Abstract

Human users find difficult to remember long cryptographic keys. Therefore, researchers, for a long time period, have beeninvestigating ways to use biometric features of the user rather than memorable password or passphrase, in an attempt to produce tough andunrepeatable cryptographic keys and to construct the key unpredictable to a hacker who is deficient of important knowledge about theuser's biometrics. In this paper, generating the strong bio-crypt key based on fingerprint minutiae is presented. At first, the minutiae pointsare extracted from the fingerprint image based on image processing algorithms. Then, the extracted fingerprint minutiae are used forgenerating a 1024 bit prime numbers that used in RSA cypher algorithm to generate 2048 cryptographic key.

Highlights

  • A biometric is defined as a unique, measurable, biological characteristic or trait for automatically recognizing or verifying the identity of a human being

  • Five of the most common physical biometric patterns analyzed for security purposes are the fingerprint, hand, eye, face, and voice

  • Biometric cryptosystems combines cryptography and biometrics to afford the advantages of both for security. This technique will provide the advantages like better and modifiable security levels which are the advantages of cryptography and advantages like eliminating the must to memorize passwords or to carry tokens etc which are the advantages of using biometrics [1]

Read more

Summary

Introduction

A biometric is defined as a unique, measurable, biological characteristic or trait for automatically recognizing or verifying the identity of a human being. These days, biometric technologies are typically used to analyze human characteristics for security purposes. Five of the most common physical biometric patterns analyzed for security purposes are the fingerprint, hand, eye, face, and voice. The biometrics traits e.g. fingerprint, hand, eye, face, and voice encrypt with original message to generate the encrypted data and further the same will be used to decrypt it. Fingerprint recognition is the oldest method of biometric identification In this time the fingerprint identification technique is used, with the name as dactyloscopy. The fingerprint is composed of ridges (lines across fingerprints) and valleys (spaces between ridges) [2]

Methodology
Cryptographic Key Generation Based on Fingerprint Biometric
Salting process
Shuffling process
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call