. The user’s biometric verification data are first transformed into a strong secret and is then stored in the
188 http://sites.google.com/site/ijcsis/ ISSN 1947-5500

Abstract-Wireless Local Area Networks (WLANs) are gaining recognition as they are fast, cost effective, supple and easy to use. The networks face a serious of issues and challenges in establishing security to the users of the network. With users accessing networks remotely, transmitting data by means of the Internet and carrying around laptops containing sensitive data, ensuring security is an increasingly multifarious challenge. Therefore it is necessary to make sure the security of the network users. In order to provide network security many techniques and systems have been proposed earlier in literature. Most of these traditional methods make use of password, smart cards and so on to provide security to the network users. Though these traditional methods are effective in ensuring security they posses some limitations too. The problem with these traditional approaches is that there is possibility to forget the password. Moreover, compromised password lead to a fact, that unauthorized user can have access to the accounts of the valid user. This paper proposes an approach for network security using biometrics and deniable authentication protocol. The human biometrics like hand geometry, face, fingerprint, retina, iris, DNA, signature and voice can be effectively used to ensure the network security. The diverse phases included in this proposed approach are user registration, fingerprint enhancement, minutiae point extraction, mapping function and deniable authentication protocol. Furthermore, biometric authentication systems can be more convenient for the users since it involves no password that might be feared to be forgotten by the network users or key to be lost and therefore a single biometric trait (e.g., fingerprint) can be used to access several accounts without the burden of remembering passwords. This proposed paper also explains some of the fingerprint enhancement techniques to make the biometric template noise free. Experiments are conducted to evaluate the performance measure of the proposed approach. Keywords-Biometrics, Cryptography, Data Security, Fingerprint, Mapping Function, Minutiae Point, Network Security, User Registration.

I.

INTRODUCTION

Accurate, automatic identification and authentication of users is an elemental problem in network environments. Shared secrets such as personal identification numbers or passwords and key devices like smart cards are not just enough in some cases. This authentication method has traditionally been based on passwords. The problem with these traditional approaches is that there is possibility to forget the password. Moreover, compromised password lead to a fact, that unauthorized user can have access to the accounts of the valid user. The Biometric based user authentication systems are highly secured and efficient to use and place total trust on the authentication server where biometric verification data are stored in a central database [1]. This biometrics based user

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 2, May 2010

server’s database during registration. The proposed system is evaluated to determine the performance measures. The remainder of this paper is organized as follows. Section 2 discusses some of the related work proposed earlier in association to biometric based network security. Section 3 describes the proposed approach of providing network security using the biometric characteristics obtained fingerprint. Section 4 illustrates the performance measures and Section 5 concludes the paper with directions to future work. II. RELATED WORK

A lot of research has been carried out in the field of establishing network security based on biometric features obtained from individual user [13] [14]. This section of the paper discusses some of the related work proposed earlier in association to biometric based network security. In their work [3] Rahman et al. proposed architecture for secure access of computers inside an organization from a remote location. They used biometrics features and a one-time password mechanism on top of secure socket layer (SSL) for authentication. Moreover they also provided three layers of security levels for network communication, and also a mechanism for secure file accesses based on the security privileges assigned to various users was proposed. The files to be accessed from the server are categorized depending on their access privileges and encrypted using a key assigned to each category. The test results of their approach evaluated the performance of their proposed approach. Chung et al. in [4] described a method for biometric based secret key generation for protection mechanism. The binding of the user's identity and biometric feature data to an entity is provided by an authority through a digitally signed data structure called a biometric certificate. Therefore, the main goal (or contribution) of their work is to propose a simple method for generating biometric digital key with biometric certificate on fuzzy fingerprint vault mechanism. Biometric digital key from biometric data has many applications such as automatic identification, user authentication with message encryption, etc. Therefore, their work analyzed the related existing scheme and proposed a simplified model where a general fuzzy fingerprint vault using biometric certificate with security consideration. Dutta et al. in [5] presented a novel method for providing network security using biometric and cryptography. They proposed a biometrics-based (fingerprint) Encryption/Decryption Scheme, in which unique key is generated using partial portion of combined sender's and receiver's fingerprints. From this unique key a random sequence is generated, which is used as an asymmetric key for both Encryption and Decryption. Above unique Key is send by the sender after watermarking it in sender's fingerprint along with Encrypted Message. The computational requirement and network security features are addressed. Proposed system has a advantage that for public key, it has not to search from a database and security is maintained.
189

Network security issues are projected by Benavente et al. in [6]. The Internet is increasingly becoming a public vehicle for remote operations. Integrating biometric information in the authentication chain explores new problems. Remote virtual identity is starting to play in the way towards an e-Europe, and applications for e-government integrate biometrics. Remote identity of subjects should be unambiguously stated. Several features drive the spread of biometric authentication in network applications, in order to provide end-to-end security across the authentication chain aliveness detection and fakeresistive methods, network protocols, security infrastructure, integration of biometrics and public key infrastructure (PKI), etc. Their paper proposed a mid-layer interoperable architecture furnished with a set of generic interfaces and protocol definitions. Their scheme enables a future introduction of new modules and applications with a minimal development effort. An intelligent fingerprint based security system was designed and developed by Suriza et al. in [7]. Traditionally, user authentication is meant to provide an identification number or a password that is unique and well protected to assure the overall system security. This type of security system is very fragile in an area where a higher level of security system is required. Biometrics-based system offers a new and better approach to user authentication. Biometrics authentication is an automated method whereby an individual identity is confirmed by examining a unique physiological trait or behavioral characteristic, such as fingerprint, iris, or signature, since physiological traits have stable physical characteristics. The design and development of a fingerprintbased security system, comprising the scanner, interface system, Boltzmann machine neural network and access control system is discussed in this paper. The integration between the hardware and the software is completed by using Visual Basic 6 programming language. The results obtained both for the simulation studies and testing of the integrated system with real-life physical system have demonstrated the practicality of such system as well as its potential applications in many fields. Ronald in [8] put forth an alternative approach for password in network security using biometrics. Passwords are the primary means of authenticating network users. However, network administrators are becoming concerned about the limited security provided by password authentication. Many administrators are now concluding that their password-based security systems are not all that secure. User passwords are routinely stolen, forgotten, shared, or intercepted by hackers. Another serious problem is that computer users have become too trusting. They routinely use the same password to enter both secure and insecure Web sites as well as their networks at work. In response to the proven lack of security provided by password authentication, network administrators are replacing network passwords with smartcards, biometric authentication, or a combination of the three. Smart cards are credit card-size devices that generate random numbers about every minute, in sync with counterparts on each entry point in the network. Smart cards work well as long as the card isn't stolen. A better
http://sites.google.com/site/ijcsis/ ISSN 1947-5500

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 2, May 2010

choice to ensure network security is the use of biometrics. Their paper investigated the different biometric techniques available to determine a person's identity. Also described, were the criteria for selecting a biometric security solution. In conclusion, efforts to establish biometric industry standards (including standard application program interfaces (APIs)) were discussed. III. PROPOSED APPROACH

Fingerprint Image Preprocessing Minutiae Feature Extraction

Normalization Orientation Estimation

Biometric cryptosystems [9] join together cryptography and biometrics to promote from the strengths of both fields. In such systems, while cryptography provides high and adjustable security levels, biometrics brings in non-repudiation and eliminates the must to remember passwords or to carry tokens etc. In biometric cryptosystems, a cryptographic key is generated from the biometric template of a user stored in the database in such a way that the key cannot be revealed without a successful biometric authentication. The overall architecture of the biometric system to improve network security is shown in figure 1. The Server maintains a database where the encrypted minutia template of the user’s finger print is stored. In this setting, users communicate with the server for the principle of user authentication, by rendering users fingerprint, which is transformed into a long secret detained by the server in its database [1].

Frequency Estimation

Mapping Function Filtering Thinning Figure 2 Steps involved in Extracting Feature Point User Registration This step is popularly known as Enrolment phase. In all the security system to enroll as a legitimate user in a service, a user must previously register with the service provider by ascertaining his/her identity with the provider. Therefore a scanner is used to scan the fingerprint of the user to reveal his/her identity for the first time. The finger print image thus obtained undergoes a series of enhancement steps. This is described in the following section of this proposed paper. A. B. Fingerprint Enhancement

Figure 1.Biometric System Figure 2 shows a common idea of obtaining the minutiae points from biometric feature obtained from the user. The key vector is formed based on minutiae points (ridge ending and ridge bifurcation) are encountered in the given finger print image [10]. Figure 2 shows various steps involved in the proposed system for network security using biometrics.

This is very important step in designing a security system for network security using biometrics. This step comprise of the subsequent processing on the obtained fingerprint image. As we all know a fingerprint is made of a series of ridges and furrows on the surface of the finger. This determines the uniqueness of the individuals fingerprint. No two fingerprints can have the same pattern of ridges and furrows. Minutiae points are local ridge characteristics that happen at either a ridge bifurcation or a ridge ending. The ridges hold the information of characteristic features obligatory for minutiae extraction therefore the quality of the ridge structures in a fingerprint image turns out to be an important characteristic. The obtained image is then subjected to image enhancement techniques to reduce the noise [11]. The following are the widely used image improvement techniques, normalization, orientation estimation, local frequency estimation, Gabor filtering, and thinning. 1 Normalization The process of standardizing the intensity values in an image by adjusting the range of gray-level values so that it lies within a desired range of values is termed as “normalization”. Moreover the ridge structures in the fingerprint are not affected as a result of this process. It is carried out to standardize the dynamic levels of variation in gray-level values that facilitates the processing of subsequent image
190 http://sites.google.com/site/ijcsis/ ISSN 1947-5500

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 2, May 2010

enhancement stages. Figure 3 shows a image of the fingerprint before and after normalization.

4

Thinning

2

(a) (b) Figure 3. (a) Original Image (b) Image after normalization Orientation Estimation

The concluding image enhancement pace typically performed former to minutiae extraction is thinning. Thinning is a morphological operation that successively erodes away the foreground pixels until they are one pixel wide. The application of the thinning algorithm to a fingerprint image preserves the connectivity of the ridge structures while forming a skeleton version of the binary image. This skeleton image is then used in the subsequent extraction of minutiae. Figure 6 shows the results of thinning to a fingerprint image.

The orientation estimation is an essential step in the enhancement process as the successive Gabor filtering stage relies on the local orientation in order to successfully enhance the fingerprint image. Figure 4 (a) and (b) illustrates the results of orientation estimation and smoothed orientation estimation of the fingerprint image respectively. In addition to the orientation image, another important parameter that is used in the construction of the Gabor filter is the local ridge frequency.

Figure 6 Thinned Image C. Minutiae Feature Extraction

The next step is to extract the minutiae from the enhanced image. The most generally engaged technique of minutiae extraction is the Crossing Number (CN) concept [12]. This method engrosses the use of the skeleton image where the ridge flow pattern is eight-connected. The minutiae are extracted by scanning the local neighborhood of each ridge pixel in the image using a 3x3 window. The CN value is then computed, which is defined as half the sum of the differences between pairs of adjacent pixels in the eight-neighborhood. Figure 7 represents the list of minutiae in a fingerprint image.

3

(a) (b) Figure 4. (a) Orientation Image (b) Smoothened Orientation Image Gabor Filtering

Once the ridge orientation and ridge frequency information has been single-minded, these parameters are used to construct the even-symmetric Gabor filter. Gabor filters are employed because they have frequency-selective and orientation selective properties. These properties allow the filter to be tuned to give maximal response to ridges at a specific orientation and frequency in the fingerprint image. Therefore, a properly tuned Gabor filter can be used to effectively preserve the ridge structures while reducing noise. Figure 5 illustrates the results of using Gabor filter to a fingerprint image.

D.

Figure 7. Minutiae extraction on a fingerprint image. Mapping Function

Figure Image

5

Filtered

The coordinate system used to articulate the minutiae point locations of a fingerprint is a Cartesian coordinate system. The X and Y coordinate of the minutiae points are in pixel units. Angles are expressed in standard mathematical format, with zero degrees to the right and angles increasing in the counterclockwise direction. Every minutia can be stored as a binary string. Each minutiae point can be recorded in 27 bits: 1 bit for the minutiae type, 9 bits each for minutiae X coordinate and Y coordinate, and 8 bits for the minutia angle. Thus, the binary representation of minutiae point is obtained. Suppose Mi = (ti, xi, yi, θi) (i = 1 . . . n) are the all extracted minutiae for a fingerprint image. Then these minutiae points can be arranged
191 http://sites.google.com/site/ijcsis/ ISSN 1947-5500

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 2, May 2010

in a list from left to right by ascending X-co-ordinate, if equal by ascending Y-co-ordinate (first X, then Y) as follows: Mi1Mi2 · · ·Min The result of the feature extraction stage is what is called a minutia template (FP). An approximate range on the number of minutiae found at this stage is from 10 to 80. These are the different steps involved in designing a fingerprint based biometric authentication system for network security. E. The Finger Print Hardening Protocol

There are two necessities for registration using Finger Print. 1. The user should obtain the biometric feature from his finger print using suitable image processing techniques as one mentioned in the previous section. 2. The minutia template should be encrypted with AES 128 bit symmetric cipher and is then transmitted to the server for storage in the database, so that it should not be possible for an outside attacker to determine the biometric feature by an exhaustive search either at the server side or by meet in the middle attack. F. The Finger authentication Protocol

MATLAB 7. Some of the minutiae extracted from a sample finger print are shown in table 1. In the context of modern biometrics, these features, called fingerprint minutiae, can be captured, analyzed, and compared electronically, with correlations drawn between a live sample and a reference sample, as with other biometric technologies. There are two requirements for registration using Finger Print. The user should obtain the biometric feature from his finger print using appropriate image processing techniques as one mentioned in the previous section. The second is that the minutia template should be encrypted with AES 128 bit symmetric cipher and is then transmitted to the server for storage in the database, so that it should not be possible for an outside attacker to determine the biometric feature by an exhaustive search either at the server side or by meet in the middle attack.
Type 1 1 0 0 X 35 50 19 23 Y 117 83 57 135 Direction 2.93 2.95 2.80 0.27

Table 1.List of Minutiae where 1 represent ridge ending point and 0 represent isolated point in a fingerprint image. Thus, the minutia can be expressed as a 4-vector with its elements in order, the type t, the X and Y coordinates (x, y), and the direction θ (Angle value is a non-negative value between 0 and 179, in units of degree) as shown in table 1. If each minutia is stored with type (1 bit), location (9 bits each for x and y), and direction (8 bits), then each will require 27 bits and the template will require up to 270 bytes. Then this binary representation is mapped on to a finger print hardening protocol for the generation of strong secret. The performance measures obtained revealed that the proposed method effectively provides network security. Therefore it can be directly applied to fortify existing standard single-server biometric based security applications. The analysis for the security of the protocol is based on the following assumptions (i) For a cyclic group G, generated by g, we are given g and gn, n∈N, the challenge is to compute n. (ii) Given g, ga, gb, it is hard to compute gab. Clearly if these assumptions are not satisfied then C, an adversary, can gain access to the key gab. A compromised session secret does not affect the security of the proposed deniable authentication protocol. The session secret can be derived from k' ≡ YR XsH (M||T)+tr mod p, where a random t is chosen independently from each session. If an attacker wants to forge the deniable information with the forged message M’ by using the compromised session k, the receiver will derive a different session secret from the forged information. This is because that the message and its corresponding session secret are interdependent. Thereby, a compromised session secret does not affect the security of other sessions. V. CONCLUSION

To initiate a request for service, user computes his FP1 = EAES(FP), then the user sends the user ID along with FP1 to the server. In Lee et al.[16]’s protocol, the authority selects two large prime numbers p and q, where q|p-1. Let g be an element of order q in GF(p). Assume H(...) is a collision-free hash function with an output of q bits. The secret key of the sender S is XS ∈ Zq* and YS =gXs mod p is the corresponding public key. Similarly, (XR, YR) is the key pair of the receiver R, where XR∈Zq* and YR ∈gXR mod p. The symbol “||” is the concatenate operator of strings. In this work, Li Gang's[17] protocol is adopted to implement the authentication protocol. Let t1 and t2 be the minutiae template of FP1 and FP2, Step 1. S chooses t, t1 ∈RZq* and computes r=gt mod p, r1=g t1 mod p and σ1=H(r||T)XS+t1r1 mod q, where T is a time stamp, and then he sends (r, T, r1,σ1) to R; Step 2. R checks whether gσ1 ≡Ys H(r||T) r1 mod p. If not, R stops. Otherwise, R chooses t2∈RZq* and computes r2 = gt2 mod p and σ2 H(r||T) XR+t2r2 mod q, and then he sends(r,T,r2, σ2) to S; Step 3. S verifies whether gσ2 ≡YR H(r||T) r2 mod p. If not, S stops. Otherwise, S computes σ=H(M||T)XS+tr mod q, k=(YR)σ mod p and MAC=H(k||M||T||r1||σ1||r2||σ2). Finally, S sends MAC with M to R; Step 4. R computes k'=(YsH(M||T)rr mod p and verifies whether H(k’||M||T||r1||σ1|| r2||σ2)=MAC. If the above equation holds, R accepts it. Otherwise, R rejects it and authentication becomes fail. IV. PERFORMANCE MEASURES

This section of the paper explains the performance measures of our approach. The fingerprint processing has been done in
192

This paper proposes an approach for network security using biometrics. Biometric systems are commonly used to control
http://sites.google.com/site/ijcsis/ ISSN 1947-5500

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 8, No. 2, May 2010

access to physical assets (laboratories, buildings, cash from ATMs, etc.) or logical information (personal computer accounts, secure electronic documents, etc). The human biometrics like hand geometry, face, fingerprint, retina, iris, DNA, signature and voice can be effectively used to ensure the network security. In biometric cryptosystems, a cryptographic key is generated from the biometric template of a user stored in the database in such a way that the key cannot be revealed without a successful biometric authentication. In this system, the ideas in the areas of image processing technique are reused to extract the minutiae from biometric image. The preprocessing techniques mentioned in this paper play an important role in improving the performance of the proposed biometric based network security system. The performance measures obtained revealed that the proposed method effectively provides network security. Therefore it can be directly applied to fortify existing standard single-server biometric based security applications. The future works rely on improving the network security by making use of cancelable biometrics and multimodal biometrics in the proposed authentication system. REFERENCES
[1] Rajeswari Mukesh, A. Damodaram, and V. Subbiah Bharathi, “Finger Print Based Authentication and Key Exchange System Secure Against Dictionary Attack,” IJCSNS International Journal of Computer Science and Network Security, Vol. 8, no. 10, pp. 14-20, 2008. T. Gunasekaran, and C. Parthasarathy, “Biometrics in Network Security,” International Journal of Computer Network and Security (IJCNS), vol. 1, no. 1, pp. 36-42, 2006. Mahfuzur Rahman, and Prabir Bhattacharya, “Secure Network Communication Using Biometrics,” IEEE International Conference on Multimedia and Expo (ICME'01), p. 52, 2001. Yunsu Chung, Kiyoung Moon, and Hyung-Woo Lee, “Biometric Certificate Based Biometric Digital Key Generation with Protection Mechanism,” Frontiers in the Convergence of Bioscience and Information Technologies, pp. 709-714, 2007. Sandip Dutta, Avijit Kar, N. C. Mahanti, and B. N. Chatterji, “Network Security Using Biometric and Cryptography,” Proceedings of the 10th International Conference on Advanced Concepts for Intelligent Vision Systems, pp. 38-44, 2008. O. S. Benavente, and R. Piccio-Marchetti, “Authentication services and biometrics: network security issues,” 39th Annual 2005 International Carnahan Conference on Security Technology, 2005. CCST '05, pp. 333-3336, 2005. Suriza Ahmad Zabidi, and Momoh-Jimoh E. Salami, “Design and Development of Intelligent Fingerprint-Based Security System,” Knowledge-Based Intelligent Information and Engineering Systems, Book Chapter on Springer link, vol. 3214, pp. 312-318, 2004. Ronald G. Wolak, “Network Security: Biometrics - The Password Alternative,” School of Computer and Information Sciences, 1998. Umut Uludag, Sharath Pankanti, Salil Prabhakar, and Anil K. Jain “Biometric Cryptosystems Issues and Challenges” Proceedings of the IEEE 2004. P. Arul, and Dr. A. Shanmugam, “Generate A Key for AES Using Biometric for VOIP Network Security,” Journal of Theoretical and Applied Information Technology, pp. 107-112, 2009. L. Hong, Y. Wan, and A. Jain, “Fingerprint Image Enhancement: Algorithm and Performance Evaluation,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 20, no.8, pp.777-789, 1998. S. Kasaei, and B. Boashash, “Fingerprint feature extraction using blockdirection on reconstructed images,” In IEEE region TEN Conference on digital signal Processing applications, TENCON, pp. 303– 306, 1997. N. K. Ratha, J. H. Connell, and R. M. Bolle “Enhancing security and privacy in biometrics based authentication systems”, IBM Systems Journal, vol. 40, pp. 614-634, 2001.

[14] Alexander P. Pons , and Peter Polak, “Understanding user perspectives on biometric technology,” Communications of the ACM, vol. 51, no. 9, pp. 115-118, September 2008. [15] “Biometrics Security Considerations,” Systems and Network Analysis Center Information Assurance Directorate, www.nsa.gov/snac. [16] W. B. Lee, C. C. Wu, and W. J. Tsaur, “A Novel Authentication Protocol Using Generalized ElGamal Signature Scheme”, Information Sciences, 177, 2007, pp.1376-1381. [17] Li Gang1, Xin Xiangjun, Li Wei, "An Enhanced Deniable Authentication Protocol," International Conference on Computational Intelligence and Security, Jan 2008 K. Saraswathi received her B.Sc., and M.C.A., from Avinashilingam University, Coimbatore, TamilNadu, in 1993 and 1996 respectively. She obtained her M.Phil degree from Bharathiar University, Coimbatore, TamilNadu, in the year 2003. Currently she is working as Assistant Professor, Department of Computer Science, Government Arts College, Udumalpet. She has the long experience of teaching Post graduate and Graduate Students. She is currently pursuing her Research in the area of Crypto Systems under Mother Teresa University, Kodaikanal, TamilNadu. Her area of interest includes Biometrics, Cryptography, Network Security, Machine Learning and Artificial Intelligence. She has Co-authored a text book on ‘C’ published by Keerthi Publications. She has presented her publications in various national conferences. She is a member of various professional bodies. Dr. R. Balasubramanian was born in 1947 in India. He obtained his B.Sc., and M.Sc., degree in Mathematics from Government Arts College, Coimbatore, TamilNadu, in 1967 and PSG Arts College, Coimbatore, TamilNadu, in 1969 respectively. He received his Ph.D., from PSG College of Technology, Coimbatore, TamilNadu, in the year 1990. He has published more than 15 research papers in national and international journals. He has been serving engineering educational service for the past four decades. He was formerly in PSG College of Technology, Coimbatore as Assistant Professor in the Department of Mathematics and Computer Applications. He served as Associate Dean of the Department of Computer Applications of Sri Krishna College of Engineering and Technology, Coimbatore. Currently taken charge as Dean Academic Affairs at PPG Institute of Technology, Coimbatore, before which he was a Dean Basic Sciences at Velammal Engineering College, Chennai. He has supervised one PhD thesis in Mathematics and supervising four doctoral works in Computer Applications. His mission is to impart quality, concept oriented education and mould younger generation. He is member of the board of studies of many autonomous institutions and universities. He was the principal investigator of UGC sponsored research project. He is a referee of an international journal on mathematical modeling. He has authored a series of books on Engineering Mathematics and Computer Science. He is a life member of many professional bodies like ISTE, ISTAM and CSI.

[2] [3] [4]

[5]

[6]

[7]

[8] [9] [10] [11] [12] [13]

193

http://sites.google.com/site/ijcsis/ ISSN 1947-5500

Sign up to vote on this title
UsefulNot useful