Encryption of Text Using Fingerprints
نویسندگان
چکیده
Biometrics is the science and technology of measuring and analyzing biological data of human body, extracting a feature set from the acquired data, and comparing this set against to the template set in the database. Biometric techniques are gaining importance for personal authentication and identification as compared to the traditional authentication methods. User verification systems that use a single biometric indicator often have to contend with noisy sensor data, restricted degrees of freedom, and unacceptable error rates. To represent the large amount of data in the biometric images an efficient feature extraction method is needed. In this paper we have implemented the generation of unique biometric key after Fingerprint processing. Fingerprint processing involves the feature extraction of fingerprint image processing stages such as image Preprocessing, Converting the image in to gray scale, Image Enhancement can be performed with the help of Discrete Fourier transformation, image binarization, image segmentation, image thinning, Minutiae Extraction after Minutiae Extraction again segmentation technique is used. In fingerprints images there are foreground regions and background regions where foreground region show the ridges and valleys while the background regions are to be left out.
منابع مشابه
Encryption of Text Using Fingerprints as Input to Various Algorithms
Human fingerprints are rich in details called minutiae, which can be used as identification marks for fingerprint verification. The goal of this project is to develop a complete system for fingerprint verification through extracting and matching minutiae. To achieve good minutiae extraction in fingerprints with varying quality, preprocessing in form of image enhancement and binarization is firs...
متن کاملCipher text only attack on speech time scrambling systems using correction of audio spectrogram
Recently permutation multimedia ciphers were broken in a chosen-plaintext scenario. That attack models a very resourceful adversary which may not always be the case. To show insecurity of these ciphers, we present a cipher-text only attack on speech permutation ciphers. We show inherent redundancies of speech can pave the path for a successful cipher-text only attack. To that end, regularities ...
متن کاملA Hybrid Encryption Scheme with Key-cloning Protection: User / Terminal Double Authentication via Attributes and Fingerprints
Internet service has enabled digital contents to be shared faster and easier, but on the other side it raised an issue of illegal copy of the digital contents. Public key encryption schemes solve this issue partially. However, there is still a weak point that the secret key is not completely protected; that is, public key encryption schemes suffer from illegal copy of secret keys (the key-cloni...
متن کاملAnalysis of a Multivariate Public Key Cryptosystem and Its Application in Software Copy Protection
We analysed and solved possible singularity for an improved MFE multivariate public key (Medium Field Multivariate Public Key Encryption) and studied the use of it in software copy protection. We used our new MFE multivariate public key cryptosystem to design an algorithm of software registration, in which a given plaintext can result in multi-cipher-text.. The breaking is hard because the ciph...
متن کاملCoset decomposition method for storing and decoding fingerprint data
Biometrics such as fingerprints, irises, faces, voice, gait and hands are often used for access control, authentication and encryption instead of PIN and passwords. In this paper a syndrome decoding technique is proposed to provide a secure means of storing and matching various biometrics data. We apply an algebraic coding technique called coset decomposition to the model of fingerprint biometr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014