A Study on Image Encryption Using Key Matrix Generation from Biometric Mixed Fingerprint Image for Two Level Security

Authors(3) :-M. D. Randeri, S. D. Degadwala, A. Mahajan

In recent Era, Security has been most important issue to be considered with different forward looking and preventing measures. Several cryptographic algorithms are developed for encryption and decryption using a secret key. The issue with this strategy is that user ought to recall the key or store the key in a database, which make the framework under danger. Once the put away key is bargained, at that point an attacker can get to the private information effectively. To maintain uniqueness of key, a biometric feature such as fingerprint can be used, whereas randomness can be induced using different combinations of fingerprints. In this paper, we propose a technique to generate the key matrix by extracting minutiae points from mixed fingerprints of the sender and receiver. This system contains four phases. One is Enrolment Phase, second is Authentication Phase, third is Key Generation phase and last is Cryptographic phase. For encryption of the original image using generated key matrix, we use Hill cipher.

Authors and Affiliations

M. D. Randeri
M. E. Student, Computer Engineering, Sigma Institute of Engineering, Vadodara, Gujarat, India
S. D. Degadwala
Head of Computer Department, Sigma Institute of Engineering, Vadodara, Gujarat, India
A. Mahajan
Assistant Professor, Computer Department, Sigma Institute of Engineering, Vadodara, Gujarat, India

Fingerprints, Minutiae points, Cryptography, Hill Cipher.

  1. Subhas Barman, Debasis Samanta and Samiran Chattopadhyay, “Fingerprint-based crypto-biometric system for Network security”, EURASIP Journal on Information Security, Springer (2015).
  2. Mrs. Afreen Fatima Mohammed, “Biometric Based Authentication Using Two-Stage Fingerprint Privacy Protection for File Storage on Server”, IJCSMC, Vol. 5, Issue. 3, March 2016, pg.377 – 387.
  3.  Mofeed Turky Rashid, Huda Ameer Zaki, “RSA Cryptographic Key Generation Using Fingerprint Minutiae”, Iraqi Journal for Computers and Informatics(IJCI), volume 1, issue 1, 2014.
  4. M.Marimuthu, A.Kannammal, “Dual Fingerprints Fusion for Cryptographic Key Generation”, International Journal of Computer Applications, volume 122, July 2015.
  5. Sharda Singh, Dr. J. A. Laxminarayana, “RSA Key Generation Using Combination of Fingerprints”, IOSR Journal of Computer Engineering (IOSR-JCE), e-ISSN: 2278-0661, (AETM’15).
  6.  Goutham L, Mahendra M S, Manasa A P, Mr. Prajwalasimha S N4, “Modified Hill Cipher Based Image Encryption Technique”, (IJRASET), Volume 5 Issue IV, April 2017.
  7. Dawahdeh, Z.E., Yaakob, S.N., Razif bin Othman, R., “A New Image Encryption Technique Combining Elliptic Curve Cryptosystem with Hill Cipher”, Journal of King Saud University Computer and Information Sciences (2017).
  8. Panduranga H T, Naveen Kumar S K, “Advanced Partial Image Encryption using Two-Stage Hill Cipher Technique”, International Journal of Computer Applications (0975 – 8887) Volume 60– No.16, December 2012.
  9. F. Abundiz-Perez, C. Cruz-Hernandez, M. A. Murillo-Escobar, R. M. Lopez-Gutierrez, A. Arellano-Delagado, “A Fingerprint Image Encryption Scheme based on Hyperchaotic Rossler Map”, Hindawi, volume 2016.
  10. Gang Zheng, Wanqing Li, Ce Zhan, “Cryptographic Key Generation from Biometric Data using Lattice Mapping”, International Conference on Pattern Recognition, IEEE, 2006.
  11. N. Lalithamani, Dr. K.P. Soman, ”An Efficient Approach for Non-Invertible Cryptographic Key Generation from Cancellable Fingerprints Biometrics”. International Conference on Advances in Recent technologies in Communication and Computing, IEEE, 2009.
  12. G. Patel, G. Panchal, “A Chaff-point Based Approach for Cancellable Template Generation of Fingerprint Data”, Springer International Publishing, ICTIS, 2017.
  13. R. K. Nichols, ”ICSA Guide to Cryptography”, McGraw-Hill, chapter 22.
  14. B. K. Sy, A. P. Kumara Krishnan, “New Trends and Developments in Biometrics”, INTECH publisher, pp 191-218.
  15. R. K. Jangid, Noor Mohmmad, A, Didel, S. Taterh, “Hybrid Approach of Image Encryption using DNA cryptography and TF Hill Cipher Algorithm”, International Conference on Communication and Signal Processing, IEEE, 2014.

Publication Details

Published in : Volume 2 | Issue 6 | November-December 2017
Date of Publication : 2017-12-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 486-490
Manuscript Number : CSEIT1726142
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

M. D. Randeri, S. D. Degadwala, A. Mahajan, "A Study on Image Encryption Using Key Matrix Generation from Biometric Mixed Fingerprint Image for Two Level Security", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.486-490, November-December-2017.
Journal URL : http://ijsrcseit.com/CSEIT1726142

Article Preview

Follow Us

Contact Us