Abstract

Presenting uncouth proposal for the design of investigating ways to use extraction feature from biometric user,rather than memorable password or passphrase as an attempt to produce a new and randomly cipher keys. Human users find itdifficult to remember long cipher keys. Therefore, the proposed work takes the eye and ear as a multi-biometrics feature extraction forgenerating the cryptography keys. Meerkat Clan Key Generation Algorithm (MCKGA) is used in this work for key generation, firstlywe generate keys with 128-bits, then we enhance our method by generating 256-bits, and finally we mix the keys produced from (eyeand ear) and get robust key with 512-bits length, these keys are tested by NIST statically test to generate random keys used in encryptionprocess. Our approach generates unique keys used in cryptographic system by using Advanced Encryption Standard (AES) algorithm.

Highlights

  • Encryption is one of the most important methods of data protection; it is used in most systems of protection

  • The detected part needs to be bounded since it is the only part that will need to be extracted by using feature extraction algorithm, and the detection of region of interest is done by using contour algorithm which will bound the ear or eye and discard other information on the image

  • Standard (AES ), and the keys used for encryption or decryption process are the keys generated using Meerkat algorithm as shown in figure(7) and tested via NIST( National Institute of Frequency (Monobit) Test

Read more

Summary

INTRODUCTION

Encryption is one of the most important methods of data protection; it is used in most systems of protection. Through the perception of the conduct of some living creatures may show how they plan their characteristic practices to the algorithmic schedules. A productive security among examination and use could bring about worldwide accomplishment of optimality [3].The proposed system intended to utilize the unique biometric characteristics of the individual, so as to produce encrypted keys used in cryptographic system. In this system, more than one level is applied to create the key that is utilized for encryption; the produced key is utilizing Meerkat algorithm which will utilize the unique features of the individual to extract features. The guard gives a sound like boisterous bark on account of watching a hazard, and a short time later the horde will quickly dart to the concealing openings [6]

RELATED WORK
Preprocessing algorithm
THE PROPOSED SYSTEM
Key Generation Proposal with Meerkat Algorithm
RESULTS
CONCLUSIONS
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call