CFP last date
22 April 2024
Reseach Article

An Analysis of the Encryption Fusion Approach based on Face Recognition and Prime Numbers

by Shinde Prashant Pandurang
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 176 - Number 26
Year of Publication: 2020
Authors: Shinde Prashant Pandurang
10.5120/ijca2020920230

Shinde Prashant Pandurang . An Analysis of the Encryption Fusion Approach based on Face Recognition and Prime Numbers. International Journal of Computer Applications. 176, 26 ( May 2020), 21-27. DOI=10.5120/ijca2020920230

@article{ 10.5120/ijca2020920230,
author = { Shinde Prashant Pandurang },
title = { An Analysis of the Encryption Fusion Approach based on Face Recognition and Prime Numbers },
journal = { International Journal of Computer Applications },
issue_date = { May 2020 },
volume = { 176 },
number = { 26 },
month = { May },
year = { 2020 },
issn = { 0975-8887 },
pages = { 21-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume176/number26/31363-2020920230/ },
doi = { 10.5120/ijca2020920230 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:41:19.137899+05:30
%A Shinde Prashant Pandurang
%T An Analysis of the Encryption Fusion Approach based on Face Recognition and Prime Numbers
%J International Journal of Computer Applications
%@ 0975-8887
%V 176
%N 26
%P 21-27
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Images play a significant role in various fields, such as biomedical, video conferencing, and remote sensing. Development in Digital Image Processing (IP) technology is motivated by the following key areas of application: improved human image awareness and processing of images for the recording and dissemination of machine perception. Two big problems are to be resolved if an image is to be transmitted. Firstly, the image may be accommodated within the specified bandwidth, and secondly, the image is protected. Image Encryption and Image Compression are 2 simple techniques in IP that are commonly utilized to satisfy the need for effective bandwidth usage and security. In this paper, An Encryption method by Fusion of Multi-Biometrics Data and Prime Numbers in which two algorithms postulations are identified with the Information Fusion techniques. First, one is FIF-Biometric and Numerical Information Fusion algorithm, which consolidates fingerprint and prime number to frame a hybrid fusion code. The second one is FIF, which consolidates face image code and a prime number to form a hybrid face code. The primary algorithm utilizes fingerprint as the biometric segment and the FIF algorithm utilizes a face image of the user. Then again fusion of fusion code of face and finger is managed using fif is applied to get the final output.

References
  1. L. Zhi-fang, Y. Zhi-sheng, A.K.Jain and W. Yun-Xiong, 2003, “Face Detection And Facial Feature Extraction In Color Image”, Proc. The Fifth International Conference on Computational Intelligence and Multimedia Applications (ICCIMA’03), pp.126-130, Xi’an, China...
  2. Mohamed El Aroussi, “Information Fusion towards a Robust Face Recognition System”, research gate https://www.researchgate.net/publication/277201573 July 2009.
  3. M. I. Wade, M. Chouikha, T. Gill, W. Patterson, T. M. Washington, and J. Zeng, "Distributed Image Encryption Based On a Homomorphic Cryptographic Approach," 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York City, NY, USA, 2019, pp. 0686-0696.
  4. M. Roy et al., "A Dual Layer Image Encryption using Polymerase Chain Reaction Amplification and DNA Encryption," 2019 International Conference on Opto-Electronics and Applied Optics (Optronix), Kolkata, India, 2019, pp. 1-4.
  5. J. Li and D. Zhang, "Face gesture recognition based on clustering algorithm," 2019 Chinese Control And Decision Conference (CCDC), Nanchang, China, 2019, pp. 2008-2012.
  6. F. Mallouli, A. Hellal, N. Sharief Saeed and F. Abdulraheem Alzahrani, "A Survey on Cryptography: Comparative Study between RSA vs ECC Algorithms, and RSA vs El-Gamal Algorithms," 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom), Paris, France, 2019, pp. 173-176.
  7. I. Jain, S. A. Fattah, and C. Shahnaz, "Natural and Medical Image Encryption Using Self-Adaptive Permutation and DNA Encoding," 2018 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE), Chonburi, Thailand, 2018, pp. 99-102.
  8. J. Wan and Y. Wang, "The Human Face Recognition Algorithm Based on the Improved Binary Morphology," 2018 2nd IEEE Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC), Xi'an, 2018, pp. 2625-2628.
  9. K. N. Bangera, N. V. S. Reddy, Y. Paddambail and G. Shivaprasad, "Multilayer security using RSA cryptography and dual audio steganography," 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), Bangalore, 2017, pp. 492-495.
  10. H. Wang et al., "A new image fusion algorithm based on Bayer format," 2017 14th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), Chengdu, 2017, pp. 158-161.
  11. G. D. Patne, P. A. Phone, and K. R. Tuckley, "Review of CT and PET image fusion using hybrid algorithm," 2017 International Conference on Intelligent Computing and Control (I2C2), Coimbatore, 2017, pp. 1-5.
  12. Gautham SEKAR, “Cryptanalysis and Design of Symmetric Cryptographic Algorithms”, Dissertation presented in partial fulfillment of Arenberg Doctoral School of Science, Engineering & Technology Faculty of Engineering Department of Electrical Engineering (ESAT) 2011.
  13. G.Iovane, L.Puccio, G.Lamponi, A.Amorosia. Electronic access key based on the innovative Information Fusion technique involving prime numbers and biometric data. Journal of discrete mathematical sciences and cryptography. Taru Publication, 2010.
  14. N. Ruggeri. Principles of pseudo-random number generation in cryptography, University of Chicago, 2006.
  15. G. Mary Amirtha Sagayee, S Arumugam, and G.S.Anandha Mala(2013), Biometric Encryption using Enhanced Finger Print Image and Elliptic Curve, IJCSNS, VOL.13 No.7, July 2013:106- 113.
  16. L. Hong, A. K. Jain and S. Pankanti, \Can multibiometrics improve performance?," in Proceedings AutoID'99, (Summit(NJ), USA), pp. 59{64, Oct 1999.
  17. G. Feng, D. Hu K. Dong, and D. Zhang, “When faces are combined with palmprints: A novel biometric fusion strategy”, pp. 332–341, 2004.
Index Terms

Computer Science
Information Sciences

Keywords

Face Recognition image Encryption image Cryptography FIF.