Image Encryption Using Key Matrix Generation from Biometric Mixed Fingerprint Image for Two Level Security

Authors

  • Megha D. Randeri  ME Student, Computer Engineering Department, SIE, Vadodara, Gujarat, India
  • Dr. Sheshang D. Degadwala  Head of Computer Department, SIE, Vadodara, Gujarat, India
  • Mrs. Arpana Mahajan  Assistant Professor, Computer Engineering Department, SIE, Vadodara, Gujarat, India

DOI:

https://doi.org//10.32628/CI004

Keywords:

Fingerprints, Minutiae Points, Cryptography, Hill Cipher.

Abstract

In recent Era, Security has been most important issue to be considered with different forward looking and preventing measures. Several cryptographic algorithms are developed for encryption and decryption using a secret key. The issue with this strategy is that user ought to recall the key or store the key in a database, which make the framework under danger. Once the put away key is bargained, at that point an attacker can get to the private information effectively. To maintain uniqueness of key, a biometric feature such as fingerprint can be used, whereas randomness can be induced using different combinations of fingerprints. In this paper, we propose a technique to generate the key matrix by extracting minutiae points from the combined minutiae template of fingerprints of the sender and receiver. This system contains four phases. One is Enrolment Phase, second is Authentication Phase, third is Key Generation phase and last is Cryptographic phase. For encryption of the original image using generated key matrix, we use Hill cipher.

References

  1. Dawahdeh Z.E., Yaakob, S.N., Razif bin Othman, R., “A New Image Encryption Technique Combining Elliptic Curve Cryptosystem with Hill Cipher”,Journal of King Saud University Computer and Information Sciences (2017).
  2. Subhas Barman, Debasis Samanta and Samiran Chattopadhyay, “Fingerprint-based crypto-biometric system for Network security”, EURASIP Journal on Information Security, Springer (2015).
  3. Panduranga H T, Naveen Kumar S K, “Advanced Partial Image Encryption using Two-Stage Hill Cipher Technique”, International Journal of Computer Applications (0975 – 8887) Volume 60– No.16, December 2012.
  4. M.Marimuthu, A.Kannammal, “Dual Fingerprints Fusion for Cryptographic Key Generation”, International Journal of Computer Applications, volume 122, July 2015.
  5. Sharda Singh, Dr. J. A. Laxminarayana, “RSA Key Generation Using Combination of Fingerprints”, IOSR Journal of Computer Engineering (IOSR-JCE), e-ISSN: 2278-0661, (AETM’15).
  6. Mrs. Afreen Fatima Mohammed, “Biometric Based Authentication Using Two-Stage Fingerprint Privacy Protection for File Storage on Server”, IJCSMC, Vol. 5, Issue. 3, March 2016, pg.377 – 387
  7. Mofeed Turky Rashid, Huda Ameer Zaki, “RSA Cryptographic Key Generation Using Fingerprint Minutiae”, Iraqi Journal for Computers and Informatics(IJCI), volume 1, issue 1, 2014.
  8. Goutham L, Mahendra M S, Manasa A P, Mr. Prajwalasimha S N, “Modified Hill Cipher Based Image Encryption Technique”, (IJRASET), Volume 5 Issue IV, April 2017.
  9. Gang Zheng, Wanqing Li, Ce Zhan, “Cryptographic Key Generation from Biometric Data using Lattice Mapping”, International Conference on Pattern Recognition, IEEE, 2006.
  10.  N. Lalithamani, Dr. K.P. Soman, ”An Efficient Approach for Non-Invertible Cryptographic Key Generation from Cancellable Fingerprints Biometrics”. International Conference on Advances in Recent technologies in Communication and Computing, IEEE, 2009.
  11. G. Patel, G. Panchal, “A Chaff-point Based Approach for Cancellable Template Generation of Fingerprint Data”, Springer International Publishing, ICTIS, 2017.
  12. R. K. Jangid, Noor Mohmmad, A, Didel, S. Taterh, “Hybrid Approach of Image Encryption using DNA cryptography and TF Hill Cipher Algorithm”, International Conference on Communication and Signal Processing, IEEE, 2014.
  13. P. L. Sharma, M. Rehan, “On Securtiy of Hill Cipher using Finite Fields”, International Journal of Computer Application, volume 71, May 2013.
  14. F. Abundiz-Perez, C. Cruz-Hernandez, M. A. Murillo-Escobar, R. M. Lopez-Gutierrez, A. Arellano-Delagado, “A Fingerprint Image Encryption Scheme based on Hyperchaotic Rossler Map”, Hindawi, volume 2016.
  15. N. H. Barnouti, “Fingerprint Recognition Improvement Using Histogram Equalization and Compression Methods”, International Journal of Engineering Research and General Science, volume 4, issue 2, April 2016.
  16. Cryptography www.cryptographyworld.com/concept.htm
  17. R. K. Nichols, ”ICSA Guide to Cryptography”, McGraw-Hill, chapter 22.
  18. B. K. Sy, A. P. Kumara Krishnan, “New Trends and Developments in Biometrics”, INTECH publisher, pp 191-218.
  19. R. K. Sharma, “Generation of Biometric Key for Use in DES”, IJCSI International Journal of Computer Science Issues, 9(6), 2012, 312-315.
  20. Umut Uludag, Sharath Pankanti, Salil Prabhakar and Anil K.Jain, “Biometric Cryptosystems Issues and Challenges”, Proceedings of the IEEE, 92(6), 2004, 948-960.
  21. Abhishek Nagar, “Designing Biometrics-based Cryptosystem”, Post-Graduate diss, Department of Mathematics, IIT Delhi- May 2006.
  22. Pankaj Bhowmik, Kishor Bhowmik, Mohammad Nurul Azam, Mohammad Wahiduzzaman Rony, “Fingerprint Image Enhancement and It’s Feature Extraction for Recognition”, International Journal of Scientific & Technology Research (IJSTR), volume 1, issue 5, June 2012.
  23. Preeti Poonia, Praveen Kantha, “Comparative Study of Various Substitution and Transposition Encryption Techniques”, International Journal of Computer Applications, volume 145 – No 10, July 2016.
  24. Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, Saroj Kumar Panigraphy, “Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm”, International Journal of Security, volume 1 – issue (1), page 14-21.

Downloads

Published

2018-04-10

Issue

Section

Research Articles

How to Cite

[1]
Megha D. Randeri, Dr. Sheshang D. Degadwala, Mrs. Arpana Mahajan, " Image Encryption Using Key Matrix Generation from Biometric Mixed Fingerprint Image for Two Level Security, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 5, pp.248-254, March-April-2018. Available at doi : https://doi.org/10.32628/CI004