Biometrics based Cryptographic Key Generation using Finger Print

Main Article Content

Mrs. A. Ruba
Dr. G. Rajkumar
Dr. K. Parimala

Abstract

Accurate and automatic identification and verification of users are essential in all system. Shared secrets like Personal Identification Numbers or Passwords and key devices such as Smart Cards are not presently adequate in few situations. What is necessary is a system that could authenticate that the person is the person. The biometrics is improving the capability to recognize the persons. The usage of biometrics system permits the identification of a living person according to the physiological or behavioral features to be accepted without human involvement. The construction of cryptographic key from biometrics is used to make safe our system. To implement this concept, sender’s recent fingerprint would be used to construct key by combining it with the information. For key decryption, the sender’s Database fingerprint images, which are previously kept by receiver’s end, would be used.

Article Details

How to Cite
[1]
Mrs. A. Ruba, Dr. G. Rajkumar, and Dr. K. Parimala, “Biometrics based Cryptographic Key Generation using Finger Print”, Int. J. Comput. Eng. Res. Trends, vol. 4, no. 6, pp. 259–262, Jun. 2017.
Section
Research Articles

References

B. Raja Rao, Dr. E.V.V. Krishna Rao et al., “Finger Print Parameter based Cryptographic Key Generationâ€, International Journal of Engineering Research and Applications (IJERA), Vol. 2, Issue 6, Nov – Dec, 2012, pp. 1598 – 1604.

Dr. G. Rajkumar, Dr. K. Parimala and Mrs. A. Ruba, “An Innovative Approach to Genetic Algorithm based Cryptographyâ€, International Jouranl of Computer Science, Vol. 5, Issue 1, No 9, 2017, Page No. 1199 – 1202.

N. Ratha and J. Connell et al. Cancelable biometrics: A case study in fingerprints. Intl. Conf. on Pattern Recognition, page 370C373, 2006

N. Ratha, J. Connell, and R. Bolle. Enhancing security and privacy in biometrics-based authentication systems. IBM Systems Journal, 40(3):614C634, 2001.

Nanavati, S. Thieme, M. and Nanavati, R. Biometrics: Identity Verification in a Networked World. Wiley Computer Publishing, New York, 2002

Saad Abuguba, Milan M. Milosavljevic, and Nemanja Macek, “An Efficient Approach to Generating Cryptographic keys from the face and Iris Biometrics fused at the feature level,†International Journal of Computer Science and Network Security, Vol. 15, No. 6, June 2015.

Sanjukta Pal, Sucharita Pal, Dr. Pranam Paul “Fingerprint Geometry matching by Divide and Conquer Strategy†accepted and published in International Journal of Advanced Research in Computer Science(IJARCS), ISSN No. 0976-5697, Volume 4, No. 4, March-April 2013.

T. Connie, A. Teoh, M. Goh, and D. Ngo, “ Palm hashing: A novel approach for cancellable biometrics," Information processing letters, vol. 93, no. 1, pp. 1-5, 2005

Cryptography and Network Security Principles and Practices by William Stalling, Prentice Hall, 2005.

M.Sathya, & Dr.K.Thangadurai. (2017). Implementation of Optimization Using Eclat and PSO for Efficient Association Rule Mining. International Journal of Computer Engineering In Research Trends, 4(1), 4-8. Retrieved from http://ijcert.org/ems/ijcert_papers/V4I0102.pdf.