A Study on Image Encryption Using Key Matrix Generation from Biometric Mixed Fingerprint Image for Two Level Security

Authors

  • M. D. Randeri  M. E. Student, Computer Engineering, Sigma Institute of Engineering, Vadodara, Gujarat, India
  • S. D. Degadwala  Head of Computer Department, Sigma Institute of Engineering, Vadodara, Gujarat, India
  • A. Mahajan  Assistant Professor, Computer Department, Sigma Institute of Engineering, Vadodara, Gujarat, India

Keywords:

Fingerprints, Minutiae points, Cryptography, Hill Cipher.

Abstract

In recent Era, Security has been most important issue to be considered with different forward looking and preventing measures. Several cryptographic algorithms are developed for encryption and decryption using a secret key. The issue with this strategy is that user ought to recall the key or store the key in a database, which make the framework under danger. Once the put away key is bargained, at that point an attacker can get to the private information effectively. To maintain uniqueness of key, a biometric feature such as fingerprint can be used, whereas randomness can be induced using different combinations of fingerprints. In this paper, we propose a technique to generate the key matrix by extracting minutiae points from mixed fingerprints of the sender and receiver. This system contains four phases. One is Enrolment Phase, second is Authentication Phase, third is Key Generation phase and last is Cryptographic phase. For encryption of the original image using generated key matrix, we use Hill cipher.

References

  1. Subhas Barman, Debasis Samanta and Samiran Chattopadhyay, “Fingerprint-based crypto-biometric system for Network security”, EURASIP Journal on Information Security, Springer (2015).
  2. Mrs. Afreen Fatima Mohammed, “Biometric Based Authentication Using Two-Stage Fingerprint Privacy Protection for File Storage on Server”, IJCSMC, Vol. 5, Issue. 3, March 2016, pg.377 – 387.
  3.  Mofeed Turky Rashid, Huda Ameer Zaki, “RSA Cryptographic Key Generation Using Fingerprint Minutiae”, Iraqi Journal for Computers and Informatics(IJCI), volume 1, issue 1, 2014.
  4. M.Marimuthu, A.Kannammal, “Dual Fingerprints Fusion for Cryptographic Key Generation”, International Journal of Computer Applications, volume 122, July 2015.
  5. Sharda Singh, Dr. J. A. Laxminarayana, “RSA Key Generation Using Combination of Fingerprints”, IOSR Journal of Computer Engineering (IOSR-JCE), e-ISSN: 2278-0661, (AETM’15).
  6.  Goutham L, Mahendra M S, Manasa A P, Mr. Prajwalasimha S N4, “Modified Hill Cipher Based Image Encryption Technique”, (IJRASET), Volume 5 Issue IV, April 2017.
  7. Dawahdeh, Z.E., Yaakob, S.N., Razif bin Othman, R., “A New Image Encryption Technique Combining Elliptic Curve Cryptosystem with Hill Cipher”, Journal of King Saud University Computer and Information Sciences (2017).
  8. Panduranga H T, Naveen Kumar S K, “Advanced Partial Image Encryption using Two-Stage Hill Cipher Technique”, International Journal of Computer Applications (0975 – 8887) Volume 60– No.16, December 2012.
  9. F. Abundiz-Perez, C. Cruz-Hernandez, M. A. Murillo-Escobar, R. M. Lopez-Gutierrez, A. Arellano-Delagado, “A Fingerprint Image Encryption Scheme based on Hyperchaotic Rossler Map”, Hindawi, volume 2016.
  10. Gang Zheng, Wanqing Li, Ce Zhan, “Cryptographic Key Generation from Biometric Data using Lattice Mapping”, International Conference on Pattern Recognition, IEEE, 2006.
  11. N. Lalithamani, Dr. K.P. Soman, ”An Efficient Approach for Non-Invertible Cryptographic Key Generation from Cancellable Fingerprints Biometrics”. International Conference on Advances in Recent technologies in Communication and Computing, IEEE, 2009.
  12. G. Patel, G. Panchal, “A Chaff-point Based Approach for Cancellable Template Generation of Fingerprint Data”, Springer International Publishing, ICTIS, 2017.
  13. R. K. Nichols, ”ICSA Guide to Cryptography”, McGraw-Hill, chapter 22.
  14. B. K. Sy, A. P. Kumara Krishnan, “New Trends and Developments in Biometrics”, INTECH publisher, pp 191-218.
  15. R. K. Jangid, Noor Mohmmad, A, Didel, S. Taterh, “Hybrid Approach of Image Encryption using DNA cryptography and TF Hill Cipher Algorithm”, International Conference on Communication and Signal Processing, IEEE, 2014.

Downloads

Published

2017-12-31

Issue

Section

Research Articles

How to Cite

[1]
M. D. Randeri, S. D. Degadwala, A. Mahajan, " A Study on Image Encryption Using Key Matrix Generation from Biometric Mixed Fingerprint Image for Two Level Security, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.486-490, November-December-2017.