Cryptographic Security Approach for Biometric Verification System

Akinribido C.T, Olabode O.O, Adetunmbi O.A, Adewumi Moradeke Grace
{"title":"Cryptographic Security Approach for Biometric Verification System","authors":"Akinribido C.T, Olabode O.O, Adetunmbi O.A, Adewumi Moradeke Grace","doi":"10.54105/ijcns.c7854.113223","DOIUrl":null,"url":null,"abstract":"This paper presents cryptography which is the science of encryption and decryption to protect fingerprint that can be transmitted from sender to receiver. This security approach (cryptography) can also be applicable to other biometric traits like face, iris, retina and palm print. The significant of this protective medium is to prevent intruders or attacker to easily perceive the presence of fingerprint images. The method that was utilized for implementation of this cryptographic security approach for fingerprint verification System was achieved through Elliptic Curve Cryptography and Hill Cipher Algorithm. An elliptic Curve Function was defined and its domain parameters were used to generate self invertible key matrix that was used for the encryption and decryption process of the biometric images (Fingerprint, Face and Ear ) The security approach was also improved by ensuring that the decryption can only be done through secret key. After decryption, fingerprint verification was done by extracting and matching distinct feature (ridges) from template fingerprint and distinct feature from input fingerprint. The result obtained from demonstration of the cryptographic approach allows end users to load fingerprint image, encrypt it at sending end. At receiver end, end user can decrypt the fingerprint image. Image enhancement was later done before authentication through extraction and matching of distinct features. This model will prevent destruction and manipulation of stored fingerprint image. Authentication can also be accomplished through biological traits instead of use of password that can be stolen or transferred to relative.","PeriodicalId":231271,"journal":{"name":"Indian Journal of Cryptography and Network Security","volume":" 2","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Indian Journal of Cryptography and Network Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.54105/ijcns.c7854.113223","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

This paper presents cryptography which is the science of encryption and decryption to protect fingerprint that can be transmitted from sender to receiver. This security approach (cryptography) can also be applicable to other biometric traits like face, iris, retina and palm print. The significant of this protective medium is to prevent intruders or attacker to easily perceive the presence of fingerprint images. The method that was utilized for implementation of this cryptographic security approach for fingerprint verification System was achieved through Elliptic Curve Cryptography and Hill Cipher Algorithm. An elliptic Curve Function was defined and its domain parameters were used to generate self invertible key matrix that was used for the encryption and decryption process of the biometric images (Fingerprint, Face and Ear ) The security approach was also improved by ensuring that the decryption can only be done through secret key. After decryption, fingerprint verification was done by extracting and matching distinct feature (ridges) from template fingerprint and distinct feature from input fingerprint. The result obtained from demonstration of the cryptographic approach allows end users to load fingerprint image, encrypt it at sending end. At receiver end, end user can decrypt the fingerprint image. Image enhancement was later done before authentication through extraction and matching of distinct features. This model will prevent destruction and manipulation of stored fingerprint image. Authentication can also be accomplished through biological traits instead of use of password that can be stolen or transferred to relative.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
生物识别验证系统的密码安全方法
本文介绍的密码学是一门加密和解密的科学,用于保护可从发送方传输到接收方的指纹。这种安全方法(密码学)也适用于其他生物识别特征,如脸部、虹膜、视网膜和掌纹。这种保护介质的意义在于防止入侵者或攻击者轻易察觉指纹图像的存在。指纹验证系统的加密安全方法是通过椭圆曲线加密法和希尔密码算法实现的。定义了一个椭圆曲线函数,并利用其域参数生成自反密钥矩阵,用于生物识别图像(指纹、脸部和耳朵)的加密和解密过程,同时还通过确保只能通过秘钥进行解密来改进安全方法。解密后,通过提取和匹配模板指纹的明显特征(脊)和输入指纹的明显特征来进行指纹验证。加密方法的演示结果允许终端用户加载指纹图像,并在发送端进行加密。在接收端,终端用户可以解密指纹图像。随后,通过提取和匹配不同的特征,在认证前对图像进行增强。这种模式可以防止存储的指纹图像被破坏和篡改。身份验证还可以通过生物特征来完成,而不是使用密码,因为密码可能被盗或被转给他人。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Cryptographic Security Approach for Biometric Verification System Software Support for Arbitrary Precision Arithmetic in Programming Languages Methodologies for Predicting Cybersecurity Incidents Blockchain Technology In Healthcare Services An Improved RSA Algorithm for Enhanced Security
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1