Call for Paper - November 2023 Edition
IJCA solicits original research papers for the November 2023 Edition. Last date of manuscript submission is October 20, 2023. Read More

A New Cryptosystem based on Fingerprint Features

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2015
Tarik Zeyad Ismaeel, Ahmed Saad Names

Tarik Zeyad Ismaeel and Ahmed Saad Names. Article: A New Cryptosystem based on Fingerprint Features. International Journal of Computer Applications 132(12):31-36, December 2015. Published by Foundation of Computer Science (FCS), NY, USA. BibTeX

	author = {Tarik Zeyad Ismaeel and Ahmed Saad Names},
	title = {Article: A New Cryptosystem based on Fingerprint Features},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {132},
	number = {12},
	pages = {31-36},
	month = {December},
	note = {Published by Foundation of Computer Science (FCS), NY, USA}


Data encryption has become more important in the world of information, in order to secure the information during communicating or transmitting and to prevent an illegal person from achieving on the sensitive information. In this paper, fingerprint encryption algorithm is proposed which is used to encrypt data. Fingerprint image is used to generate three types of fingerprint keys which are derived from different types of fingerprint features. These keys are (bifurcation, ending and minutiae keys).

The proposed fingerprint encryption algorithms use the fingerprint keys and table in encryption and decryption process. This method used the fingerprint key with a simple equation in order to generate the encryption key. The encryption key used to encrypt and decrypt data.

The results show three different cipher texts in hexadecimal form which are encrypted by using the new algorithm. The differences among these texts are very large. The large differences due to use a larger look up table with (256×256) dimensions in encryption. The simulation results of the new encryption method give high security with a good performance.


  1. W. Stallings, “Cryptography and Network Security: Principles and Practice 5th Edition”, Prentice Hall, 2010.
  2. K. H. Rosen, “An Introduction to Cryptography 2th Edition”, Taylor & Francis Group, LLC, 2007.
  3. P. P. Palsaniya and P. D. Soni, “Crypto Steganography Security Enhancement by using Efficient Data Hiding Techniques”, International Journal of Application or Innovation in Engineering & Management (IJAIEM), Vol. 3, , Issue. 2, pp. 263-267, 2014.
  4. H. R. Nemati, “Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering”, 2010.
  5. C. Soutar, A. Stoianov, Rene Gilroy, and B.V.K Vijaya Kumar, “Biometric EncryptionTM”, Proc. SPIE 3314, pp. 178-188, 1998 .
  6. A. Cavoukian, A. Stoianov and F. Carter, “Biometric Encryption: Technology for Strong Authentication, Security and Privacy” International Federation for Information Processing, Vol. 261, pp. 57–77., 2008.
  7. E. J. Kindt, “Privacy and Data Protection Issues of Biometric Applications”, Springer, 2013.
  8. K. Martin, H. Lu, M. Bui, N. Konstantinos, D. Hatzinakos, “A Biometric Encryption System for the Self-Exclusion Scenario of Face Recognition”, IEEE SYSTEMS JOURNAL, VOL. 3, NO. 4, pp. 440-450, DECEMBER 2009.
  9. V. Awasthi, V. Awasthi, K. K. Tiwari. “Finger Print Analysis Using Termination and Bifurcation Minutiae”, International Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459, Volume 2, Issue 2, February 2012.
  10. M. Kaur, M. Singh, A. Girdhar, and P. S. Sandhu. “Fingerprint Verification System using Minutiae Extraction Technique”, World Academy of Science, Engineering and Technology 46 2008.


Encryption, decryption, plaintext, ciphertext, fingerprint.