CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

A New Cryptosystem based on Fingerprint Features

by Tarik Zeyad Ismaeel, Ahmed Saad Names
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 132 - Number 12
Year of Publication: 2015
Authors: Tarik Zeyad Ismaeel, Ahmed Saad Names
10.5120/ijca2015907662

Tarik Zeyad Ismaeel, Ahmed Saad Names . A New Cryptosystem based on Fingerprint Features. International Journal of Computer Applications. 132, 12 ( December 2015), 31-36. DOI=10.5120/ijca2015907662

@article{ 10.5120/ijca2015907662,
author = { Tarik Zeyad Ismaeel, Ahmed Saad Names },
title = { A New Cryptosystem based on Fingerprint Features },
journal = { International Journal of Computer Applications },
issue_date = { December 2015 },
volume = { 132 },
number = { 12 },
month = { December },
year = { 2015 },
issn = { 0975-8887 },
pages = { 31-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume132/number12/23649-2015907662/ },
doi = { 10.5120/ijca2015907662 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:29:13.901137+05:30
%A Tarik Zeyad Ismaeel
%A Ahmed Saad Names
%T A New Cryptosystem based on Fingerprint Features
%J International Journal of Computer Applications
%@ 0975-8887
%V 132
%N 12
%P 31-36
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data encryption has become more important in the world of information, in order to secure the information during communicating or transmitting and to prevent an illegal person from achieving on the sensitive information. In this paper, fingerprint encryption algorithm is proposed which is used to encrypt data. Fingerprint image is used to generate three types of fingerprint keys which are derived from different types of fingerprint features. These keys are (bifurcation, ending and minutiae keys). The proposed fingerprint encryption algorithms use the fingerprint keys and table in encryption and decryption process. This method used the fingerprint key with a simple equation in order to generate the encryption key. The encryption key used to encrypt and decrypt data. The results show three different cipher texts in hexadecimal form which are encrypted by using the new algorithm. The differences among these texts are very large. The large differences due to use a larger look up table with (256×256) dimensions in encryption. The simulation results of the new encryption method give high security with a good performance.

References
  1. W. Stallings, “Cryptography and Network Security: Principles and Practice 5th Edition”, Prentice Hall, 2010.
  2. K. H. Rosen, “An Introduction to Cryptography 2th Edition”, Taylor & Francis Group, LLC, 2007.
  3. P. P. Palsaniya and P. D. Soni, “Crypto Steganography Security Enhancement by using Efficient Data Hiding Techniques”, International Journal of Application or Innovation in Engineering & Management (IJAIEM), Vol. 3, , Issue. 2, pp. 263-267, 2014.
  4. H. R. Nemati, “Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering”, 2010.
  5. C. Soutar, A. Stoianov, Rene Gilroy, and B.V.K Vijaya Kumar, “Biometric EncryptionTM”, Proc. SPIE 3314, pp. 178-188, 1998 .
  6. A. Cavoukian, A. Stoianov and F. Carter, “Biometric Encryption: Technology for Strong Authentication, Security and Privacy” International Federation for Information Processing, Vol. 261, pp. 57–77., 2008.
  7. E. J. Kindt, “Privacy and Data Protection Issues of Biometric Applications”, Springer, 2013.
  8. K. Martin, H. Lu, M. Bui, N. Konstantinos, D. Hatzinakos, “A Biometric Encryption System for the Self-Exclusion Scenario of Face Recognition”, IEEE SYSTEMS JOURNAL, VOL. 3, NO. 4, pp. 440-450, DECEMBER 2009.
  9. V. Awasthi, V. Awasthi, K. K. Tiwari. “Finger Print Analysis Using Termination and Bifurcation Minutiae”, International Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459, Volume 2, Issue 2, February 2012.
  10. M. Kaur, M. Singh, A. Girdhar, and P. S. Sandhu. “Fingerprint Verification System using Minutiae Extraction Technique”, World Academy of Science, Engineering and Technology 46 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Encryption decryption plaintext ciphertext fingerprint.