CFP last date
20 May 2024
Reseach Article

Dual Fingerprints Fusion for Cryptographic Key Generation

by M.marimuthu, A.kannammal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 122 - Number 23
Year of Publication: 2015
Authors: M.marimuthu, A.kannammal
10.5120/21865-5194

M.marimuthu, A.kannammal . Dual Fingerprints Fusion for Cryptographic Key Generation. International Journal of Computer Applications. 122, 23 ( July 2015), 20-25. DOI=10.5120/21865-5194

@article{ 10.5120/21865-5194,
author = { M.marimuthu, A.kannammal },
title = { Dual Fingerprints Fusion for Cryptographic Key Generation },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 122 },
number = { 23 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 20-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume122/number23/21865-5194/ },
doi = { 10.5120/21865-5194 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:11:19.728417+05:30
%A M.marimuthu
%A A.kannammal
%T Dual Fingerprints Fusion for Cryptographic Key Generation
%J International Journal of Computer Applications
%@ 0975-8887
%V 122
%N 23
%P 20-25
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Secured data transfer is a critical issue through open networks due to attackers and intruders. This paper presents a new cryptographic key generation algorithm from dual fingerprint biometric template; the suggested approach has simplified the generation of cryptographic keys and reduces the complexity of traditional cryptosystem. . Fingerprints are permanent throughout person's lifespan. Keys are generated from the fingerprint template for encrypting and decrypting the content of the user. This method can be implemented in MATLAB and it generates different size cryptographic keys, with limited amount of time complexity and space complexity. This is appropriate for all real time applications that establish secured information exchange between the users. Proposed method is evaluated using publicly available FVC2002 database and achieves better result.

References
  1. Colin Soutar, Danny Roberge , Alex Stoianov, Rene Gilroy, B. V. K. Vijaya Kumar, Biometric Encryption™, chapter 22 in ICSA Guide to Cryptography, McGraw-Hill (1999) pp. 1-28.
  2. Umut Uludag, Sharath Pankanti, Salil Prabhakar, Anil K. Jain, Biometric Cryptosystems: Issues and Challenges Proceedings of the IEEE, Vol. 92, NO. 6, JUNE 2004, pp. 948-960
  3. B. Raja Rao, Dr. E. V. V. Krishna Rao, S. V. Rama Rao,M. Rama mohan rao, Finger Print Parameter Based Cryptographic Key Generation, International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622, Vol. 2, Issue 6, November- December 2012, pp. 1598-1604.
  4. A. K. Jain, K. Nandakumar, A. Ross, Score normalization in multimodal biometric systems, In Pattern Recognition, pp. 2270 – 2285, 2005.
  5. Feifei CUI, Gongping YANG, Score Level Fusion of Fingerprint and Finger Vein Recognition, Journal of Computational Information Systems 7: 16 (2011), pp. 5723-5731.
  6. Hung-I Hsiao, Junghsi Lee Fingerprint image cryptography based on multiple chaotic systems, Signal Processing113(2015) pp. 169–181.
  7. Kai Xi, Tohari Ahmad, Fengling Han and Jiankun Hu, A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment, Security And Communication Networks, Security Comm. Networks (2010), Published online in Wiley Online Library (wileyonlinelibrary. com). DOI: 10. 1002/sec. 225
  8. A. Jagadeesan Dr. K. Duraiswamy, Secured Cryptographic Key Generation From Multimodal Biometrics: Feature Level Fusion of Fingerprint and Iris, (IJCSIS) International Journal of Computer Science and Information Security, Vol. 7, No. 1, 2010, pp. 296-305.
  9. Rajeswari Mukeshi, V. J. Subashini, Fingerprint Based Authentication System Using Threshold Visual Cryptographic Technique , IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012) March 30 - 31, 2012, pp. 16-19.
  10. Shin-Yan Chiou, Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions, Hindawi Publishing Corporation, BioMed Research International, Volume 2013, Article ID 623815, http://dx. doi. org/10. 1155/2013/623815 1-12.
  11. Abhishek Nagar, Karthik Nandakumar, AnilK. Jain Multibiometric Cryptosystems Based on Feature-Level Fusion, IEEE Transactions on Information Forensics and Security, Vol. 7, No. 1, February 2012, pp. 255-268.
  12. M. Tico and P. Kuosmanen, An Algorithm for Fingerprint Image Postprocessing, Proc. 34th Asilomar Conf. Signals, Systems and Computers, vol. 2, October 2000, pp. 1735-1739.
  13. Karthik Nandakumar, Anil K. Jain, Sharath Pankanti, Fingerprint-Based Fuzzy Vault: Implementation and Performance, IEEE Transactions on Information Forensics and Security, Vol. 2, No. 4, December 2007, pp. 744-757.
  14. FVC2002, http://bias. csr. unibo. it/fvc2002/, 2002.
Index Terms

Computer Science
Information Sciences

Keywords

Biometrics Fingerprint Minutiae points